Improvement of key exchange cryptosystem using matrix with three-pass protocol / Annuur Zakiah Zainol, Farah Deena Mohamad Fisal, Fatin Nur Athirah Mohd Radzi
These days, people need a more secure ways to share important message secretly. Public-key exchange cryptographic and encryption technique in Hill Cipher are one of the secured ways that people can use to share their message. No matter how hard to break the system, advisory always find a way to dism...
Saved in:
Main Authors: | , , |
---|---|
Format: | Student Project |
Language: | English |
Published: |
2018
|
Subjects: | |
Online Access: | https://ir.uitm.edu.my/id/eprint/49514/1/49514.pdf https://ir.uitm.edu.my/id/eprint/49514/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Teknologi Mara |
Language: | English |
id |
my.uitm.ir.49514 |
---|---|
record_format |
eprints |
spelling |
my.uitm.ir.495142021-08-19T05:57:17Z https://ir.uitm.edu.my/id/eprint/49514/ Improvement of key exchange cryptosystem using matrix with three-pass protocol / Annuur Zakiah Zainol, Farah Deena Mohamad Fisal, Fatin Nur Athirah Mohd Radzi Zainol, Annuur Zakiah Mohamad Fisal, Farah Deena Mohd Radzi, Fatin Nur Athirah Mathematical statistics. Probabilities Data processing Analytical methods used in the solution of physical problems These days, people need a more secure ways to share important message secretly. Public-key exchange cryptographic and encryption technique in Hill Cipher are one of the secured ways that people can use to share their message. No matter how hard to break the system, advisory always find a way to dismantle the message. Therefore, cryptosystem needs improvement from time to time. In the previous work of the research paper by Kester (2012), there are only one encryption process in public-key exchange. In this study, we concerning to increase the number of encryption in order to be difficult to break. In three-pass protocol, parties uses private encryption key to generate a cipher text. However, advisory can easily attack and obtain the private encryption key. Whereas, the private encryption and decryption key will act as a public key. Throughout this research paper, mathematical method that we use to generate public key and private key are matrix. 2018 Student Project NonPeerReviewed text en https://ir.uitm.edu.my/id/eprint/49514/1/49514.pdf ID49514 Zainol, Annuur Zakiah and Mohamad Fisal, Farah Deena and Mohd Radzi, Fatin Nur Athirah (2018) Improvement of key exchange cryptosystem using matrix with three-pass protocol / Annuur Zakiah Zainol, Farah Deena Mohamad Fisal, Fatin Nur Athirah Mohd Radzi. [Student Project] (Unpublished) |
institution |
Universiti Teknologi Mara |
building |
Tun Abdul Razak Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Mara |
content_source |
UiTM Institutional Repository |
url_provider |
http://ir.uitm.edu.my/ |
language |
English |
topic |
Mathematical statistics. Probabilities Data processing Analytical methods used in the solution of physical problems |
spellingShingle |
Mathematical statistics. Probabilities Data processing Analytical methods used in the solution of physical problems Zainol, Annuur Zakiah Mohamad Fisal, Farah Deena Mohd Radzi, Fatin Nur Athirah Improvement of key exchange cryptosystem using matrix with three-pass protocol / Annuur Zakiah Zainol, Farah Deena Mohamad Fisal, Fatin Nur Athirah Mohd Radzi |
description |
These days, people need a more secure ways to share important message secretly. Public-key exchange cryptographic and encryption technique in Hill Cipher are one of the secured ways that people can use to share their message. No matter how hard to break the system, advisory always find a way to dismantle the message. Therefore, cryptosystem needs improvement from time to time. In the previous work of the research paper by Kester (2012), there are only one encryption process in public-key exchange. In this study, we concerning to increase the number of encryption in order to be difficult to break. In three-pass protocol, parties uses private encryption key to generate a cipher text. However, advisory can easily attack and obtain the private encryption key. Whereas, the private encryption and decryption key will act as a public key. Throughout this research paper, mathematical method that we use to generate public key and private key are matrix. |
format |
Student Project |
author |
Zainol, Annuur Zakiah Mohamad Fisal, Farah Deena Mohd Radzi, Fatin Nur Athirah |
author_facet |
Zainol, Annuur Zakiah Mohamad Fisal, Farah Deena Mohd Radzi, Fatin Nur Athirah |
author_sort |
Zainol, Annuur Zakiah |
title |
Improvement of key exchange cryptosystem using matrix with three-pass protocol / Annuur Zakiah Zainol, Farah Deena Mohamad Fisal, Fatin Nur Athirah Mohd Radzi |
title_short |
Improvement of key exchange cryptosystem using matrix with three-pass protocol / Annuur Zakiah Zainol, Farah Deena Mohamad Fisal, Fatin Nur Athirah Mohd Radzi |
title_full |
Improvement of key exchange cryptosystem using matrix with three-pass protocol / Annuur Zakiah Zainol, Farah Deena Mohamad Fisal, Fatin Nur Athirah Mohd Radzi |
title_fullStr |
Improvement of key exchange cryptosystem using matrix with three-pass protocol / Annuur Zakiah Zainol, Farah Deena Mohamad Fisal, Fatin Nur Athirah Mohd Radzi |
title_full_unstemmed |
Improvement of key exchange cryptosystem using matrix with three-pass protocol / Annuur Zakiah Zainol, Farah Deena Mohamad Fisal, Fatin Nur Athirah Mohd Radzi |
title_sort |
improvement of key exchange cryptosystem using matrix with three-pass protocol / annuur zakiah zainol, farah deena mohamad fisal, fatin nur athirah mohd radzi |
publishDate |
2018 |
url |
https://ir.uitm.edu.my/id/eprint/49514/1/49514.pdf https://ir.uitm.edu.my/id/eprint/49514/ |
_version_ |
1709671424236453888 |