Three-Pass Protocol Implementation in Vigenere Cipher Classic Cryptography Algorithm With Keystream Generator Modification
Three-Pass Protocol Implementation in Vigenere Cipher Classic Cryptography Algorithm With Keystream Generator Modification
5, 1-5 (2017)
ASTESJ
www.astesj.com
ISSN: 2415-6698
2nd International Conference of Computer, Environment, Social Science, Health Science,
Agriculture & Technology (ICEST) 2017 5-7 May 2017, Medan, Indonesia
Amin Subandi*,1, Rini Meiyanti1, Cut Lika Mestika Sandy1, Rahmat Widia Sembiring2
1
Faculty of Computer and Information Technology, “ Universitas Sumatera Utara”, Medan, 20155, Indonesia,
2
Politeknik Negeri Medan, Medan, 20155, Indonesia,
Emails: [email protected], [email protected], [email protected], [email protected]
Pi = D ( Ci – Ki ) mod 26 (2)
U
Which C is the ciphertext, P is the plaintext, K is the Key, E is Next-State Function
"IS" in the encryption into ciphertext the same as "CH" , this can Ciphertext2
be exploited by cryptanalysts to break off the ciphertext. Kasiski Stop
In this paper, to prove each process, we use python, we made For encryption process using the key that has been modified,
it to both encryption and decryption process in plaintext manual it appears that the ciphertext generated more random, the word
input or plaintext taken from a file with .txt extension. "THE" produce different cipher word, it will be different if we
decrypt without key modification, the word "THE" will be
4. Testings And Implementations decrypted the same word "DLC", then "FA" equal to "PE", this
As a test, we will do the encryption and decryption of a will be loopholes for cryptanalyst to make the cryptanalysis
message with a cryptographic algorithm classic Vigenere Cipher process using kasiski methods. By modifying the key, kasiski
that reads "THE FAMILY AND THE FAV" uses two keys are method will be more difficult to do, moreover, the key also has to
www.astesj.com 4
A. Subandi et al. / Advances in Science, Technology and Engineering Systems Journal Vol. 2, No. 5, 1-5 (2017)
distributed, this, of course, requires us to ensure that the
distribution of the key should be completely safe. But when we
applying the method of Three-Pass protocol, the key does not
need to be distributed.
5. Conclusions