• Andysah Putera Utama Siahaan Universitas Pembangunan Panca Budi


In computer networks, information exchange is common. The information transmitted can be confidential or ordinary. However, when sending confidential information, there are often concerns about its security. Senders tend to worry that the information sent will be stolen, especially if it contains confidential data. In order for the information to be read correctly, the sender and receiver must know the key or password. However, sending keys is also an important concern because if it falls into the wrong hands, the data and information contained in the file can be read easily. Therefore, key exchanges should be avoided and one of the techniques that can be used to avoid them is the Three Step Protocol scheme. This scheme allows the sender and receiver to encrypt and decrypt using their respective keys without having to exchange keys. The Three-Step Protocol is a mechanism that involves two algorithms in the cryptographic process, the Vigenère Algorithm. By implementing the Three-Step Protocol scheme, it can improve data security.

Author Biography

Andysah Putera Utama Siahaan, Universitas Pembangunan Panca Budi

Sistem Komputer


[1] S. Supiyandi, H. Hermansyah, and K. A. P. Sembiring, “Implementasi dan Penggunaan Algoritma Base64 dalam Pengamanan File Video,” J. MEDIA Inform. BUDIDARMA, vol. 4, no. 2, p. 340, Apr. 2020, doi: 10.30865/mib.v4i2.2042.
[2] I. Sumartono, A. P. U. Siahaan, and Arpan, “Base64 Character Encoding and Decoding Modeling,” Int. J. Recent Trends Eng. Res., vol. 2, no. 12, pp. 63–68, 2016.
[3] A. I. Permana, Kombinasi Algoritma Kriptografi One Time Pad dengan Generate Random Keys dan Vigenere Cipher dengan Kunci EM2B. Medan: Universitas Sumatera Utara, 2019.
[4] A. Hidayat, “Algoritma Kriptografi Vigenere Cipher,” Web Programmer, 2018. [Online]. Available: [Accessed: 07-Nov-2021].
[5] D. Rachmawati and M. A. Budiman, “An implementation of the H-rabin algorithm in the shamir three-pass protocol,” in 2017 2nd International Conference on Automation, Cognitive Science, Optics, Micro Electro-­Mechanical System, and Information Technology (ICACOMIT), 2017, pp. 28–33, doi: 10.1109/ICACOMIT.2017.8253381.
[6] A. Subandi, R. Meiyanti, C. L. M. Sandy, and R. W. Sembiring, “Three-Pass Protocol Implementation in Vigenere Cipher Classic Cryptography Algorithm with Keystream Generator Modification,” Adv. Sci. Technol. Eng. Syst. J., vol. 2, no. 5, pp. 1–5, Jun. 2017, doi: 10.25046/aj020501.
[7] A. Amrulloh and E. I. H. Ujianto, “Kriptografi Simetris Menggunakan Algoritma Vigenere Cipher,” vol. 5, no. 2, pp. 71–77, 2019.
[8] M. D. Irawan, “Implementasi Kriptografi Vigenere Cipher Dengan Php,” J. Teknol. Inf., vol. 1, no. 1, p. 11, 2017, doi: 10.36294/jurti.v1i1.21.
[9] B. Oktaviana and A. P. U. Siahaan, “Three-Pass Protocol Implementation on Caesar Cipher in Classic Cryptography,” IOSR J. Comput. Eng., vol. 18, no. 4, pp. 26–29, 2016.
[10] A. P. U. Siahaan, “Three-Pass Protocol Concept in Hill Cipher Encryption Technique,” Int. J. Sci. Res., vol. 5, no. 7, pp. 1149–1152, 2016.
How to Cite
SIAHAAN, Andysah Putera Utama. PENINGKATAN KEAMANAN ALGORITMA VIGENÈRE DENGAN PROTOKOL TIGA LANGKAH TANPA PENDISTRIBUSIAN KUNCI. Scenario (Seminar of Social Sciences Engineering and Humaniora), [S.l.], p. 64-69, apr. 2023. Available at: <>. Date accessed: 18 june 2024.