CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Modified 3-D Playfair Stream Cipher

by Sagar Gurnani, Nitish Mhalgi, Samyukta Iyer, Deepika Dixit
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 84 - Number 15
Year of Publication: 2013
Authors: Sagar Gurnani, Nitish Mhalgi, Samyukta Iyer, Deepika Dixit
10.5120/14649-2904

Sagar Gurnani, Nitish Mhalgi, Samyukta Iyer, Deepika Dixit . Modified 3-D Playfair Stream Cipher. International Journal of Computer Applications. 84, 15 ( December 2013), 1-3. DOI=10.5120/14649-2904

@article{ 10.5120/14649-2904,
author = { Sagar Gurnani, Nitish Mhalgi, Samyukta Iyer, Deepika Dixit },
title = { Modified 3-D Playfair Stream Cipher },
journal = { International Journal of Computer Applications },
issue_date = { December 2013 },
volume = { 84 },
number = { 15 },
month = { December },
year = { 2013 },
issn = { 0975-8887 },
pages = { 1-3 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume84/number15/14649-2904/ },
doi = { 10.5120/14649-2904 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:00:58.200788+05:30
%A Sagar Gurnani
%A Nitish Mhalgi
%A Samyukta Iyer
%A Deepika Dixit
%T Modified 3-D Playfair Stream Cipher
%J International Journal of Computer Applications
%@ 0975-8887
%V 84
%N 15
%P 1-3
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The purpose of this algorithm is to offer heightened security for data transmission. The data may include any alphabet, numerals, or special characters. This work proposes an improved version of a 3-D Playfair cipher, by improving the complexity of encryption and decryption. The algorithm uses a 5x5 key matrix for encoding, which not only increases the complexity by providing each character with three-dimensional uniqueness, but also eliminates the idea of dummy characters required in other versions of this cipher. One can consider various types of cryptography attacks and comparisons of the resistance offered by the proposed algorithm with the resistance offered by existing algorithms to judge its practicality.

References
  1. William Stallings, Cryptography and Network Security, principles and practices, 4th Edition.
  2. Reference: Matt J. B. Rob Shaw, Stream Ciphers Technical Report TR-701, version 2. 0, RSA Laboratories, 1995.
  3. Amandeep Kaur, Harsh Kumar Verma and Ravindra Kumar Singh. Article: 3D(4 X 4 X 4) - Playfair Cipher. International Journal of Computer Applications 51(2):36-38, August 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Playfair Cipher Security 3D Cube