CFP last date
20 December 2024
Reseach Article

Novel Modified Playfair Cipher using a SquareMatrix

by Harinandan Tunga, Arnab Saha, Akash Ghosh, Swashata Ghosh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 101 - Number 12
Year of Publication: 2014
Authors: Harinandan Tunga, Arnab Saha, Akash Ghosh, Swashata Ghosh
10.5120/17739-3854

Harinandan Tunga, Arnab Saha, Akash Ghosh, Swashata Ghosh . Novel Modified Playfair Cipher using a SquareMatrix. International Journal of Computer Applications. 101, 12 ( September 2014), 16-21. DOI=10.5120/17739-3854

@article{ 10.5120/17739-3854,
author = { Harinandan Tunga, Arnab Saha, Akash Ghosh, Swashata Ghosh },
title = { Novel Modified Playfair Cipher using a SquareMatrix },
journal = { International Journal of Computer Applications },
issue_date = { September 2014 },
volume = { 101 },
number = { 12 },
month = { September },
year = { 2014 },
issn = { 0975-8887 },
pages = { 16-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume101/number12/17739-3854/ },
doi = { 10.5120/17739-3854 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:31:29.144383+05:30
%A Harinandan Tunga
%A Arnab Saha
%A Akash Ghosh
%A Swashata Ghosh
%T Novel Modified Playfair Cipher using a SquareMatrix
%J International Journal of Computer Applications
%@ 0975-8887
%V 101
%N 12
%P 16-21
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper is about encryption and decryption of text using a secret password provided by the user. The encryption machine takes the password and source message as input and generates acipher text based on Modified Playfair Algorithm using dynamic rectangular matrix. The decryption machine takes the same password and the cipher text generated by the encryption engine as input to produce the original message. It also checks if the input is valid and blocks the user when an invalid input is provided. In this paper the entire program will be simulated by using an PHP application.

References
  1. Harinandan Tunga, Soumen Mukherjee "A New Modified Playfair Algorithm Based On Frequency Analysis", International Journal of Emerging Technology and Advanced Engineering, (ISSN 2250-2459, Volume 2, Issue 1, January 2012)
  2. V. Umakanta Sastry, N. Ravi Shankar, and S. Durga Bhavani "A Modified Playfair Cipher Involving Interweaving and Iteration", International Journal of Computer Theory and Engineering, Vol. 1, No. 5, December, 2009 1793-8201
  3. William Stallings, Cryptography and Network Security Principles and Practices, 4th Edition, Pearson Education.
  4. Atul Kahate, Cryptography and Network Security, 2nd Ed. , Tata McGraw-Hill Publishing Company Limited, New Delhi.
  5. Ravindra Babu K, S. Uday Kumar, A. Vinay Babu, I. V. N. S Aditya , P. Komuraiah "An Extension to Traditional Playfair Cryptographic Method", International Journal of Computer Applications (0975 – 8887) Volume 17– No. 5, March 2011.
  6. Shiv Shakti Srivastava, Nitin Gupta "A Novel Approach to Security using Extended Playfair Cipher", International Journal of Computer Applications (0975 – 8887) Volume 20– No. 6, April 2011
  7. Gaurav Agrawal, Saurabh Singh, Manu Agarwal "An Enhanced and Secure Playfair Cipher by Introducing the Frequency of Letters in any Plain text", Journal of Current Computer Science and Technology Vol. 1 Issue 3
  8. 10-16
  9. Packirisamy Murali and Gandhidoss Senthilkumar "Modified Version of Playfair Cipher using Linear Feedback Shift Register", IJCSNS International Journal of Computer Science and Network Security, VOL. 8 No. 12, December 2008
  10. Behrouz A. Forouzan, Cryptography and Network Security. Special Indian Edition 2007, Tata McGraw- Hill Publishing Company Limited, New Delhi.
  11. Sanjay Basu and Utpal Kumar Ray "Modified Playfair Cipher using Rectangular Matrix", IJCA International Journal of Computer Applications, Volume 46- No. 9, May 2012
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Encryption and Decryption Modified Playfair Algorithm using dynamic rectangular matrix Playfair Cipher