Improvement of key exchange cryptosystem using matrix with three-pass protocol / Annuur Zakiah Zainol, Farah Deena Mohamad Fisal, Fatin Nur Athirah Mohd Radzi

These days, people need a more secure ways to share important message secretly. Public-key exchange cryptographic and encryption technique in Hill Cipher are one of the secured ways that people can use to share their message. No matter how hard to break the system, advisory always find a way to dism...

Full description

Saved in:
Bibliographic Details
Main Authors: Zainol, Annuur Zakiah, Mohamad Fisal, Farah Deena, Mohd Radzi, Fatin Nur Athirah
Format: Student Project
Language:English
Published: 2018
Subjects:
Online Access:https://ir.uitm.edu.my/id/eprint/49514/1/49514.pdf
https://ir.uitm.edu.my/id/eprint/49514/
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknologi Mara
Language: English
id my.uitm.ir.49514
record_format eprints
spelling my.uitm.ir.495142021-08-19T05:57:17Z https://ir.uitm.edu.my/id/eprint/49514/ Improvement of key exchange cryptosystem using matrix with three-pass protocol / Annuur Zakiah Zainol, Farah Deena Mohamad Fisal, Fatin Nur Athirah Mohd Radzi Zainol, Annuur Zakiah Mohamad Fisal, Farah Deena Mohd Radzi, Fatin Nur Athirah Mathematical statistics. Probabilities Data processing Analytical methods used in the solution of physical problems These days, people need a more secure ways to share important message secretly. Public-key exchange cryptographic and encryption technique in Hill Cipher are one of the secured ways that people can use to share their message. No matter how hard to break the system, advisory always find a way to dismantle the message. Therefore, cryptosystem needs improvement from time to time. In the previous work of the research paper by Kester (2012), there are only one encryption process in public-key exchange. In this study, we concerning to increase the number of encryption in order to be difficult to break. In three-pass protocol, parties uses private encryption key to generate a cipher text. However, advisory can easily attack and obtain the private encryption key. Whereas, the private encryption and decryption key will act as a public key. Throughout this research paper, mathematical method that we use to generate public key and private key are matrix. 2018 Student Project NonPeerReviewed text en https://ir.uitm.edu.my/id/eprint/49514/1/49514.pdf ID49514 Zainol, Annuur Zakiah and Mohamad Fisal, Farah Deena and Mohd Radzi, Fatin Nur Athirah (2018) Improvement of key exchange cryptosystem using matrix with three-pass protocol / Annuur Zakiah Zainol, Farah Deena Mohamad Fisal, Fatin Nur Athirah Mohd Radzi. [Student Project] (Unpublished)
institution Universiti Teknologi Mara
building Tun Abdul Razak Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Mara
content_source UiTM Institutional Repository
url_provider http://ir.uitm.edu.my/
language English
topic Mathematical statistics. Probabilities
Data processing
Analytical methods used in the solution of physical problems
spellingShingle Mathematical statistics. Probabilities
Data processing
Analytical methods used in the solution of physical problems
Zainol, Annuur Zakiah
Mohamad Fisal, Farah Deena
Mohd Radzi, Fatin Nur Athirah
Improvement of key exchange cryptosystem using matrix with three-pass protocol / Annuur Zakiah Zainol, Farah Deena Mohamad Fisal, Fatin Nur Athirah Mohd Radzi
description These days, people need a more secure ways to share important message secretly. Public-key exchange cryptographic and encryption technique in Hill Cipher are one of the secured ways that people can use to share their message. No matter how hard to break the system, advisory always find a way to dismantle the message. Therefore, cryptosystem needs improvement from time to time. In the previous work of the research paper by Kester (2012), there are only one encryption process in public-key exchange. In this study, we concerning to increase the number of encryption in order to be difficult to break. In three-pass protocol, parties uses private encryption key to generate a cipher text. However, advisory can easily attack and obtain the private encryption key. Whereas, the private encryption and decryption key will act as a public key. Throughout this research paper, mathematical method that we use to generate public key and private key are matrix.
format Student Project
author Zainol, Annuur Zakiah
Mohamad Fisal, Farah Deena
Mohd Radzi, Fatin Nur Athirah
author_facet Zainol, Annuur Zakiah
Mohamad Fisal, Farah Deena
Mohd Radzi, Fatin Nur Athirah
author_sort Zainol, Annuur Zakiah
title Improvement of key exchange cryptosystem using matrix with three-pass protocol / Annuur Zakiah Zainol, Farah Deena Mohamad Fisal, Fatin Nur Athirah Mohd Radzi
title_short Improvement of key exchange cryptosystem using matrix with three-pass protocol / Annuur Zakiah Zainol, Farah Deena Mohamad Fisal, Fatin Nur Athirah Mohd Radzi
title_full Improvement of key exchange cryptosystem using matrix with three-pass protocol / Annuur Zakiah Zainol, Farah Deena Mohamad Fisal, Fatin Nur Athirah Mohd Radzi
title_fullStr Improvement of key exchange cryptosystem using matrix with three-pass protocol / Annuur Zakiah Zainol, Farah Deena Mohamad Fisal, Fatin Nur Athirah Mohd Radzi
title_full_unstemmed Improvement of key exchange cryptosystem using matrix with three-pass protocol / Annuur Zakiah Zainol, Farah Deena Mohamad Fisal, Fatin Nur Athirah Mohd Radzi
title_sort improvement of key exchange cryptosystem using matrix with three-pass protocol / annuur zakiah zainol, farah deena mohamad fisal, fatin nur athirah mohd radzi
publishDate 2018
url https://ir.uitm.edu.my/id/eprint/49514/1/49514.pdf
https://ir.uitm.edu.my/id/eprint/49514/
_version_ 1709671424236453888