A Novel Technique for Enhancement of the Security of Playfair Cipher
Main Article Content
Abstract
In today's world advancement of data transmission over the unsecured channel and data is not secure. In this scenario, data should be in encrypted form and that data transmitted over the network. In cryptography, have two methods to encrypt data are substitution and Transposition. Transposition is referring to changing the position of a character in the given text. On the other hand, Substitution is referring to replacing the character with another character in the given text. Play fair cipher is based on polyalphabetic substitution cipher; classical play fair cipher has a 5*5 matrix. To increase the security of play fair cipher, this paper presents a new approach to introducing double encryption in the sender side and double decryption in the receiver side approach by vigenere cipher, play fair cipher, and linear congruently method.
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
IJCERT Policy:
The published work presented in this paper is licensed under the Creative Commons Attribution 4.0 International (CC BY 4.0) license. This means that the content of this paper can be shared, copied, and redistributed in any medium or format, as long as the original author is properly attributed. Additionally, any derivative works based on this paper must also be licensed under the same terms. This licensing agreement allows for broad dissemination and use of the work while maintaining the author's rights and recognition.
By submitting this paper to IJCERT, the author(s) agree to these licensing terms and confirm that the work is original and does not infringe on any third-party copyright or intellectual property rights.
References
[[1]Bhowmick, Anirban, Anand Vardhan Lal, and Nitish Ranjan. "Enhanced 6x6 Playfair Cipher using Double Myszkowski Transposition."International Journal of Engineering Research and Technology. Vol. 4. No. 07,July-2015. IJERT, 2015.
Negi, Ashish, et al. "Cryptography Playfair Cipher using Linear Feedback Shift Register."IOSR Journal of Engineering 2.5 (2012): 1212-1216.
Kumar, Vinod, et al. "Modified Version of Playfair Cipher Using Linear Feedback Shift Register and Transpose Matrix Concept'."International Journal of Innovative Technology and Exploring Engineering (IJITEE) 3 (2013).
Bhattacharyya, Subhajit, Nisarga Chand, and Subham Chakraborty. "A Modified Encryption Technique using Playfair Cipher 10 by 9 Matrix with Six Iteration Steps."
Dhenakaran, S. S., and M. Ilayaraja. "Extension of Playfair Cipher using 16X16 Matrix."International Journal of Computer Applications 48.7 (2012). [6] Basu, Sanjay, and Utpal Kumar Ray. "Modified Playfair Cipher using Rectangular Matrix."IJCA (0975-8887) Volume (2012)
. Alam, A. Aftab, B. Shah Khalid, and C. Muhammad Salam. "A Modified Version of Playfair Cipher Using 7? 4 Matrix."International Journal of Computer Theory and Engineering 5.4 (2013): 626.
Kaur, Amandeep, Harsh Kumar Verma, and Ravindra Kumar Singh. "6 X 6 Playfair Cipher using LFSR based Unique Random Number Generator."International Journal of Computer Applications 51.2 (2012).
Murali, Packirisamy, and Gandhidoss Senthilkumar. "Modified version of Playfair cipher using a linear feedback shift register."Information Management and Engineering, 2009. ICIME'09. International Conference on. IEEE, 2009.
Srivastava, Shiv Shakti, and Nitin Gupta. "Security Aspects of the Extended Playfair cipher."Communication Systems and Network Technologies (CSNT), 2011 International Conference on. IEEE, 2011.
https://en.wikipedia.org/wiki/Pseudorandom_number_generat
or
William, Stallings. Cryptography and Network Security: For VTU. Pearson Education, India, 2006.