CFP last date
20 January 2025
Reseach Article

Modified Playfair Cipher using Rectangular Matrix

by Sanjay Basu, Utpal Kumar Ray
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 46 - Number 9
Year of Publication: 2012
Authors: Sanjay Basu, Utpal Kumar Ray
10.5120/6939-9332

Sanjay Basu, Utpal Kumar Ray . Modified Playfair Cipher using Rectangular Matrix. International Journal of Computer Applications. 46, 9 ( May 2012), 28-30. DOI=10.5120/6939-9332

@article{ 10.5120/6939-9332,
author = { Sanjay Basu, Utpal Kumar Ray },
title = { Modified Playfair Cipher using Rectangular Matrix },
journal = { International Journal of Computer Applications },
issue_date = { May 2012 },
volume = { 46 },
number = { 9 },
month = { May },
year = { 2012 },
issn = { 0975-8887 },
pages = { 28-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume46/number9/6939-9332/ },
doi = { 10.5120/6939-9332 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:39:19.902228+05:30
%A Sanjay Basu
%A Utpal Kumar Ray
%T Modified Playfair Cipher using Rectangular Matrix
%J International Journal of Computer Applications
%@ 0975-8887
%V 46
%N 9
%P 28-30
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

One of the well known polyalphabetic ciphers is the Playfair cipher. In this cipher digrams or groups of 2 letters in the plain text is converted to cipher text digrams during encryption using a key. Similarly during decryption cipher text digrams are converted to plain text digrams using the same key. However the original 5 x 5 Playfair cipher can support only 25 uppercase alphabets. To overcome this drawback we propose a rectangular matrix having 10 columns and 9 rows which can support almost all the printable characters including white space. This paper analyses the original Playfair cipher, the different variations that have been proposed and the modified Playfair cipher that we propose. Cryptanalysis is done to show that the proposed cipher is a strong one.

References
  1. Behrouz A. Forouzan, Cryptography and Network Security. Special Indian Edition 2007, Tata McGraw- Hill Publishing Company Limited, New Delhi.
  2. Wikipedia (http://en. wikipedia. org/wiki/Playfair_cipher)
  3. William Stallings, Cryptography and Network Security Principles and Practices, 4th Edition, Pearson Education.
  4. Atul Kahate, Cryptography and Network Security, 2nd Ed. , Tata McGraw-Hill Publishing Company Limited, New Delhi.
  5. Ravindra Babu K, S. Uday Kumar, A. Vinay Babu, I. V. N. S Aditya , P. Komuraiah "An Extension to Traditional Playfair Cryptographic Method", International Journal of Computer Applications (0975 – 8887) Volume 17– No. 5, March 2011.
  6. Shiv Shakti Srivastava, Nitin Gupta "A Novel Approach to Security using Extended Playfair Cipher", International Journal of Computer Applications (0975 – 8887) Volume 20– No. 6, April 2011
  7. Gaurav Agrawal, Saurabh Singh, Manu Agarwal "An Enhanced and Secure Playfair Cipher by Introducing the Frequency of Letters in any Plain text", Journal of Current Computer Science and Technology Vol. 1 Issue 3
  8. 10-16
  9. Packirisamy Murali and Gandhidoss Senthilkumar "Modified Version of Playfair Cipher using Linear Feedback Shift Register", IJCSNS International Journal of Computer Science and Network Security, VOL. 8 No. 12, December 2008
  10. Harinandan Tunga, Soumen Mukherjee "A New Modified Playfair Algorithm Based On Frequency Analysis", International Journal of Emerging Technology and Advanced Engineering, (ISSN 2250-2459, Volume 2, Issue 1, January 2012)
  11. V. Umakanta Sastry, N. Ravi Shankar, and S. Durga Bhavani "A Modified Playfair Cipher Involving Interweaving and Iteration", International Journal of Computer Theory and Engineering, Vol. 1, No. 5, December, 2009 1793-8201
Index Terms

Computer Science
Information Sciences

Keywords

Playfair Cipher Polyalphabetic Cipher Special Symbols Cryptanalysis Rectangular Matrix