Abstract
Cryptography is the method of delivery of messages in secret, thus only the intended message recipient can read the message. In this study, the cryptographic algorithms which used are Vigenere Cipher and One Time Pad. However, the security of both algorithms depends on the security of the algorithm key. Three-Pass Protocol is a scheme of work that lets two people exchange secret messages without doing a key exchange. So, both the symmetric cryptographic algorithms combined on a Three-Pass Protocol scheme. The purpose of the combination of two algorithms in the three-pass protocol is to secure the image message without exchange key process between sender and recipient. The results of the research and testing using GetPixel pointed out that safeguarding the image file using the combination of Vigenere Cipher and One Time Pad algorithm restores the original image files intact. Therefore, it meets the parameters of the integrity of the data. The test results based on time parameter shows that time of the program execution process is directly proportional to the size of the image. The result is related with the formula which calculate every pixels of the the image.
Highlights
The exchange of information today is effortless, especially for digital images or images
Cryptography is the science of the way of delivery of messages in secret so that only the intended recipient of the message can let go incognito and read
The calculation process using the combination of the two algorithms in the three pass protocol scheme is as follows: For example, sender wants to encrypt plain image which shown in figure 2 by using Vigenere Cipher
Summary
The exchange of information today is effortless, especially for digital images or images. This can be seen from the increasing number of social media that provide the main features to exchange pictures, such as Instagram. Each pixel color includes one byte-sized information that indicates the density of the image's color [1]. Much needed security for the digital images. One of the data security techniques is cryptography. Cryptography is both the arts and science of protecting the message by encoding it into a form that can no longer be understood [2]. The primary objectives of cryptography are integrity, authentication, confidentiality, and nonrepudiation [3]
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.