Abstract
Hill-Cipher is one of the symmetric encryption algorithms that use one key for the encryption and decryption processes. This used key should be sent to the receiver in order to do the decryption process. However, to avoid sending the key to the receiver, three-pass protocol is applied. Three-pass protocol is a scheme to transmit data between the sender and receiver without having any advance distribution for the keys. In this study, a new attack on the encryption algorithm, three-pass protocol on Hill-Cipher, is introduced. This attack depends only on the ciphertext which makes us break this system by analyzing the encryption and decryption process.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Rahim R, Ikhwan A (2010) Study of three pass protocol on data security. Int J Sci Res (IJSR) 5(11):102–104
Gupta A, Walia NK (2014) Cryptography algorithms: a review. Int J Eng Dev Res (IJEDR) 2(2):1667–1672
Abdullah AA, Khalaf RZ, Habib HB (2019) Modified BB84 quantum key distribution protocol using legendre symbol. In: 2nd scientific conference of computer sciences (SCCS). University of Technology-Iraq, IEEE
Siahaan APU (2016) Three-pass protocol concept in Hill Cipher encryption technique. Int J Sci Res (IJSR) 5(7):1149–1152
Toorani M, Falahati A (2009) A secure variant of the Hill Cipher. In: Symposium on computers and communications. IEEE
Abdullah AA, Khalaf R, Riza M (2015) A realizable quantum three-pass protocol authentication based on Hill-Cipher algorithm. Math Probl Eng 2015:6, Article ID 481824. https://doi.org/10.1155/2015/481824
Rahman M, Nordin A, Abidin AFA, Yusof MK, Usop NSM (2013) Cryptography: a new approach of Classical Hill Cipher. Int J Secur Appl 7(2):179–190
Rosen KH (2011) Elementary number theory and its applications, 6th edn. Addison-Wesley, Pearson
Shibiraj N, Tomba I (2018) Modified Hill Cipher: secure technique using latin square and magic square. Int J Comput Sci Eng 6(12):315–320
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Khalaf, R.Z., Habib, H.B., Aljaff, S.K. (2021). Attacking the Application of Three-Pass Protocol in Hill-Cipher. In: Kumar, R., Mishra, B.K., Pattnaik, P.K. (eds) Next Generation of Internet of Things. Lecture Notes in Networks and Systems, vol 201. Springer, Singapore. https://doi.org/10.1007/978-981-16-0666-3_12
Download citation
DOI: https://doi.org/10.1007/978-981-16-0666-3_12
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-0665-6
Online ISBN: 978-981-16-0666-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)