Professional Documents
Culture Documents
in Classic Cryptography
Boni Oktaviana1, Andysah Putera Utama Siahaan2
1
Faculty of Engineering
Sekolah Tinggi Teknik Harapan
1bonioktaviana@yahoo.co.id
2
Faculty of Computer Science
2
Universitas Pembangunan Panca Budi
2andiesiahaan@gmail.com
1
II. THEORIES
The theories cover to two encryption algorithms, such as
Caesar Cipher and Three-Pass Protocol. But, Three-Pass
Protocol is a technique on how to make the same algorithm runs
twice in encryption and decryption process. It never shares the
password to both of them.
A. Caesar Cipher
Caesar Cipher is one the oldest and most known in the
development of cryptography [4]. Caesar cipher is a
substitution cipher types that make up the cipher by way of
exchange of characters in plaintext into exactly one character
in the ciphertext. This technique is also known as a single
cipher alphabet. Caesar Cipher cryptography algorithm is very
easy to use. The core of these cryptographic algorithms is
shifting towards all the characters in plaintext with the same
shift value. The steps taken to establish ciphertext with Caesar
Cipher is:
Plaintext
Decryption 1
Encryption 1
Ciphertext 1
Ciphertext 1
Decryption 2
Encryption 2
Plainteks
Ciphertext 2
A
Figure 2 : Three-Pass
Stop
PT
CT
PT
CT
PT
CT
PT
CT
ENCRYPTION 1
E
M
E
M
J
R
J
R
H
E
M
J
R
I
V
A
W
N
A
F
A
S
S
W
F
X
X
B
R
W
T
Y
P
U
P
U
B
G
E
J
T
Y
O
T
E
J
R
W
R
W
D
I
PT
CT
PT
CT
PT
CT
PT
CT
ENCRYPTION 2
J
R
J
R
N
V N V
M
J
Q
N
W
N A
F
A
R
E
J
F
X X
B
J
B
B
F
W
A
Y
C
U
Y
U
Y
G
K
Y
C
T
X
J
N
J
N
W
A
W
A
I
M
CT
PT
CT
PT
DECRYPTION 2
I
Q
I
Q
CT
PT
CT
PT
CT
PT
CT
V
R
PT
PT
CT
PT
CT
V. CONCLUSION
Classic cryptography is the first generation on how to make
text message unreadable. However, in its algorithm, the
technique is still vulnerable. By combining classical
cryptography and Three-Pass Protocol, the ciphertext resulted
is guaranteed. The process of sending data is no longer need to
share a key to the sender of the message. Classical
cryptography is considered vulnerable to attack can still be
used.
REFERENCES
[1] Dony, A. (2008). Pengantar Ilmu Kriptografi Teori
Analisis dan Implementasi. Yogyakarta: Andi Offset.
[2] Kanamori, Y., & Yoo, S.-M. (2009). Quantum Three-Pass
Protocol : Key Distribution Using Quantum Super
Position States. International Journal of Network Security
& Its Applications, 1(2), 64-70.
[3] Mollin. (2007). An Introduction to Cryptography. Second
Edition. Taylor & Francis Group.
[4] Oktaviana, B. (2012). Kombinasi Vigenere Cipher
Dengan Caesar Cipher Dalam Three-Pass Protocol.
Medan: Tesis. Pasca Sarjana Teknik Informatika USU.
[5] Reza, M., & Budiman, M. A. (2012). Simulasi
Pengamanan File Teks Menggunakan Algoritma MasseyOmura. Jurnal Dunia Teknologi Informasi, 1(1), 20-27.
[6] Siahaan, A. P. U. (2016). Three-Pass Protocol
Implementation on Caesar Cipher in Classic
Cryptography. Diambil kembali dari Academia:
https://www.academia.edu/24923305/
Three_Pass_Protocol_Concept_in_Hill_Cipher_Encrypti
on_Technique