CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Novel Approach to Security using Extended Playfair Cipher

by Shiv Shakti Srivastava, Nitin Gupta
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 20 - Number 6
Year of Publication: 2011
Authors: Shiv Shakti Srivastava, Nitin Gupta
10.5120/2435-3276

Shiv Shakti Srivastava, Nitin Gupta . A Novel Approach to Security using Extended Playfair Cipher. International Journal of Computer Applications. 20, 6 ( April 2011), 39-43. DOI=10.5120/2435-3276

@article{ 10.5120/2435-3276,
author = { Shiv Shakti Srivastava, Nitin Gupta },
title = { A Novel Approach to Security using Extended Playfair Cipher },
journal = { International Journal of Computer Applications },
issue_date = { April 2011 },
volume = { 20 },
number = { 6 },
month = { April },
year = { 2011 },
issn = { 0975-8887 },
pages = { 39-43 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume20/number6/2435-3276/ },
doi = { 10.5120/2435-3276 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:07:05.890495+05:30
%A Shiv Shakti Srivastava
%A Nitin Gupta
%T A Novel Approach to Security using Extended Playfair Cipher
%J International Journal of Computer Applications
%@ 0975-8887
%V 20
%N 6
%P 39-43
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The well known multiple letter encryption cipher is the Playfair cipher. Here the digrams in the plaintext are treated as single units and converted into corresponding cipher text digrams. However because of the drawbacks inherent in the 5*5 Playfair cipher which adversely affects the security we proposed an 8*8 Playfair cipher. For details one can refer to [1]. This paper analyses the new proposed system. For this we have carried out cryptanalysis and through the avalanche effect we find out that the proposed cipher is a strong one.

References
  1. Shiv Shakti Srivastava, Nitin Gupta and Rajaram jaiswal “Modified Version of Playfair Cipher by using 8x8 Matrix and Random Number Generation” in Proceedings of IEEE 3rd International Conference on Computer Modeling and Simulation (ICCMS 2011), Mumbai, pages 615-617, January, 2011.
  2. William Stallings, Cryptography and Network Security Principles and Practice. Second edition, Pearson Education.
  3. Mohit Kumar, Reena Mishra, Rakesh Kumar Pandey and Poonam Singh “Comparing Classical Encryption With Modern Techniques”in proceedings of S-JPSET, Vol. 1, Issue 1,2010
  4. Packirisamy Murali and Gandhidoss Senthilkumar, Modified version of Playfair cipher using Linear Feedback Shift Cipher, International Conference on Information Management and Engineering ICIME,pp.488-490,2009.
  5. Johannes A.Buchmann, Introduction to Cryptography.Second Edition, Springer –Verlag NY, LLC, 2001.
  6. Behrouz A. Forouzan, Cryptography and Network Security. Special Indian Edition, The McGraw- Hill companies, New Delhi,2007.
  7. Dhiren R.Patel, Information Security Theory and Practice. First Edition, Prentice-Hall of India Private Limited, 2007
Index Terms

Computer Science
Information Sciences

Keywords

Playfair cipher matrices Special symbols Random number crptanalysis brute force Polyalphabetic cipher.