Skip to main content

Implementation of Four-Pass Protocol Scheme Using Mathematical Series Cipher Encryption and Decryption in a Communication Network

  • Conference paper
  • First Online:
Proceedings of International Conference on Communication and Artificial Intelligence

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 435))

  • 645 Accesses

Abstract

Security features come into play when it is compulsory or enviable to defend the information communication from an opponent who attempts to break the confidential information. Security of the information is the encryption of the message, which messes up the message so that the message is indecipherable by the opponent and the addition of the code based on the contents of the message which can be used to verify the uniqueness of the sender. Some information shared by two persons should be unidentified to the malicious intruders. An example is an encryption key used in concurrence with the transformation to mess up the message before transmission and unscramble it on reception. In this connect, a new algorithm has to be designed for performing and ensuring the security-related information transmission between two parties. The algorithm should be designed in such a way that an opponent cannot overcome its purpose. The secret message needs to be generated for implementing security in the algorithm. In designing the consent security service, the method has to be developed for the sharing and allocation of secret information. This research paper proposes a new technique for implementing four-pass protocol schemes which will use mathematical series perceptions for the encryption and decryption of information in a communication network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Stallings W (2003) In: Cryptography and network security—principles and practices. 3rd edn. Pearson Education, Prentice Hall. ISBN 81-7808-902-5

    Google Scholar 

  2. Forouzan BA (2015) Cryptography and network security. 3rd edn. The McGraw Hill Companies, Inc, ISBN 978-93-392-2094-5

    Google Scholar 

  3. Ayushi (2010) A symmetric key cryptographic algorithm. Int J Comput Appl (0975–8887):15

    Google Scholar 

  4. Subandi A, Meiyanti R, Sandy CLM, Sembiring RW (2017) Three-pass protocol implementation in vigenere cipher classic cryptography algorithm with key stream generator modification. Adv Sci Technol Eng Syst J 2(5)

    Google Scholar 

  5. Oktavianab B, Utama Siahaan AP (2016) Three-pass protocol implementation in caesar cipher classic cryptography. IOSR J Comput Eng 18(4)

    Google Scholar 

  6. Joseph Emmanuvel V, Thomson Fredrik EJ (2020) Three pass protocol implementation using number cipher encryption in a communication network. J Xi'an Univers Architect Technol X11(V111)

    Google Scholar 

  7. Manh Nguyen D, Kim S (2019) A quantum three pass protocol with phase estimation for many bits transfer. In: International conference on advanced technologies for communications (ATC), IEEE, Accession No: 19239948

    Google Scholar 

  8. Rahim R, Ikhwan A (2016) Study of three pass protocol on data security. Int J Sci Res 5(11)

    Google Scholar 

  9. Blackledge JM, Tobin P, Adolfo CM, Govere W, Sibanda S (2019) Phase only digital encryption using a three pass protocol. In: Proceedings of IEEE international conference on irish signals and systems

    Google Scholar 

  10. Rahim R, Zahri NAH, Mohd Warip MNB (2021) Additional security using three-pass protocol and Pohlig-Hellman. In: IOP conference series: materials science and engineering

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to E. J. Thomson Fredik .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Emmanuvel, V.J., Thomson Fredik, E.J. (2022). Implementation of Four-Pass Protocol Scheme Using Mathematical Series Cipher Encryption and Decryption in a Communication Network. In: Goyal, V., Gupta, M., Mirjalili, S., Trivedi, A. (eds) Proceedings of International Conference on Communication and Artificial Intelligence. Lecture Notes in Networks and Systems, vol 435. Springer, Singapore. https://doi.org/10.1007/978-981-19-0976-4_8

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-0976-4_8

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-0975-7

  • Online ISBN: 978-981-19-0976-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics