Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

3D - Playfair Cipher with Message Integrity using MD5

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Authors:
Alok Kumar Chaturvedi, Vikram Rajput, Vineet Richarya
10.5120/ijca2016911266

Alok Kumar Chaturvedi, Vikram Rajput and Vineet Richarya. 3D - Playfair Cipher with Message Integrity using MD5. International Journal of Computer Applications 148(9):6-12, August 2016. BibTeX

@article{10.5120/ijca2016911266,
	author = {Alok Kumar Chaturvedi and Vikram Rajput and Vineet Richarya},
	title = {3D - Playfair Cipher with Message Integrity using MD5},
	journal = {International Journal of Computer Applications},
	issue_date = {August 2016},
	volume = {148},
	number = {9},
	month = {Aug},
	year = {2016},
	issn = {0975-8887},
	pages = {6-12},
	numpages = {7},
	url = {http://www.ijcaonline.org/archives/volume148/number9/25783-2016911266},
	doi = {10.5120/ijca2016911266},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

In growing digital world, Cryptography plays an important role to secure confidential information. The objective of the paper is to implement encryption and message digest of information. 3D (6X4X4) - Playfair cipher is multiple letter encryption cipher. In this, tri-graphs of plaintext are treated as single units and converted into corresponding cipher text tri-graphs. 3D (6X4X4) -Playfair cipher supports all 52 alphabets (upper and lower case), 10 digits and 34 special characters. The theme of research is to furnish security to data which contains alphabets numerals and special characters during transmission that’s why message-digest algorithm are introduced and applied on the cipher text of 3D-Playfair cipher with a random key. It makes use of alphabets both lower and uppercase characters, number and special characters for constructing the contents of the matrix.

References

  1.  3D - Playfair cipher with additional bitwise operation Amandeep Kaur, Harsh Kumar Verma and Ravindra Kumar Singh Control Computing Communication & Materials (ICCCCM), 2013 International Conference on Year: 2013
  2. 3D (6 X 4 X 4) - Playfair Cipher Nitin, Shubha Jain Department of Computer Science & Engineering, Kanpur Institute of Technology, Kanpur, India Year: 2014
  3. Amandeep Kaur, Harsh Kumar Verma and Ravindra Kumar Singh. Article: 3D (4 X 4 X 4) - Playfair Cipher. International Journal of Computer Applications 51(2):36-38, August 2012.
  4. Rivest, R., "The MD5 Message-Digest Algorithm," RFC-1321, MIT LCS and RSA Data Security, Inc., April 1992.
  5. Ming Hu, Yan Wang, “MD5-Based Error Detection”, Circuits, Communications and Systems, 2009. PACCS '09. Pacific-Asia Conference on Year: 2009
  6. Schneier B, 1994. The blowfish encryption algorithm. Dr. Dobbs J., 19: 38-40
  7. Menezes AJ, Oorschot PCV and Vanstone SA, Handbook of applied cryptography. Boca Raton, Florida, USA: CRC Press; 1997.
  8. J. A.Buchmann, Introduction to Cryptography. Second Edition, Springer –Verlag NY, LLC, 2001.
  9. D. R.Patel, Information Security Theory and Practice. First Edition, Prentice-Hall of India Private Limited, 2008.
  10. P. Murali, and G. Senthilkumar, Modified version of Playfair Cipher using linear feedback shift register, International Journal of Computer Science and Network Security, vol. 8, no. 12, 2008.
  11. S. S. Srivastava, N. Gupta and R.jaiswal“Modified Version of Playfair Cipher by using 8x8 Matrixand Random Number Generation” in Proceedings of IEEE3rd International Conference on Computer Modeling andSimulation (ICCMS 2011), Mumbai, pages 615-617,January, 2011.
  12. V.U.K. Sastry, N. Ravi Shankar and S. DurgaBhavan“ A Blending of A Generalized Playfair Cipher and A Modified Hill Cipher”,2011.
  13. B. Schnier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd ed., John Wiley and Sons, 1996.
  14. E. Biham and A. Shamir, “Differential Cryptanalysis of the Data Encryption Standard,” Springer Verlag, 1993. ISBN 0-387-97930-1.
  15. W. Stallings, Cryptography and Network Security Principles and Practice. Second edition, Pearson Education.
  16. B. A. Forouzan, Cryptography and Network Security. Special Indian Edition, The McGraw- Hill companies, New Delhi, 2007.

Keywords

3D Playfair Cipher, Encryption, Decryption, Classical Playfair, Plain Text, Ciphertext, Trigraph, Message-digest algorithm (MD5).