CFP last date
20 January 2025
Reseach Article

An Extension to Traditional Playfair Cryptographic Method

by Ravindra Babu K, S. Uday Kumar, A. Vinay Babu, I.V.N.S Aditya, P. Komuraiah
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 17 - Number 5
Year of Publication: 2011
Authors: Ravindra Babu K, S. Uday Kumar, A. Vinay Babu, I.V.N.S Aditya, P. Komuraiah
10.5120/2213-2814

Ravindra Babu K, S. Uday Kumar, A. Vinay Babu, I.V.N.S Aditya, P. Komuraiah . An Extension to Traditional Playfair Cryptographic Method. International Journal of Computer Applications. 17, 5 ( March 2011), 34-36. DOI=10.5120/2213-2814

@article{ 10.5120/2213-2814,
author = { Ravindra Babu K, S. Uday Kumar, A. Vinay Babu, I.V.N.S Aditya, P. Komuraiah },
title = { An Extension to Traditional Playfair Cryptographic Method },
journal = { International Journal of Computer Applications },
issue_date = { March 2011 },
volume = { 17 },
number = { 5 },
month = { March },
year = { 2011 },
issn = { 0975-8887 },
pages = { 34-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume17/number5/2213-2814/ },
doi = { 10.5120/2213-2814 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:04:50.566959+05:30
%A Ravindra Babu K
%A S. Uday Kumar
%A A. Vinay Babu
%A I.V.N.S Aditya
%A P. Komuraiah
%T An Extension to Traditional Playfair Cryptographic Method
%J International Journal of Computer Applications
%@ 0975-8887
%V 17
%N 5
%P 34-36
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The theme of our research is to provide security for the data that contains alphanumeric values during its transmission. The best known multiple letter encryption cipher is the play fair, which treats the plain text as single units and translates these units into cipher text. It is highly difficult to the intruder to understand or to decrypt the cipher text. In this we discussed about the existing play fair algorithm, its merits and demerits. The existing play fair algorithm is based on the use of a 5 X 5 matrix of letters constructed using a keyword. This algorithm can only allow the text that contains alphabets only. For this we have proposed an enhancement to the existing algorithm, that a 6 X 6 matrix can be constructed.

References
  1. Derek Bruff, Ph.D, The Playfair Cipher Revealed Wynne MLAS 280-07 Cryptography July 13, 2009.
  2. Dr. Bruff, Playfair Cipher. FYWS Cryptology October 27, 2010.
  3. Kallam Ravindra Babu, Dr. S.Udaya Kumar, Dr. A.Vinaya Babu, A Survey on Cryptography and Steganography Methods for Information Security. International Journal of Computer Applications (0975 – 8887) Volume 12– No.2, November 2010
  4. Samir Kumar Bandyopadhyay, Tuhin Utsab Paul and Avishek Raychoudhury, Genetic Algorithm Based Substitution Technique of Image Steganography. Volume 1, No. 5, December 2010. Journal of Global Research in Computer Science Research Paper.
  5. V. Umakanta Sastry, N. Ravi Shankar, and S. Durga Bhavani, Modified Playfair Cipher Involving Interweaving and Iteration. International Journal of Computer Theory and Engineering, Vol. 1, No. 5, December, 2009. 1793-8201.
  6. V. Umakanta Sastry, N. Ravi Shankar, and S. Durga Bhavani, Modified Playfair Cipher for a Large Block of Plaintext. International Journal of Computer Theory and Engineering, Vol. 1, No. 5, December, 2009.
  7. William Stallings, Cryptography and Network Security, 5th impression, 2008.
  8. Kallam Ravindra Babu, Dr. S.Udaya Kumar, Dr. A.Vinaya Babu, An improved Playfair Cipher Cryptographic Substitution Algorithm, IJARCS, Volume 2, No-1, January -February-2011,pages:211to214.
Index Terms

Computer Science
Information Sciences

Keywords

Substitution Transposition