• Login
    View Item 
    •   USU-IR Home
    • Faculty of Computer Science and Information Technology
    • Department of Information Technology
    • Master Theses
    • View Item
    •   USU-IR Home
    • Faculty of Computer Science and Information Technology
    • Department of Information Technology
    • Master Theses
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Hill Cipher pada Skema Shamir’s Three Pass Protocol

    View/Open
    Fulltext (2.493Mb)
    Date
    2014
    Author
    Hasdiana
    Advisor(s)
    Zarlis, Muhammad
    Sembiring, Rahmat W.
    Metadata
    Show full item record
    Abstract
    In this study the authors use the scheme of Shamir's Three Pass Protocol for Hill Cipher operation. Scheme of Shamir's Three Pass Protocol is an attractive scheme that allows senders and receivers to communicate without the key exchange. Hill Cipher is chosen because of the key-shaped matrix, which is expected to complicate the various techniques of cryptanalyst. The results of this study indicate that the weakness of the scheme of Shamir's Three Pass Protocol for XOR operation is not fully valid if it is used for Hill Cipheroperations. Cryptanalyst can utilize only the thirdciphertext that invertible. Matrix transpose techniques in the ciphertext aims to difficulties in solving this algorithm. The original ciphertext generated in each process is different from the transmitted ciphertext. The level of difficulty increases due to the use of larger key matrix. The amount of time required for the execution of the program depends on the length of the plaintext and the value of the matrix element. Plaintext has the same length produce different execution time depending on the value of the key elements of the matrix used.
     
    Dalam penelitian ini penulis menggunakan skema Shamir’s Three Pass Protocol untuk operasi Hill Cipher. Skema Shamir’s Three Pass Protocol merupakan skema yang menarik yang memungkinkan pengirim dan penerima berkomunikasi tanpa adanya pertukaran kunci. Hill Cipher dipilih karena kuncinya yang berbentuk matriks, sehingga diharapkan dapat mempersulit berbagai teknik kriptanalis yang ada. Hasil penelitian ini menunjukkan bahwa kelemahan skema Shamir’s Three Pass Protocol untuk operasi XOR tidak berlaku sepenuhnya jika digunakan untuk operasi Hill Cipher. Kriptanalis hanya dapat memanfaatkan cipherteks ke tiga yang invertible saja. Teknik transpose matriks pada cipherteks bertujuan menambah kesulitan dalam memecahkan algoritma ini. Cipherteks asli yang dihasilkan pada tiap proses berbeda dengan cipherteks yang dikirim. Tingkat kesulitan bertambah karena penggunaan kunci matriks yang lebih besar. Banyaknya waktu yang dibutuhkan untuk eksekusi program tergantung pada panjang plainteks dan nilai elemen matriks. Plainteks yang memiliki panjang yang sama menghasilkan waktu eksekusi berbeda tergantung pada nilai elemen matriks kunci yang digunakan.

    URI
    http://repositori.usu.ac.id/handle/123456789/41965
    Collections
    • Master Theses [621]

    Repositori Institusi Universitas Sumatera Utara (RI-USU)
    Universitas Sumatera Utara | Perpustakaan | Resource Guide | Katalog Perpustakaan
    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    Theme by 
    Atmire NV
     

     

    Browse

    All of USU-IRCommunities & CollectionsBy Issue DateTitlesAuthorsAdvisorsKeywordsTypesBy Submit DateThis CollectionBy Issue DateTitlesAuthorsAdvisorsKeywordsTypesBy Submit Date

    My Account

    LoginRegister

    Repositori Institusi Universitas Sumatera Utara (RI-USU)
    Universitas Sumatera Utara | Perpustakaan | Resource Guide | Katalog Perpustakaan
    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    Theme by 
    Atmire NV