Design and Analysis of Modified Playfair Square Cipher Algorithm Using 6 By 6 Matrix with Five Iteration Steps and its Implementation in C/C++
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 103 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 6, June 2015

Design and Analysis of Modified Playfair Square Cipher Algorithm Using 6 By 6 Matrix with Five Iteration Steps and its Implementation in C/C++

Monika Arora, Anish Sandiliya

An ad-hoc network generally consists of nodes, on which sensors are embedded to provide security measures. The main challenge of these sensors is to provide security of data and also to work effectively within a limitation of power and memory. This paper is a step toward developing an encryption system which can encrypt any text messages securely. Cryptography is an art and science of converting original message into no readable form. There are two techniques for converting data into no readable form. Transposition technique, Substitution technique.In recent years there is drastic progress in Internet world. Sensitive information can be shared through internet but this information sharing is susceptible to certain attacks. Cryptography was introduced to solve this problem. Cryptography is art for achieving security by encoding the plain text message to cipher text. Substitution and transposition are techniques for encoding.When Caesar cipher substitution, Rail fence cipher and Columnar Transposition Cipher techniques are used individually, cipher text obtained is easy to crack. This Paper will present a perspective on combination of techniques like substitution and transposition with play fair square cipher to enhance its security.Play fair cipher is one of the popular symmetric encryption methods. The first recorded description of the Playfair cipher was in a document signed by Wheatstone on 26 March 1854. However Lord Playfair promoted the use of this cipher and hence it is called Playfair Cipher. It was used by the British in the Second Boer War and in World War I. It was also used by the Australians and Germans during World War II. Playfair is reasonably easy to use and was used to handle important but non-critical secrets. By the time the enemy cryptanalysts could break the message, the information would be useless to them. Between February 1941 and September 1945 the Government of New Zealand used it for communication between New Zealand, the Chatham Islands and the Pacific Islands.To enhance its security we combine it with transposition and substitution cipher techniques, to minimize attacks on it (Cryptanalyst), by performing double substitution and transposition Techniques.There are two main disadvantages of traditional play fair cipher matrix.First one is we have to compromise between I and J and second one is we cannot include numeric values in this matrix.This matrix consists of alphabets A to Z and numeric values 0 to 9.Here we use Five Iteration steps to make strong encrypted message.

Keywords: Caesar cipher, Play fair cipher, key, columnar transposition, cryptography, cryptanalysis, C/C++

Edition: Volume 4 Issue 6, June 2015

Pages: 1613 - 1619

Share this Article

How to Cite this Article?

Monika Arora, Anish Sandiliya, "Design and Analysis of Modified Playfair Square Cipher Algorithm Using 6 By 6 Matrix with Five Iteration Steps and its Implementation in C/C++", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB155487, Volume 4 Issue 6, June 2015, 1613 - 1619

Enter Your Registered Email Address





Similar Articles with Keyword 'Caesar cipher'

Downloads: 103 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1613 - 1619

Design and Analysis of Modified Playfair Square Cipher Algorithm Using 6 By 6 Matrix with Five Iteration Steps and its Implementation in C/C++

Monika Arora, Anish Sandiliya

Share this Article

Downloads: 113 | Weekly Hits: ⮙1 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2415 - 2421

Implementation of One Time Pad Cipher with Rail Fence and Simple Columnar Transposition Cipher, for Achieving Data Security

Jawad Ahmad Dar, Sandeep Sharma

Share this Article

Downloads: 114 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1796 - 1801

Personalized and Effective Web Page Recommendation Search System based on Ontology and Semantic Enhancement

Hurma Begum, B. Sasidhar

Share this Article

Downloads: 119 | Weekly Hits: ⮙2 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1083 - 1088

A Novel Approach for Encryption of Text Messages, Enhancing the Security of Simple Coloumnar Transposition Cipher with Ceasar Cipher and Rail Fence Cipher, Under 15 Parameters

Jawad Ahmad Dar, Amit Verma

Share this Article

Downloads: 135 | Weekly Hits: ⮙1 | Monthly Hits: ⮙18

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 549 - 553

Enhancing the Security of Playfair Square Cipher by Double Substitution and Transposition Techniques

Jawad Ahmad Dar, Amit Verma

Share this Article

Similar Articles with Keyword 'Play fair cipher'

Downloads: 103 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1613 - 1619

Design and Analysis of Modified Playfair Square Cipher Algorithm Using 6 By 6 Matrix with Five Iteration Steps and its Implementation in C/C++

Monika Arora, Anish Sandiliya

Share this Article

Downloads: 135 | Weekly Hits: ⮙1 | Monthly Hits: ⮙18

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 549 - 553

Enhancing the Security of Playfair Square Cipher by Double Substitution and Transposition Techniques

Jawad Ahmad Dar, Amit Verma

Share this Article

Similar Articles with Keyword 'key'

