会议论文详细信息
10th International Conference Numerical Analysis in Engineering
Three-pass protocol scheme for bitmap image security by using vernam cipher algorithm
数学;工业技术
Rachmawati, D.^1 ; Budiman, M.A.^1 ; Aulya, L.^1
Departemen Ilmu Komputer, Fakultas Ilmu Komputer Dan Teknologi Informasi, Universitas Sumatera Utara, Jl. Universitas No. 9-A, Medan
20155, Indonesia^1
关键词: Bitmap images;    Cryptography algorithms;    Digital datas;    Key exchange;    Message delivery;    Original images;    System testing;    Vernam ciphers;   
Others  :  https://iopscience.iop.org/article/10.1088/1757-899X/308/1/012003/pdf
DOI  :  10.1088/1757-899X/308/1/012003
学科分类:工业工程学
来源: IOP
PDF
【 摘 要 】

Confidentiality, integrity, and efficiency are the crucial aspects of data security. Among the other digital data, image data is too prone to abuse of operation like duplication, modification, etc. There are some data security techniques, one of them is cryptography. The security of Vernam Cipher cryptography algorithm is very dependent on the key exchange process. If the key is leaked, security of this algorithm will collapse. Therefore, a method that minimizes key leakage during the exchange of messages is required. The method which is used, is known as Three-Pass Protocol. This protocol enables message delivery process without the key exchange. Therefore, the sending messages process can reach the receiver safely without fear of key leakage. The system is built by using Java programming language. The materials which are used for system testing are image in size 200×200 pixel, 300×300 pixel, 500×500 pixel, 800×800 pixel and 1000×1000 pixel. The result of experiments showed that Vernam Cipher algorithm in Three-Pass Protocol scheme could restore the original image.

【 预 览 】
附件列表
Files Size Format View
Three-pass protocol scheme for bitmap image security by using vernam cipher algorithm 717KB PDF download
  文献评价指标  
  下载次数:18次 浏览次数:25次