HILL CIPHER ON SHAMIR’S THREE PASS PROTOCOL
This preprint has been presented in the 3rd International Conference on Multidisciplinary Research, Medan, october 16 – 18, 2014---In this study the authors use the scheme of Shamir's Three Pass Protocol for Hill Cipher operation. Scheme of Shamir's Three Pass Protocol is an attractive scheme that allows senders and receivers to communicate without the key exchange. Hill Cipher is chosen because of the key-shaped matrix, which is expected to complicate the various techniques of cryptanalyst. The results of this study indicate that the weakness of the scheme of Shamir's Three Pass Protocol for XOR operation is not fully valid if it is used for Hill Cipher operations. Cryptanalyst can utilize only the third ciphertext that invertible. Matrix transpose techniques in the ciphertext aims to difficulties in solving this algorithm. The original ciphertext generated in each process is different from the transmitted ciphertext. The level of difficulty increases due to the use of larger key matrix. The amount of time required for the execution of the program depends on the length of the plaintext and the value of the matrix element. Plaintext has the same length produce different execution time depending on the value of the key elements of the matrix used.