Three Pass Protocol for Key Security Using Affine Cipher Algortima and Exclusive-or (Xor) Combination


  • Muhammad Ikhwan Harahap Universitas Sumatera Utara
  • Suherman Universitas Sumatera Utara
  • Rahmat W Sembiring Politeknik Negeri Medan




Plaintext; Security; Chipertext; Afiine Cipher; XOR Chipper


Information is a very important concern in today's technological era, especially in terms of security through the exchange of information that is so fast that people can easily get various kinds of information. Information obtained easily through recording or openly disseminating data, XOR Cipher is an algorithm used to secure messages and texts but has weaknesses due to simple computation, therefore to strengthen security in XOR Cipher communication protocols can be added to secure key exchange on XOR Ciphers. Affine Cipher can be combined with Exclusive-OR (XOR) for text message security. Through the Affine Cipher algorithm with Key can change the unknown Plaintext, so that the Plaintext is kept secret. The Exclusive-OR (XOR) combination by changing each Character in each Plaintext according to the ASCII Code table can shorten the Key encoding process, so that Plaintext remains safe to send. The Affine Cipher Algorithm and the Exclusive-OR (XOR) Combination for Plaintext security levels are better because the Plaintext encryption and decryption processes are carried out twice with different cryptographic algorithms.

GS Cited Analysis


Download data is not yet available.


A. P. Galih, “Keamanan Informasi (Information Security) Pada Aplikasi Perpustakaan IPusnas,” AL Maktabah, vol. 5, no. 1, p. 10, 2020, doi: 10.29300/mkt.v5i1.3086.

Ariyus, D. (2008). Pengantar Ilmu Kriptografi Teori, Analisis, dan Implementasi.

I. Darmayanti, D. N. Astrida, and D. Arius, “Penerapan Keamanan Pesan Teks Menggunakan Modifikasi Algoritma Caisar Chiper Kedalam Bentuk Sandi Morse,” Jurnal IT CIDA, vol. 4, no. 1, pp. 39–47, 2018.

Juliadi dkk. (2013). Kriptografi Klasik Dengan Metode Modifikasi Affine Cipher Yang Diperkuat Dengan Vigenere Cipher, Buletin Ilmiah Matematika Statistik, vol. 2, no. 2, pp. 87 - 92.

M. Jain. (2014). Implementation Of Hybrid Cryptography Algorithm, IJCEM. India, vol. 1, pp. 126-142

Munir, R. (2006). Kriptografi. Cetakan Pertama, Penerbit Informatika, Bandung.

Oktaviana, Boni. Siahaan, Andysah. (2016). Three-Pass Protocol Implementation in Caesar Cipher Classic Cryptography. IOSR Journal of Computer Engineering (IOSR-JCE)

O. Krianto Sulaiman. (2019). Hybrid Cryptosystem Menggunakan Xor Cipher Dan Merkle-Hellman Knapsack Untuk Menjaga Kerahasiaan Pesan Digital. Jurnal Teknologi Informasi, vol. 3, no. 2, pp. 169–173.

Septi Yana Wulandari. (2020). Proceeding International Conference on Science and Engineering. 3: 741-744

Suhardi. (2021). Kombinasi Metode Affine Cipher Dan Exclusive-OR (XOR) Dalam Pengamanan Pesan. Karya Ilmiah Fakultas Sains dan Teknologi.

Suherman. (2020). Impact encryption algorithm used in three pass protocol for securing WiMAX link. Journal of Physics: Conference Series. doi:10.1088/1742-6596/1783/1/012063

Suherman dkk. (2021). Embedding the three pass protocol messages into transmission control protocol header. Vol. 22 No.1, Pp. 442-449.


Crossmark Updates

How to Cite

Harahap, M. I. ., Suherman, S., & Sembiring, R. W. . (2023). Three Pass Protocol for Key Security Using Affine Cipher Algortima and Exclusive-or (Xor) Combination. Sinkron : Jurnal Dan Penelitian Teknik Informatika, 8(4), 2602-2614.