Enhancing the Hill Cipher with a Three-Pass Protocol Approach
DOI:
https://doi.org/10.64803/cessmuds.v1.5Keywords:
Hill Cipher, Three-pass Protocol, Matrix Encryption, Visual Basic ImplementationAbstract
This paper presents the design and implementation of a cryptographic scheme that combines the Hill Cipher algorithm with the Three-Pass Protocol (TPP) using mod-256 arithmetic. The objective is to provide a secure communication mechanism without direct key exchange while adapting a classical cipher to modern digital contexts. The system employs a 2×2 key matrix where plaintext characters are mapped to their ASCII values, grouped into vectors, and transformed through matrix multiplication followed by modulo reduction. The TPP structure allows both sender and receiver to apply their private keys independently, producing layered ciphertexts before the final recovery of the plaintext. A prototype application was developed using Microsoft Visual Studio 2010 (Visual Basic) to validate the approach. The program includes input fields for plaintext, ciphertext at each stage, key matrices, and a log box that records the detailed matrix operations for transparency. Experimental results demonstrate that the original plaintext can be accurately restored after multiple encryption and decryption phases, while the intermediate ciphertexts remain random and unintelligible. The findings confirm that integrating Hill Cipher with the Three-Pass Protocol strengthens confidentiality and eliminates the need for key distribution. Beyond its security benefits, the prototype also serves as an educational tool, helping students and practitioners understand both matrix-based encryption and keyless secure communication protocols.
References
Alsharif, S. M. (2019). Three-Pass Protocol Implementation in Hill Cipher Encryption Technique. Journal of Pure & Applied Sciences, 18(4). https://doi.org/10.51984/jopas.v18i4.444
Harahap, M. I., Suherman, S., & Sembiring, R. W. (2023). Three Pass Protocol for Key Security Using Affine Cipher Algortima and Exclusive-or (Xor) Combination. Sinkron, 8(4), 2602–2614. https://doi.org/10.33395/sinkron.v8i4.13051
Mezher, L. S., & Abbass, A. M. (2021). Mixed Hill Cipher methods with triple pass protocol methods. International Journal of Electrical and Computer Engineering (IJECE), 11(5), 4449. https://doi.org/10.11591/ijece.v11i5.pp4449-4457
Siahaan, A. P. U. (2017). Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm. International Journal of Advances in Applied Sciences, 6(4), 313–318.
Sutoyo, M. N., Qammaddin, Q., Rahayu, R., & Kariani, N. K. R. (2024). Pengamanan Data Berbasis Hill Cipher dengan Operasi Modulo pada Karakter ASCII. Techno.Com, 23(4), 786–795. https://doi.org/10.62411/tc.v23i4.11523
Toorani, M., & Falahati, A. (2009). A secure variant of the Hill Cipher. 2009 IEEE Symposium on Computers and Communications, 313–316. https://doi.org/10.1109/ISCC.2009.5202241
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Andysah Putera Utama Siahaan, Erni Marlina Binti Saari, Moustafa Hussein Ali Hassan, Noor Aldeen Abbas, Muhammad Akbar Syahbana Pane (Author)

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.





