Design and Analysis of Playfair Ciphers with Different Matrix Sizes

@article{Khan2015DesignAA,
  title={Design and Analysis of Playfair Ciphers with Different Matrix Sizes},
  author={Salman A. Khan},
  journal={International Journal of Computing},
  year={2015},
  volume={03},
  pages={117-122}
}
  • S. Khan
  • Published 1 September 2015
  • Computer Science
  • International Journal of Computing
Playfair cipher is an interesting data encryption technique with a medium level of complexity, and therefore, is suitable for security of wireless and mobile systems. [] Key Result However, the size of the key does have a notable effect and the exntrypion level increases with big keys of bigger sizes. Furthermore, increasing the size of the matrix provides better encryption results.

Figures and Tables from this paper

Novel Approach to Improvise the Play Fair Cipher

TLDR
The proposed method plays a 9 X 9 matrix giving strength to Playfair cipher, and makes use of alphabets both lower and uppercase characters, number, and special characters for constructing the contents of the matrix.

An approach to Improving Columnar Permutation Cipher for Wills in Distributed Systems of Law Firms

TLDR
A three layer permutation Cryptosystem using a modification of Transposition cipher and two layers content permutation for Wills to make columnar transposition more secure and relevant so that companies with low technology budget and know-how be secured from known cryptosystem attack.

An Improved Version of Playfair Technique

TLDR
This work proposes a technique that enhances the security of play fair technique using rectangular and substitution matrix that uses 8*8 matrices that contain alphabets, integers and special symbols during transmission.

An Improved 3d Playfair Cipher Key Matrix With Dual Cipher Block Chaining Method

TLDR
The intended improvement emphasizes on proposing a more secure secret key generation and enhancing the encryption scheme of the 3D Playfair cipher by utilizing a 4x8x8 key matrix that holds 256 ASCII characters and implements a dual Cipher Block Chaining method.

Implementation of Modified Playfair CBC Algorithm

TLDR
In this paper, the presented PlayfairCBC encryption mechanism makes the cryptanalysis complex, and the encrypted text obtained is almost unreadable.

Secure message transfer using RSA algorithm and improved playfair cipher in cloud computing

TLDR
This paper consists of three stages, the first stage includes encryption of text using playfair cipher of 9×6 matrix and continued with a XOR operation between the encrypted text and the encrypted key.

An Efficient Cryptosystem Using Playfair Cipher Together With Graph Labeling Techniques

TLDR
A fusion of the techniques Cryptography with Graph labeling provides ultimate security for secure transmission of data or information at various levels.

Modifying playfair cipher algorithm using KAJ spiral method to fit any language regardless of the number of characters

TLDR
This paper uses Friedman method analysis (index of coincidence) as a tool to test and prove the efficiency of KAJ Spiral method, and it is found that it is at least equally secure to the original PlayFair cipher.

Secure Data Transfer by Implementing Mixed Algorithms

TLDR
The mixed algorithm enriches the security strength of individual symmetric and asymmetric algorithms and yields good results in many parameters like message strength, key strength, encryption, and decryption time.

Light Weight Proactive Padding Based Crypto Security System in Distributed Cloud Environment

TLDR
The proposed LPP-CS algorithm improves the performance of cloud data security with less time complexity and chooses prime factors and keys suitable for any specific time window and has been iterated frequently.

References

SHOWING 1-10 OF 12 REFERENCES

Optimization and analysis of the extended Playfair cipher

  • Shiv Shakti SrivastavaN. Gupta
  • Computer Science, Mathematics
    2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)
  • 2011
TLDR
This paper analyses the new proposed 8*8 Playfair cipher and finds out that the proposed cipher is a strong one through the avalanche effect.

A Novel Approach for Encryption of Text Messages Using PLAYFAIR Cipher 6 by 6 Matrix with Four Iteration Steps

TLDR
To make the algorithm stronger here the authors use four iteration steps instead of one, and extend the matrix dimension 6 by 6, so that it can include numeric as well as I and J.

Universal Playfair Cipher Using MXN Matrix

TLDR
The original 5x5 matrix play fair cipher is modified to mxn matrix playfair cipher in which two symbols”*” and “#” are included, which creates one-to-one correspondence between the plain text and the Cipher text, which makes the encryption and decryption easy and unambiguous.

A Novel Implementation of an Extended 8x8 Playfair Cipher Using Interweaving on DNA-encoded Data

  • S. Hamad
  • Computer Science, Mathematics
  • 2014
TLDR
The proposed method showed a number of advantages including the ability to cipher any type of digital media, the elimination of plain-text preprocessing step, and the applicability to be integrated into larger security systems such as DNA steganography.

Modified Version of Playfair Cipher Using Linear Feedback Shift Register

TLDR
A new approach for secure transmission of message by modified version of Playfair cipher combining with Random number generator methods, which rapidly increases security of the transmission over an unsecured channel.

Cryptography Playfair Cipher using Linear Feedback Shift Register

TLDR
A new approach for secure transmission of message by modified version of Play fair cipher combining with Random number generator methods, which rapidly increases security of the transmission over an unsecured channel.

Security engineering - a guide to building dependable distributed systems (2. ed.)

TLDR
In almost 600 pages of riveting detail, Ross Anderson warns us not to be seduced by the latest defensive technologies, never to underestimate human ingenuity, and always use common sense in defending valuables.

Breaking Short Playfair Ciphers with the Simulated Annealing Algorithm

TLDR
Adaptation of simulated annealing to solve short playfair ciphers (80–120 letters) without using a probable word is described.