We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Modified Block Playfair Cipher using Random Shift Key Generation

by Arvind Kumar, Pawan Singh Mehra, Gagan Gupta, Aatif Jamshed
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 58 - Number 5
Year of Publication: 2012
Authors: Arvind Kumar, Pawan Singh Mehra, Gagan Gupta, Aatif Jamshed
10.5120/9277-3466

Arvind Kumar, Pawan Singh Mehra, Gagan Gupta, Aatif Jamshed . Modified Block Playfair Cipher using Random Shift Key Generation. International Journal of Computer Applications. 58, 5 ( November 2012), 10-13. DOI=10.5120/9277-3466

@article{ 10.5120/9277-3466,
author = { Arvind Kumar, Pawan Singh Mehra, Gagan Gupta, Aatif Jamshed },
title = { Modified Block Playfair Cipher using Random Shift Key Generation },
journal = { International Journal of Computer Applications },
issue_date = { November 2012 },
volume = { 58 },
number = { 5 },
month = { November },
year = { 2012 },
issn = { 0975-8887 },
pages = { 10-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume58/number5/9277-3466/ },
doi = { 10.5120/9277-3466 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:02:10.804032+05:30
%A Arvind Kumar
%A Pawan Singh Mehra
%A Gagan Gupta
%A Aatif Jamshed
%T Modified Block Playfair Cipher using Random Shift Key Generation
%J International Journal of Computer Applications
%@ 0975-8887
%V 58
%N 5
%P 10-13
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper conventional Playfair Cipher is being modified by encrypting the plaintext in blocks. For each block the keyword would be the same but the matrix will shift by some random value. As a result of which the diagram analysis would be very difficult which is done in the traditional Playfair Cipher to obtain the plaintext from the ciphertext. The shift value will be generated using SHA-1 which is very secure. Playfair Cipher method, based on polyalphabetic cipher is relatively easy to break because it still leaves much of the structure and a few hundred of letters of ciphertext are sufficient. To add to its security and to make it more usable we are using 6x6 matrix instead of 5x5 which will be able to cover 26 alphabets in English and ten numerals i. e. from 0 to 9. This 6x6 matrix eliminate the case of putting of 2 alphabets (I and J) together in the matrix as it was in the 5x5 matrix. Plaintext as well as key can be numeral, alphabetic or combination of both.

References
  1. William Stallings, Cryptography and Network Security Principles and Practice. Second edition, Pearson Education.
  2. Security Aspects of the Extended Playfair Cipher ,Srivastava, S. S. ; Gupta, N . ; Communication Systems and network Technologies (CSNT), 2011 International Conference on Digital Object ,Publication Year: 2011 , Page(s): 144 - 147 ,IEEE Conferences
  3. Modified Version of Playfair Cipher Using Linear Feedback Shift Register Murali, P. ; Senthilkumar, G. ; Information Management and Engineering, 2009. ICIME '09. International Conference on Digital Object Identifier: Publication Year: 2009 , Page(s): 488 - 490 ,IEEE Conference
  4. Java Cryptography, Jonathan B. Knudsen First Edition May 1998 ISBN
  5. A Novel Approach to Security using Extended Playfair Cipher, International Journal of Computer Applications (0975 – 8887)Volume 20– No. 6, April 2011 Shiv Shakti Srivastava, Nitin Gupta Department of Computer Science and Engineering Department of Computer Science and Engineering National Institute of Technology Hamirpur, India
  6. Johannes A. Buchmann, Introduction to Cryptography. Second Edition,Springer-Verlag NY, LLC,2001.
  7. Dhiren R. Patel, Information Security Theory and Practice. First Edition, Prentice-Hall of India Private Limited,2008
  8. Anne-Canteaut(Editor)"Ongoing Research Area in Symmentic Cryptography"ENCRYPT,2006.
  9. Schnier B, Applied cryptography:protocols,algorithms and source code in C. New York:John Wiley and sons,1996.
Index Terms

Computer Science
Information Sciences

Keywords

Playfair Cipher Random number SHA-1 Polyalphabetic cipher