skip to main content
10.1145/3377049.3377085acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccaConference Proceedingsconference-collections
research-article

An Effective Modification of Play Fair Cipher with Performance Analysis using 6X6 Matrix

Authors Info & Claims
Published:20 March 2020Publication History

ABSTRACT

Researchers have shown great interest in expanding and modifying the Playfair Cipher algorithm to overcome its pre-existing demerits. An explosion of research in cryptography for Playfair cipher occurred the last decade. While the inability of encrypting numeric characters exists in traditional Playfair Cipher, the algorithm is incompatible with many present technologies. Even for the encryption of a proper information in the form of human expressions, encryption of spaces between the words is needed as post processing of the decrypted message remains confusing without the feature. This paper proposes a modification of Playfair Cipher which is able to encrypt alphanumeric characters as well as spaces. The paper reaches the goal by modifying the dimension of the key matrix from 5 by 5 to 6 by 6 and introducing a method to replace spaces with configured digraphs from the generated key matrix. It is believed that introducing the mentioned features can prevent frequency attacks in Playfair Cipher. In this era of Internet of Things, the small devices need algorithms with lower memory consumption. Updated Playfair cipher can be implemented to aid to that.

References

  1. Fred Cohen. 1995. Introductory Information Protection (1st. ed.).Google ScholarGoogle Scholar
  2. Howard Poston and Keshav Dhandhania. 2001. The Playfair Cipher (2001). Retrieved May 5, 2019 from https://www.commonlounge.com/discussion/350ac6f155ba48ecbd0fb8fd38e2f205Google ScholarGoogle Scholar
  3. Lexico. Which Letters In The Alphabet Are Used Most Often? Retrieved from https://www.lexico.com/en/explore/which-letters-are-used-mostGoogle ScholarGoogle Scholar
  4. Krishnaraj Bhat, Dindayal Mahto and Dilip Kumar 2017. Information Security using Adaptive Multidimensional Playfair Cipher, International Journal of Advanced Research in Computer Science, 8 (5), (June 2017), 372--380. http://dx.doi.org/10.26483/ijarcsGoogle ScholarGoogle ScholarCross RefCross Ref
  5. Ashish Pandey and Neelendra Badal 2019. A Modified Circular Version of Playfair Cipher, 2nd International Conference on Advanced Computing and Software Engineering (ICACSE-2019), 535--538. https://doi.org/10.2139/ssrn.3351022Google ScholarGoogle ScholarCross RefCross Ref
  6. Madeha Shaltagh Yousif Raghad Kadhim Salih and Nadia Mohamed Ghanim Alsaidi, A new modified Playfair Cipher 2019. AIP Conference Proceedings 2086, 030047 (April 2019). https://doi.org/10.1063/1.5095132Google ScholarGoogle ScholarCross RefCross Ref
  7. Krishnaraj Bhat, Dindayal Mahto and Dilip Kumar Yadav 2017. A Novel Approach to Information Security Using Four Dimensional (4d) Playfair Cipher Fused With Linear Feedback Shift Register, Indian Journal of Computer Science and Engineering, Vol 8, (February 2017), 15--32. http://dx.doi.org/10.21817/indjcseGoogle ScholarGoogle ScholarCross RefCross Ref
  8. Swati Hans, Rahul Johari, Vishakha Gautam, 2014. An Extended PlayFair Cipher using Rotation and Random Swap patterns, 5th IEEE International Conference on Computer and Communication Technology, (September 2014). 155--160. https://doi.org/10.1109/ICCCT.2014.7001485Google ScholarGoogle ScholarCross RefCross Ref
  9. Assia Merzoug, Adda Ali Pacha and Naima Hadj Said 2017. New Approach of the Playfair's Cipher with a Numerical Value of the Keyword, Indonesian Journal of Electrical Engineering and Computer Science. Vol 6(3), (June 2017), 695--703. https://doi.org/10.11591/ijeecsGoogle ScholarGoogle ScholarCross RefCross Ref
  10. Muhammad Syahrizal, Murdani, Surya Darma Nasution, Mesran, Robbi Rahim and Andysah Putera Utama Siahaan 2017. Modified Playfair Cipher Using Random Key Linear Congruent Method, The International Seminar: Research For Science, Technology And Culture. Vol 19 (October 2017) 25--29Google ScholarGoogle Scholar
  11. Kalaichelvi V, Manimozhi K, Meenakshi P, Rajakumar B, Vimala Devi P 2017. An Adaptive Play fair Cipher Algorithm for Secure Communication Using Radix 64 Conversion, International Journal of Pure and Applied Mathematics Vol 117(20) (2017), 325--330Google ScholarGoogle Scholar
  12. Md Masuduzzaman, Ashik Mahmud, Anik Islam, Md. Mofijul Islam "Two Phase Authentication and VPN Based Secured Communication for IoT Home Networks". [In Press]Google ScholarGoogle Scholar
  13. M. Schmidt 2013. Raspberry Pi - A Quick Start Guide, the Pragmatic BookshelfGoogle ScholarGoogle Scholar
  14. M. Richardson and S. Wallace 2013. Getting started with Raspberry Pi, O'Reilly, USA,Google ScholarGoogle Scholar
  15. Mirjana Maksimović, Vladimir Vujović, Nikola Davidović, Vladimir Milošević and Branko Perišić 2015. Raspberry Pias Internet of Things hardware: Performances and Constraints, 1st International Conference on Electrical, Electronic and Computing Engineering. (June 2015)Google ScholarGoogle Scholar
  16. D. Uckelmann, M. Harrison, F. Michahelles 2011. Architecting the Internet of Things, SpringerGoogle ScholarGoogle Scholar

Index Terms

  1. An Effective Modification of Play Fair Cipher with Performance Analysis using 6X6 Matrix

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            ICCA 2020: Proceedings of the International Conference on Computing Advancements
            January 2020
            517 pages
            ISBN:9781450377782
            DOI:10.1145/3377049

            Copyright © 2020 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 20 March 2020

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed limited

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader