ABSTRACT
Researchers have shown great interest in expanding and modifying the Playfair Cipher algorithm to overcome its pre-existing demerits. An explosion of research in cryptography for Playfair cipher occurred the last decade. While the inability of encrypting numeric characters exists in traditional Playfair Cipher, the algorithm is incompatible with many present technologies. Even for the encryption of a proper information in the form of human expressions, encryption of spaces between the words is needed as post processing of the decrypted message remains confusing without the feature. This paper proposes a modification of Playfair Cipher which is able to encrypt alphanumeric characters as well as spaces. The paper reaches the goal by modifying the dimension of the key matrix from 5 by 5 to 6 by 6 and introducing a method to replace spaces with configured digraphs from the generated key matrix. It is believed that introducing the mentioned features can prevent frequency attacks in Playfair Cipher. In this era of Internet of Things, the small devices need algorithms with lower memory consumption. Updated Playfair cipher can be implemented to aid to that.
- Fred Cohen. 1995. Introductory Information Protection (1st. ed.).Google Scholar
- Howard Poston and Keshav Dhandhania. 2001. The Playfair Cipher (2001). Retrieved May 5, 2019 from https://www.commonlounge.com/discussion/350ac6f155ba48ecbd0fb8fd38e2f205Google Scholar
- Lexico. Which Letters In The Alphabet Are Used Most Often? Retrieved from https://www.lexico.com/en/explore/which-letters-are-used-mostGoogle Scholar
- Krishnaraj Bhat, Dindayal Mahto and Dilip Kumar 2017. Information Security using Adaptive Multidimensional Playfair Cipher, International Journal of Advanced Research in Computer Science, 8 (5), (June 2017), 372--380. http://dx.doi.org/10.26483/ijarcsGoogle ScholarCross Ref
- Ashish Pandey and Neelendra Badal 2019. A Modified Circular Version of Playfair Cipher, 2nd International Conference on Advanced Computing and Software Engineering (ICACSE-2019), 535--538. https://doi.org/10.2139/ssrn.3351022Google ScholarCross Ref
- Madeha Shaltagh Yousif Raghad Kadhim Salih and Nadia Mohamed Ghanim Alsaidi, A new modified Playfair Cipher 2019. AIP Conference Proceedings 2086, 030047 (April 2019). https://doi.org/10.1063/1.5095132Google ScholarCross Ref
- Krishnaraj Bhat, Dindayal Mahto and Dilip Kumar Yadav 2017. A Novel Approach to Information Security Using Four Dimensional (4d) Playfair Cipher Fused With Linear Feedback Shift Register, Indian Journal of Computer Science and Engineering, Vol 8, (February 2017), 15--32. http://dx.doi.org/10.21817/indjcseGoogle ScholarCross Ref
- Swati Hans, Rahul Johari, Vishakha Gautam, 2014. An Extended PlayFair Cipher using Rotation and Random Swap patterns, 5th IEEE International Conference on Computer and Communication Technology, (September 2014). 155--160. https://doi.org/10.1109/ICCCT.2014.7001485Google ScholarCross Ref
- Assia Merzoug, Adda Ali Pacha and Naima Hadj Said 2017. New Approach of the Playfair's Cipher with a Numerical Value of the Keyword, Indonesian Journal of Electrical Engineering and Computer Science. Vol 6(3), (June 2017), 695--703. https://doi.org/10.11591/ijeecsGoogle ScholarCross Ref
- Muhammad Syahrizal, Murdani, Surya Darma Nasution, Mesran, Robbi Rahim and Andysah Putera Utama Siahaan 2017. Modified Playfair Cipher Using Random Key Linear Congruent Method, The International Seminar: Research For Science, Technology And Culture. Vol 19 (October 2017) 25--29Google Scholar
- Kalaichelvi V, Manimozhi K, Meenakshi P, Rajakumar B, Vimala Devi P 2017. An Adaptive Play fair Cipher Algorithm for Secure Communication Using Radix 64 Conversion, International Journal of Pure and Applied Mathematics Vol 117(20) (2017), 325--330Google Scholar
- Md Masuduzzaman, Ashik Mahmud, Anik Islam, Md. Mofijul Islam "Two Phase Authentication and VPN Based Secured Communication for IoT Home Networks". [In Press]Google Scholar
- M. Schmidt 2013. Raspberry Pi - A Quick Start Guide, the Pragmatic BookshelfGoogle Scholar
- M. Richardson and S. Wallace 2013. Getting started with Raspberry Pi, O'Reilly, USA,Google Scholar
- Mirjana Maksimović, Vladimir Vujović, Nikola Davidović, Vladimir Milošević and Branko Perišić 2015. Raspberry Pias Internet of Things hardware: Performances and Constraints, 1st International Conference on Electrical, Electronic and Computing Engineering. (June 2015)Google Scholar
- D. Uckelmann, M. Harrison, F. Michahelles 2011. Architecting the Internet of Things, SpringerGoogle Scholar
Index Terms
- An Effective Modification of Play Fair Cipher with Performance Analysis using 6X6 Matrix
Recommendations
An efficient binary playfair algorithm using a 4×4 playfair key matrix
CISIM'12: Proceedings of the 11th IFIP TC 8 international conference on Computer Information Systems and Industrial ManagementPlayfair cipher is a digraph cipher which is not preferred now a day for two main reasons. Firstly, it can be easily cracked if there is enough text and secondly, frequency analysis of digraph is anyway possible. This paper proposes a new solution, ...
Algorithm of cipher text containing key to produce cipher text transmitted in network security
AIKED'07: Proceedings of the 6th Conference on 6th WSEAS Int. Conf. on Artificial Intelligence, Knowledge Engineering and Data Bases - Volume 6A plaintext is separated into two parts, a fixed length part and a variable length part. The second part of the plaintext is encrypted to a cipher text using a key. In this paper, an encryption algorithm which encrypts the first part of the plaintext ...
Security analysis of SIMECK block cipher against related-key impossible differential
AbstractSIMECK is a family of lightweight block ciphers that relies on Feistel structure. Being proposed at CHES in 2015, the round function of SIMECK is slightly modified from SIMON. A cipher in this family with K-bit key and n-bit block is ...
Highlights- For the first time, we present related-key impossible differential distinguishers for the variants of SIMECK.
Comments