Downloads: 8 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Downloads: 25 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 3, March 2021

Pages: 1720 - 1723

Key Phrase Extraction Using Recurrent Neural Network

Aakib Jabbar, Preeti Sondhi

Share this Article

Downloads: 41 | Monthly Hits: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 886 - 889

Survey on Algorithms Predicting Performance of Keyword Queries

Snehal Borole

Share this Article

Downloads: 60 | Weekly Hits: ⮙3 | Monthly Hits: ⮙19

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021

Pages: 1669 - 1672

Random Forest Based Heart Disease Prediction

Adeen, Preeti Sondhi

Share this Article

Downloads: 90 | Weekly Hits: ⮙2 | Monthly Hits: ⮙15

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 823 - 826

Survey Paper on Users Location Hiding In Geosocial Recommendation Applications

Mayura Phadnis, Kanchan Varpe

Share this Article

Similar Articles with Keyword 'columnar transposition'

Downloads: 103 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1613 - 1619

Design and Analysis of Modified Playfair Square Cipher Algorithm Using 6 By 6 Matrix with Five Iteration Steps and its Implementation in C/C++

Monika Arora, Anish Sandiliya

Share this Article

Downloads: 113 | Weekly Hits: ⮙1 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2415 - 2421

Implementation of One Time Pad Cipher with Rail Fence and Simple Columnar Transposition Cipher, for Achieving Data Security

Jawad Ahmad Dar, Sandeep Sharma

Share this Article

Downloads: 119 | Weekly Hits: ⮙2 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1083 - 1088

A Novel Approach for Encryption of Text Messages, Enhancing the Security of Simple Coloumnar Transposition Cipher with Ceasar Cipher and Rail Fence Cipher, Under 15 Parameters

Jawad Ahmad Dar, Amit Verma

Share this Article

Downloads: 120 | Weekly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1787 - 1791

Humanizing the Security of Rail Fence Cipher Using Double Transposition and Substitution Techniques

Jawad Ahmad Dar

Share this Article

Downloads: 135 | Weekly Hits: ⮙1 | Monthly Hits: ⮙18

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 549 - 553

Enhancing the Security of Playfair Square Cipher by Double Substitution and Transposition Techniques

Jawad Ahmad Dar, Amit Verma

Share this Article

Similar Articles with Keyword 'cryptography'

Downloads: 8 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Downloads: 91 | Weekly Hits: ⮙4 | Monthly Hits: ⮙16

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Downloads: 93 | Weekly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Downloads: 99 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2394 - 2397

Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur

Share this Article

Downloads: 101 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Similar Articles with Keyword 'cryptanalysis'

Downloads: 103 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1613 - 1619

Design and Analysis of Modified Playfair Square Cipher Algorithm Using 6 By 6 Matrix with Five Iteration Steps and its Implementation in C/C++

Monika Arora, Anish Sandiliya

Share this Article

Downloads: 106 | Weekly Hits: ⮙1

Research Paper, Computer Science & Engineering, United Kingdom, Volume 3 Issue 7, July 2014

Pages: 2387 - 2389

Cryptanalysis of Identity Transmission Authentication System

Sattar J. Aboud

Share this Article

Downloads: 111 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

Survey Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 356 - 358

A Survey on Securing IOT Based Devices Using Cryptanalysis

Saumya Priya

Share this Article

Downloads: 113 | Weekly Hits: ⮙1 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2415 - 2421

Implementation of One Time Pad Cipher with Rail Fence and Simple Columnar Transposition Cipher, for Achieving Data Security

Jawad Ahmad Dar, Sandeep Sharma

Share this Article

Downloads: 119 | Weekly Hits: ⮙2 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1083 - 1088

A Novel Approach for Encryption of Text Messages, Enhancing the Security of Simple Coloumnar Transposition Cipher with Ceasar Cipher and Rail Fence Cipher, Under 15 Parameters

Jawad Ahmad Dar, Amit Verma

Share this Article

Similar Articles with Keyword 'C/C++'

Downloads: 103 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1613 - 1619

Design and Analysis of Modified Playfair Square Cipher Algorithm Using 6 By 6 Matrix with Five Iteration Steps and its Implementation in C/C++

Monika Arora, Anish Sandiliya

Share this Article

Downloads: 120 | Weekly Hits: ⮙5 | Monthly Hits: ⮙15

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 638 - 640

Programming Auto-Comment Generation System

Dayanand G Savakar, Ravi Hosur

Share this Article

Downloads: 152 | Weekly Hits: ⮙2 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 9 - 16

A Novel Approach for Encryption of Text Messages, Analysis and Implementation of Simple Coloumnar Transposition Cipher with Ceasar Cipher and Rail Fence Cipher in C/C++

Jawad Ahmad Dar, Amit Verma

Share this Article



Top