A Novel Technique for Enhancement of the Security of Playfair Cipher

Main Article Content

Sarita Singh

Abstract

In today's world advancement of data transmission over the unsecured channel and data is not secure. In this scenario, data should be in encrypted form and that data transmitted over the network. In cryptography, have two methods to encrypt data are substitution and Transposition. Transposition is referring to changing the position of a character in the given text. On the other hand, Substitution is referring to replacing the character with another character in the given text. Play fair cipher is based on polyalphabetic substitution cipher; classical play fair cipher has a 5*5 matrix. To increase the security of play fair cipher, this paper presents a new approach to introducing double encryption in the sender side and double decryption in the receiver side approach by vigenere cipher, play fair cipher, and linear congruently method.

Article Details

How to Cite
[1]
Sarita Singh, “A Novel Technique for Enhancement of the Security of Playfair Cipher”, Int. J. Comput. Eng. Res. Trends, vol. 7, no. 1, pp. 8–12, Aug. 2023.
Section
Research Articles

References

[[1]Bhowmick, Anirban, Anand Vardhan Lal, and Nitish Ranjan. "Enhanced 6x6 Playfair Cipher using Double Myszkowski Transposition."International Journal of Engineering Research and Technology. Vol. 4. No. 07,July-2015. IJERT, 2015.

Negi, Ashish, et al. "Cryptography Playfair Cipher using Linear Feedback Shift Register."IOSR Journal of Engineering 2.5 (2012): 1212-1216.

Kumar, Vinod, et al. "Modified Version of Playfair Cipher Using Linear Feedback Shift Register and Transpose Matrix Concept'."International Journal of Innovative Technology and Exploring Engineering (IJITEE) 3 (2013).

Bhattacharyya, Subhajit, Nisarga Chand, and Subham Chakraborty. "A Modified Encryption Technique using Playfair Cipher 10 by 9 Matrix with Six Iteration Steps."

Dhenakaran, S. S., and M. Ilayaraja. "Extension of Playfair Cipher using 16X16 Matrix."International Journal of Computer Applications 48.7 (2012). [6] Basu, Sanjay, and Utpal Kumar Ray. "Modified Playfair Cipher using Rectangular Matrix."IJCA (0975-8887) Volume (2012)

. Alam, A. Aftab, B. Shah Khalid, and C. Muhammad Salam. "A Modified Version of Playfair Cipher Using 7? 4 Matrix."International Journal of Computer Theory and Engineering 5.4 (2013): 626.

Kaur, Amandeep, Harsh Kumar Verma, and Ravindra Kumar Singh. "6 X 6 Playfair Cipher using LFSR based Unique Random Number Generator."International Journal of Computer Applications 51.2 (2012).

Murali, Packirisamy, and Gandhidoss Senthilkumar. "Modified version of Playfair cipher using a linear feedback shift register."Information Management and Engineering, 2009. ICIME'09. International Conference on. IEEE, 2009.

Srivastava, Shiv Shakti, and Nitin Gupta. "Security Aspects of the Extended Playfair cipher."Communication Systems and Network Technologies (CSNT), 2011 International Conference on. IEEE, 2011.

https://en.wikipedia.org/wiki/Pseudorandom_number_generat

or

William, Stallings. Cryptography and Network Security: For VTU. Pearson Education, India, 2006.