Research Article | Open Access | Download PDF
Volume 7 | Issue 1 | Year 2017 | Article Id. IJPTT-V7I1P403 | DOI : https://doi.org/10.14445/22492615/IJPTT-V7I1P403Avalanche Effect based Variants of Playfair Cipher for Data Security
Rajeswari.S, Ramya.N, K.Saranya
Citation :
Rajeswari.S, Ramya.N, K.Saranya, "Avalanche Effect based Variants of Playfair Cipher for Data Security," International Journal of Computer Trends and Technology (IJCTT), vol. 7, no. 1, pp. 10-14, 2017. Crossref, https://doi.org/10.14445/22492615/IJPTT-V7I1P403
Abstract
Cryptography is the technique of converting original message into non-readable form. It is further classified as Transposition technique and Substitution technique. One of the commonly used substitution technique is Playfair cipher. It is a form of block cipher which operates on block of characters, considering two characters at a time. One of the important considerations for measuring the strength of any cryptographic algorithm is its Avalanche effect, (i.e.) if an input is changed slightly, the output changes significantly. A good algorithm must have high Avalanche Effect. The traditional 5 x 5 Playfair cipher supports twenty five uppercase alphabets only. To overcome this drawback, extended Playfair ciphers were proposed. This paper deals with the study of these on the basis of Avalanche effect.
Keywords
Cryptography, Substitution, Playfair Cipher, Avalanche effect.
References
[1] Priyanka Goyal, Gaurav Sharma and Shivpratap Singh
Kushwah, “A Survey Paper on Playfair Cipher and its Variants”, Vol.3. ITM Group
of Institutions, Gwalior, India, No.1 (2015), pp.1-6.
[2] Shiv Shakti Srivastava, Nitin Gupta, “A Novel Approach to
Security using Extended Playfair Cipher”, National Institute of Technology
Hamirpur, India Volume 20– No.6, April 2011.
[3] Harinandan Tunga1, Soumen Mukherjee2, “A New Modified
Playfair Algorithm Based On Frequency Analysis”, Volume 2, Issue 1. Kolkata,
West Bengal, India, January 2012.
[4] Fauzan Saeed, Mustafa Rashid, “Integrating Classical
Encryption with Modern Technique “, VOL.10 No.5, Karachi, Pakistan, May 2010.
[5] K. Banupriya, Dr.G.Arutchelvan, “Improved playfair with
multistage encryption and decryption”, Volume 2, Issue 10, Vellore, Tamil Nadu,
India, June-2015.
[6] Subhajit Bhattacharyya, Nisarga Chand, Subham
Chakraborty, “A Modified Encryption Technique using Playfair Cipher 10 by 9
Matrix with Six Iteration Steps”, Volume 3, Issue 2, India, February 2014.
[7] Nisarga Chand, Subhajit Bhattacharyya, “A Novel Approach
for Encryption of Text Messages Using PLAY-FAIR Cipher 6 by 6 Matrix with Four
Iteration Steps”, Volume 3, Issue 1, January 2014.
[8] A. Aftab Alam, B. Shah Khalid, and C. Muhammad Salam, “A
Modified Version of Playfair Cipher Using 7×4 Matrix “, Vol. 5, No. 4, August
2013.
[9] Vinod Kumar, Santosh kr Upadhyay, Satyam Kishore Mishra,
Devesh Singh, “Modified Version of Playfair Cipher Using Linear Feedback Shift
Register and Transpose Matrix Concept”, Volume-3, Issue-1, June 2013.
[10] Sanjay Basu, Utpal Kumar Ray, “Modified Playfair Cipher
using Rectangular Matrix”, Volume 46– No.9, Kolkata, India, May 2012.
[11] Hadab Khalid Obayes, “Suggested Approach to Embedded
Playfair Cipher Message in Digital Image”, Vol. 3, Issue 5, Babylon University,
Iraq, pp.710-714, Sep-Oct 2013.
[12] Zubair Iqbal, Bhumika Gupta, Kamal Kr. Gola, Prachi
Gupta, “Enhanced the Security of Playfair Technique using Excess 3 Code (XS3)
and Ceasar Cipher”, Volume 103 – No 13, M.I.T, Moradabad, GB Pant Eng. College,
October 2014.
[13] Nisargachand,subhajitBhattacharyya,”A Novel Approach for
encryption of text messages using PLAYFAIR cipher 6 by 6 matrix with four
iteration steps”,volume 3,issue1,January 2014.
[14] A.Aftab Alam,B.Shah Khalid,C.Muhammad salam,”A modified
version of Playfair Cipher using 7x4 matrix”volume.5,no.4,August 2013.
[15] Shiv Shakthi srivastava,Nitin Gupta,”A Novel Approach to
security using extended Playfair Cipher”,volume 20.No.6,Hamirpur,India,April
2011.