CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Dual Level Security for Key Exchange using Modified RSA Public Key Encryption in Playfair Technique

by Zubair Iqbal, Kamal Kr. Gola, Bhumika Gupta, Manisha Kandpal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 111 - Number 13
Year of Publication: 2015
Authors: Zubair Iqbal, Kamal Kr. Gola, Bhumika Gupta, Manisha Kandpal
10.5120/19596-1408

Zubair Iqbal, Kamal Kr. Gola, Bhumika Gupta, Manisha Kandpal . Dual Level Security for Key Exchange using Modified RSA Public Key Encryption in Playfair Technique. International Journal of Computer Applications. 111, 13 ( February 2015), 5-9. DOI=10.5120/19596-1408

@article{ 10.5120/19596-1408,
author = { Zubair Iqbal, Kamal Kr. Gola, Bhumika Gupta, Manisha Kandpal },
title = { Dual Level Security for Key Exchange using Modified RSA Public Key Encryption in Playfair Technique },
journal = { International Journal of Computer Applications },
issue_date = { February 2015 },
volume = { 111 },
number = { 13 },
month = { February },
year = { 2015 },
issn = { 0975-8887 },
pages = { 5-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume111/number13/19596-1408/ },
doi = { 10.5120/19596-1408 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:48:14.426746+05:30
%A Zubair Iqbal
%A Kamal Kr. Gola
%A Bhumika Gupta
%A Manisha Kandpal
%T Dual Level Security for Key Exchange using Modified RSA Public Key Encryption in Playfair Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 111
%N 13
%P 5-9
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The objective of this paper is to provide the dual level security for the key in playfair cipher using modified RSA digital signature scheme. This work has two phases, in the first phase the key is converted into the ASCII code and in the second phase, this work is using the concept of modified RSA digital signature scheme in which user authentication, data integrity and non-repudiation services are provided but as all know that in playfair technique, key exchange process is most important so there is a need to secure the key during key transfer that's why this work is using the concept of modified RSA public key encryption technique to encrypt the key before sending it to the receiver for decryption. This work use a 10*8 matrix which contain all alphabetic in the uppercase as well as in lowercase, the numeric value from 0 to 9, list of operator and list of bracket.

References
  1. William Stallings, "Cryptography and Network Security: Principles and Practice", 4th Edition, Prentice Hall, 2006.
  2. en. wikipedia. org/wiki/Playfair_cipher
  3. Atul Kahate, "Cryptography and Network Security", 2nd edition, McGraw-Hill, 2010.
  4. S. S. Dhenakaran, M. Ilayaraja, "Extension of PF Cipher using 16X16 Matrix", International Journal of Computer Applications (0975 – 888), Volume 48– No. 7, June 2012.
  5. Ravindra Babu K, S. Uday Kumar, A. Vinay Babu, I. V. N. S Aditya , P. Komuraiah, " An Extension to Traditional Playfair Cryptographic Method", International Journal of Computer Applications (0975 ± 8887) Volume 17± No. 5, March 2011.
  6. Shiv Shakti Srivastava and Nitin Gupta "A Novel Approach to Security using Extended Playfair Cipher", International Journal of Computer Applications (0975 ±8887) Volume 20± No. 6, April 2011.
  7. Sanjay Basu and Utpal Kumar Ray"Modified Playfair Cipher using Rectangular Matrix", International Journal of Computer Applications (0975 ± 8887) Volume 46± No. 9, May 2012.
  8. Nisarga Chand and Subhajit Bhattacharyya "A Novel Approach for Encryption of Text Messages Using PLAY -FAIR Cipher 6 by 6 Matrix with Four Iteration Steps" , International Journal of Engineering Science and Innovative Technology (2319-5967) Volume 3, Issue 1, January 2014.
  9. Zubair Iqbal, Bhumika Gupta, Kamal Kumar Gola and Prachi Gupta , " Enhanced the Security of Playfair Technique using Excess 3 Code (XS3) and Ceasar Cipher", IJCA( 0975 – 8887) Volume 103 – No 13, October 2014
  10. Surendra Singh Chauhan, Hawa Singh and Ram Niwas Gurjar, " Secure Key Exchange using RSA in Extended Playfair Cipher Technique", International Journal of Computer Applications (0975 – 8887) Volume 104 – No 15, October 2014
  11. Kamal Kumar Gola, Zubair Iqbal and Bhumika Gupta, "Modified RSA digital signature scheme for data confidentiality", IJCA( 0975 – 8887) Volume 106 – No 13, November 2014
Index Terms

Computer Science
Information Sciences

Keywords

Playfair cipher Plaintext cipher text rectangular matrix key encryption decryption public key private key ASCII code Modified RSA public key encryption technique.