Abstract
Security features come into play when it is compulsory or enviable to defend the information communication from an opponent who attempts to break the confidential information. Security of the information is the encryption of the message, which messes up the message so that the message is indecipherable by the opponent and the addition of the code based on the contents of the message which can be used to verify the uniqueness of the sender. Some information shared by two persons should be unidentified to the malicious intruders. An example is an encryption key used in concurrence with the transformation to mess up the message before transmission and unscramble it on reception. In this connect, a new algorithm has to be designed for performing and ensuring the security-related information transmission between two parties. The algorithm should be designed in such a way that an opponent cannot overcome its purpose. The secret message needs to be generated for implementing security in the algorithm. In designing the consent security service, the method has to be developed for the sharing and allocation of secret information. This research paper proposes a new technique for implementing four-pass protocol schemes which will use mathematical series perceptions for the encryption and decryption of information in a communication network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Stallings W (2003) In: Cryptography and network security—principles and practices. 3rd edn. Pearson Education, Prentice Hall. ISBN 81-7808-902-5
Forouzan BA (2015) Cryptography and network security. 3rd edn. The McGraw Hill Companies, Inc, ISBN 978-93-392-2094-5
Ayushi (2010) A symmetric key cryptographic algorithm. Int J Comput Appl (0975–8887):15
Subandi A, Meiyanti R, Sandy CLM, Sembiring RW (2017) Three-pass protocol implementation in vigenere cipher classic cryptography algorithm with key stream generator modification. Adv Sci Technol Eng Syst J 2(5)
Oktavianab B, Utama Siahaan AP (2016) Three-pass protocol implementation in caesar cipher classic cryptography. IOSR J Comput Eng 18(4)
Joseph Emmanuvel V, Thomson Fredrik EJ (2020) Three pass protocol implementation using number cipher encryption in a communication network. J Xi'an Univers Architect Technol X11(V111)
Manh Nguyen D, Kim S (2019) A quantum three pass protocol with phase estimation for many bits transfer. In: International conference on advanced technologies for communications (ATC), IEEE, Accession No: 19239948
Rahim R, Ikhwan A (2016) Study of three pass protocol on data security. Int J Sci Res 5(11)
Blackledge JM, Tobin P, Adolfo CM, Govere W, Sibanda S (2019) Phase only digital encryption using a three pass protocol. In: Proceedings of IEEE international conference on irish signals and systems
Rahim R, Zahri NAH, Mohd Warip MNB (2021) Additional security using three-pass protocol and Pohlig-Hellman. In: IOP conference series: materials science and engineering
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Emmanuvel, V.J., Thomson Fredik, E.J. (2022). Implementation of Four-Pass Protocol Scheme Using Mathematical Series Cipher Encryption and Decryption in a Communication Network. In: Goyal, V., Gupta, M., Mirjalili, S., Trivedi, A. (eds) Proceedings of International Conference on Communication and Artificial Intelligence. Lecture Notes in Networks and Systems, vol 435. Springer, Singapore. https://doi.org/10.1007/978-981-19-0976-4_8
Download citation
DOI: https://doi.org/10.1007/978-981-19-0976-4_8
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-0975-7
Online ISBN: 978-981-19-0976-4
eBook Packages: EngineeringEngineering (R0)