We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Improvement of 16X16 Playfair Cipher using Random Number Generator

by Shivangi Sharma, Shubhda Shamhavi, Saurabhi Chaudhary, Amreen Khan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 94 - Number 1
Year of Publication: 2014
Authors: Shivangi Sharma, Shubhda Shamhavi, Saurabhi Chaudhary, Amreen Khan
10.5120/16304-5527

Shivangi Sharma, Shubhda Shamhavi, Saurabhi Chaudhary, Amreen Khan . Improvement of 16X16 Playfair Cipher using Random Number Generator. International Journal of Computer Applications. 94, 1 ( May 2014), 1-8. DOI=10.5120/16304-5527

@article{ 10.5120/16304-5527,
author = { Shivangi Sharma, Shubhda Shamhavi, Saurabhi Chaudhary, Amreen Khan },
title = { Improvement of 16X16 Playfair Cipher using Random Number Generator },
journal = { International Journal of Computer Applications },
issue_date = { May 2014 },
volume = { 94 },
number = { 1 },
month = { May },
year = { 2014 },
issn = { 0975-8887 },
pages = { 1-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume94/number1/16304-5527/ },
doi = { 10.5120/16304-5527 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:16:24.141920+05:30
%A Shivangi Sharma
%A Shubhda Shamhavi
%A Saurabhi Chaudhary
%A Amreen Khan
%T Improvement of 16X16 Playfair Cipher using Random Number Generator
%J International Journal of Computer Applications
%@ 0975-8887
%V 94
%N 1
%P 1-8
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper deals with the modification of Playfair cipher. The existing methods of Playfair cipher have been studied such as those implemented on 5X5, 7X4 and 6X6 Playfair matrix. The study of existing methods shows that they suffer from several drawbacks such as limited matrix size, limited key size, prone to brute force attack and frequency analysis. In this paper, the presented encryption mechanism makes the cryptanalysis a very complex process. This has been achieved by first, inserting all the 256 ASCII characters in a sequential order within a 16X16 matrix and second, by changing the rotation mechanism for encryption and decryption. The encrypted text obtained is almost unreadable.

References
  1. Andrew S. Tanenbaum, Networks Computer, 5th edition, Pearson Education, ISBN-10: 0132553171.
  2. William Stallings, "Cryptography and Network Security Principles and Practice", 4th Edition, Prentice Hall,2006.
  3. Aftab Alam, Sehat Ullah, Ishtiaq Wahid, & Shah Khalid "Universal Playfair Cipher Using MXN Matrix". International Jourrnal of Advanced Computer Science, Vol. 1, No. 3, Pp. 113-117, Sep. 2011.
  4. Ravindra Babu K, S. Uday Kumar, A. Vinay Babu, I. V. N. S. Aditya, P. Komuraiah, "An Extension to Traditional Playfair Cryptographic Method". International Journal of Computer Applications (0975 –8887), Volume 17- No. 5, March 2011.
  5. Muhammad Salam, Nasir Rashid, Shah Khalid, Muhammad Raees Khan, "A NXM Version of 5X5 Playfair Cipher for any Natural Language (Urdu as Special Case)". World Academy of Science, Engineering and Technology 73 2011.
  6. A. Aftab Alam, B. Shah Khalid, and C. Muhammad Salam, "A Modified Version of Playfair Cipher Using 7×4 Matrix". International Journal of Computer Theory and Engineering, Vol. 5, No. 4, August 2013.
  7. S. S. Dhenakaran, M. Ilayaraja, "Extension of Playfair Cipher using 16X16 Matrix". International Journal of Computer Applications (0975 – 888) Volume 48– No. 7, June 2012.
  8. Arvind Kumar, Pawan Singh Mehra, Gagan Gupta, Aatif Jamshed, "Modified Block Playfair Cipher using Random Shift Key Generation". International Journal of Computer Applications (0975 – 8887) Volume 58– No. 5, November 2012 .
Index Terms

Computer Science
Information Sciences

Keywords

Playfair Cipher Substitution Cryptography Network Security Symmetric Key.