Enhanced Security by Modifying Playfair Cipher
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Information Technology | India | Volume 6 Issue 12, December 2017

Enhanced Security by Modifying Playfair Cipher

Amandeep Kaur, Tanisha Jain, Gurjyot Singh

Cryptography is the way and research of concealing information. It is basically a mathematical way to keep information safe and unthreatened. Nowadays, storage systems are increasingly subject to attacks. So, cryptography is a means of security and protection from harm.Cryptography is achieved by using various ciphers, in this paper we have studied the playfair cipher and have generated a comparison in timings of bruteforce attack on a normal playfair versus a modified playfair.

Keywords: Cipher, Playfair Cipher, Substitution Cipher, Cryptography

Edition: Volume 6 Issue 12, December 2017

Pages: 1128 - 1130

Share this Article

How to Cite this Article?

Amandeep Kaur, Tanisha Jain, Gurjyot Singh, "Enhanced Security by Modifying Playfair Cipher", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20178610, Volume 6 Issue 12, December 2017, 1128 - 1130

83 PDF Views | 63 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cipher'

Survey Paper, Information Technology, India, Volume 4 Issue 12, December 2015

Pages: 1984 - 1987

Lossless and Reversible Data Hiding in Asymmetric Cryptography

Prashant Gholve, H. A. Hingoliwala

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 2313 - 2316

Web Application:(with) HoneyWords and HoneyEncryption

Harish Reddy B, Beatrice Ssowmiya J

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 7, July 2015

Pages: 2400 - 2403

Secure Deduplication in Cloud Backup Services

Nidhi Panpaliya, Prachi Sorte

Share this Article

Research Paper, Information Technology, India, Volume 6 Issue 12, December 2017

Pages: 1128 - 1130

Enhanced Security by Modifying Playfair Cipher

Amandeep Kaur, Tanisha Jain, Gurjyot Singh

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 5, May 2015

Pages: 2565 - 2567

Cloud Storage with Added Data Security and Integrity

Reshmi Das M V, R Charanya

Share this Article

Similar Articles with Keyword 'Cryptography'

Research Paper, Information Technology, India, Volume 4 Issue 9, September 2015

Pages: 1458 - 1459

Remote Voting System Using Extended Visual Cryptography

Tridib Chakraborty, Mizan Md Chowdhury

Share this Article

Survey Paper, Information Technology, India, Volume 4 Issue 12, December 2015

Pages: 1984 - 1987

Lossless and Reversible Data Hiding in Asymmetric Cryptography

Prashant Gholve, H. A. Hingoliwala

Share this Article

Survey Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2849 - 2851

A Survey on Secure Mechanism for Wireless Sensor Networks

Tabbasum Sajjan Magdum, Y.B.Gurav

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 2030 - 2033

Establishing Secret Key in Wireless Environment by Using Techniques of Keyless Cryptosystem

Fatima Joselyn Mystica, Gopalakrishnan Prakash

Share this Article

Comparative Studies, Information Technology, India, Volume 5 Issue 4, April 2016

Pages: 2013 - 2019

Comprehensive Research on Privacy Preserving Emphasizing on Distributed Clustering

Prajna M.S., Sumana M.

Share this Article
Top