Enhancing the Hill Cipher with a Three-Pass Protocol Approach

Authors

  • Andysah Putera Utama Siahaan Universitas Pembangunan Panca Budi, Medan, Indonesia Author
  • Erni Marlina Binti Saari Universiti Pendidikan Sultan Idris, Tanjong Malim, Malaysia Author
  • Moustafa Hussein Ali Hassan Arab Academy for Science Maritime Transport, Alexandria, Egypt Author
  • Noor Aldeen A. Khalid Bilad Alrafidain University College, Diyala, Iraq Author
  • Muhammad Akbar Syahbana Pane Universitas Pembangunan Panca Budi, Medan Author

DOI:

https://doi.org/10.64803/cessmuds.v1.5
   

Keywords:

Hill Cipher, Three-pass Protocol, Matrix Encryption, Visual Basic Implementation

Abstract

This paper presents the design and implementation of a cryptographic scheme that combines the Hill Cipher algorithm with the Three-Pass Protocol (TPP) using mod-256 arithmetic. The objective is to provide a secure communication mechanism without direct key exchange while adapting a classical cipher to modern digital contexts. The system employs a 2×2 key matrix where plaintext characters are mapped to their ASCII values, grouped into vectors, and transformed through matrix multiplication followed by modulo reduction. The TPP structure allows both sender and receiver to apply their private keys independently, producing layered ciphertexts before the final recovery of the plaintext. A prototype application was developed using Microsoft Visual Studio 2010 (Visual Basic) to validate the approach. The program includes input fields for plaintext, ciphertext at each stage, key matrices, and a log box that records the detailed matrix operations for transparency. Experimental results demonstrate that the original plaintext can be accurately restored after multiple encryption and decryption phases, while the intermediate ciphertexts remain random and unintelligible. The findings confirm that integrating Hill Cipher with the Three-Pass Protocol strengthens confidentiality and eliminates the need for key distribution. Beyond its security benefits, the prototype also serves as an educational tool, helping students and practitioners understand both matrix-based encryption and keyless secure communication protocols.

References

Alsharif, S. M. (2019). Three-Pass Protocol Implementation in Hill Cipher Encryption Technique. Journal of Pure & Applied Sciences, 18(4). https://doi.org/10.51984/jopas.v18i4.444

Harahap, M. I., Suherman, S., & Sembiring, R. W. (2023). Three Pass Protocol for Key Security Using Affine Cipher Algortima and Exclusive-or (Xor) Combination. Sinkron, 8(4), 2602–2614. https://doi.org/10.33395/sinkron.v8i4.13051

Mezher, L. S., & Abbass, A. M. (2021). Mixed Hill Cipher methods with triple pass protocol methods. International Journal of Electrical and Computer Engineering (IJECE), 11(5), 4449. https://doi.org/10.11591/ijece.v11i5.pp4449-4457

Siahaan, A. P. U. (2017). Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm. International Journal of Advances in Applied Sciences, 6(4), 313–318.

Sutoyo, M. N., Qammaddin, Q., Rahayu, R., & Kariani, N. K. R. (2024). Pengamanan Data Berbasis Hill Cipher dengan Operasi Modulo pada Karakter ASCII. Techno.Com, 23(4), 786–795. https://doi.org/10.62411/tc.v23i4.11523

Toorani, M., & Falahati, A. (2009). A secure variant of the Hill Cipher. 2009 IEEE Symposium on Computers and Communications, 313–316. https://doi.org/10.1109/ISCC.2009.5202241

Downloads

Published

2025-09-29

Issue

Section

Articles

How to Cite

Enhancing the Hill Cipher with a Three-Pass Protocol Approach. (2025). Proceedings of The International Conference on Computer Science, Engineering, Social Science, and Multi-Disciplinary Studies, 1, 22-26. https://doi.org/10.64803/cessmuds.v1.5