CFP last date
22 July 2024
Call for Paper
August Edition
IJCA solicits high quality original research papers for the upcoming August edition of the journal. The last date of research paper submission is 22 July 2024

Submit your paper
Know more
Reseach Article

An Extended Version of Four-Square Cipher using 10 X 10 Matrixes

by J. Aishwarya, V. Palanisamy, K. Kanagaram
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 97 - Number 21
Year of Publication: 2014
Authors: J. Aishwarya, V. Palanisamy, K. Kanagaram
10.5120/17129-7615

J. Aishwarya, V. Palanisamy, K. Kanagaram . An Extended Version of Four-Square Cipher using 10 X 10 Matrixes. International Journal of Computer Applications. 97, 21 ( July 2014), 9-13. DOI=10.5120/17129-7615

@article{ 10.5120/17129-7615,
author = { J. Aishwarya, V. Palanisamy, K. Kanagaram },
title = { An Extended Version of Four-Square Cipher using 10 X 10 Matrixes },
journal = { International Journal of Computer Applications },
issue_date = { July 2014 },
volume = { 97 },
number = { 21 },
month = { July },
year = { 2014 },
issn = { 0975-8887 },
pages = { 9-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume97/number21/17129-7615/ },
doi = { 10.5120/17129-7615 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:24:41.884362+05:30
%A J. Aishwarya
%A V. Palanisamy
%A K. Kanagaram
%T An Extended Version of Four-Square Cipher using 10 X 10 Matrixes
%J International Journal of Computer Applications
%@ 0975-8887
%V 97
%N 21
%P 9-13
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Now-a-days web based attacks is an issue in the internet data transmission. Many cryptographic algorithms are developed to secure the data over the communication. The existing algorithm uses alphabets only. In this paper, we proposed an algorithm which uses an innovative Cryptographic Digraph Substitution method to provide a stronger cipher for the network security. The proposed method uses 10x10 matrices that extended to lowercase, symbols and ASCII values. Hence our algorithm is more secure where the intruders could not able to suspect the data.

References
  1. Andrew S. Tanenbaum, Computer Networks, 5th edition, Pearson Education, ISBN-10: 0132553171.
  2. Behrouz A. Forouzan, "Data Communications and Networking", 4th ed. , McGraw-Hills, 2006. Tunga1, H. , Mukherjee, S. (2012),
  3. "A New Modified Playfair Algorithm Based On Frequency Analysis", International Journal of Emerging Technology and Advanced Engineering, ISSN 2250-2459, Volume 2, Issue 1, January 2012.
  4. Gaurav Shrivastava, Manoj Chauhan, Manoj Dhawan, "A Modified Version Of Extended Plafair Cipher (8x8)", in International Journal of Engineering and Computer Science, Vol2, Issue 4, April 2013, pp: 956-961.
  5. Gulshan Soni, Umesh Gupta, Nikhil Singh, "Analysis of Modified Substitution Encryption Techniques", PP: 643-647.
  6. Hans Delfs and Helmut Knebl, "Introduction to Cryptography: Principles and Applications", Springer International Edition.
  7. Jitendra Choudhary, Ravindra Kumar Gupta, Shailendra Singh, "A Survey of Existing Playfair Ciphers", International Journal of Engineering and Advanced Technology", Vol 2, issue 4.
  8. Ravindra Babu Kallam, Dr. S. Udaya Kumar, Dr. A. Vinaya Babuushi, "A New Framework for Scalable Secure Block Cipher Generation using Color Substitution and Permutation on Characters, Numbers, Images and Diagrams". International Journal of Computer Applications (0975 – 8887) vol. 20, no. 5, April 2011
  9. Ravindra, K. , Kumar, S. , Vinay A. ,Aditya V. S. , Komuraiah P. (2011),An Extension to Traditional Playfair Cryptographic Method, International Journal of Computer Applications Ravindra, K. , Kumar, S. , Vinay A. ,Aditya V. S. , Komuraiah P. (2011),An Extension to Traditional Playfair Cryptographic Method, International Journal of Computer Applications (0975 –8887),Vol. 17 No. 5,March 2011.
  10. M. Sonka, V. Hlavac. And R. Boyle, "Digital image processing," in: image Processing, Analysis, and Machine Vision, 1998, 2nd Ed.
  11. Tunga1, H. , Mukherjee, S. (2012)," A New Modified Playfair Algorithm Based On Frequency Analysis, International Journal of Emerging Technology and Advanced Engineering, ISSN 2250-2459, Volume 2, Issue 1, January 2012 .
  12. V. Potdar and E. chang, "Disguising text cryptography using Image cryptography", International Network Conference in plumouth, UK, 6-9, July, 2004.
  13. William Stallings, "Cryptography and Network Security: Principles and Practice", 4th Edition, Prentice Hall, 2006.
  14. Zirra Peter Buba & Gregory Maksha Wajiga "Cryptographic Algorithms for Secure Data Communication", International "in International Journal of Computer Science and Security IJCSS, Volume no 5, Issue 2.
Index Terms

Computer Science
Information Sciences

Keywords

Four-square cipher Substitution Digraph Encryption Decryption