An Enhanced Key Security of Playfair Cipher Algorithm

被引:1
|
作者
Marzan, Richard M. [1 ]
Sison, Ariel M. [1 ]
机构
[1] Technol Inst Philippines, Quezon City, Philippines
关键词
avalanche effect; bit swapping; cryptography; Playfair cipher algorithm; two's complement; XOR;
D O I
10.1145/3316615.3316689
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cryptography is one of the best methods to keep the information safe from security attack by unauthorized people. At present, many studies had been conducted to generate a more robust cryptographic algorithm to provide high security for data communication. In this study, the authors proposed an enhanced key security of Playfair cipher algorithm using Playfair cipher 16x16 matrix, XOR, two's complement, and bit swapping. The result of the study shows that the processing time for encryption and decryption processes are linearly proportional. It means the longer characters of the key; the more significant times needed to encrypt and decrypt the key. Also, the proposed method is faster than the existing key security of Playfair cipher algorithm. Experimental results also show that the proposed key security algorithm exhibits strong avalanche effect. It was also found that the key cannot be easily cracked by an attacker performing brute-force attack.
引用
收藏
页码:457 / 461
页数:5
相关论文
共 50 条
  • [1] NOVEL APPROACH OF PLAYFAIR CIPHER FOR MULTILEVEL INFORMATION SECURITY
    Patel, Sweti S.
    Gupta, Vinit
    [J]. 2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 2, 2016, : 486 - 489
  • [2] Developing Mobile Message Security Application Using 3D Playfair Cipher Algorithm
    Singh, Swati
    Deep, Pranay
    Jain, Reetika
    Agarwal, Sakshi
    [J]. 2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER ENGINEERING AND APPLICATIONS (ICACEA), 2015, : 838 - 841
  • [3] File text security using Hybrid Cryptosystem with Playfair Cipher Algorithm and Knapsack Naccache-Stern Algorithm
    Amalia
    Budiman, M. A.
    Sitepu, R.
    [J]. 2ND INTERNATIONAL CONFERENCE ON COMPUTING AND APPLIED INFORMATICS 2017, 2018, 978
  • [4] i3D-Playfair: An Improved 3D Playfair Cipher Algorithm
    Villafuerte, Ritchell S.
    Sison, Ariel M.
    Medina, Ruji P.
    [J]. PROCEEDINGS OF THE 2019 IEEE EURASIA CONFERENCE ON IOT, COMMUNICATION AND ENGINEERING (ECICE), 2019, : 538 - 541
  • [5] Design and analysis of key scheduling algorithm for symmetric cipher security
    Vikas Tiwari
    U. Surya Kameswari
    Ajeet Singh
    Ashutosh Saxena
    [J]. International Journal of Information Technology, 2024, 16 (6) : 3991 - 3997
  • [6] Improvements algorithm of des cipher key based on bluetooth security mechanism
    Zhao-Hui, Yang
    Hong-Juan, Chen
    Yun-Fei, Chi
    [J]. Information Technology Journal, 2013, 12 (19) : 5107 - 5110
  • [7] A New Modified Playfair Cipher
    Yousif, Madeha Shaltagh
    Salih, Raghad Kadhim
    Alsaidi, Nadia Mohamed Ghanim
    [J]. INTERNATIONAL CONFERENCE OF MATHEMATICAL SCIENCES (ICMS 2018), 2019, 2086
  • [8] Enhanced Security for Cloud Storage using Linear Block Cipher Algorithm
    Kuppuswamy, Prakash
    Rekha, S. Nithya
    [J]. 2015 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (ICCC), 2015, : 108 - 112
  • [9] Developing 3D-Playfair Cipher Algorithm Using Structure Rotation
    Singh, Swati
    Kaur, Amandeep
    Singh, Ravindra Kumar
    Kaur, Dilpreet
    [J]. 2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER ENGINEERING AND APPLICATIONS (ICACEA), 2015, : 1004 - 1008
  • [10] Hybrid cryptosystem for image file using elgamal and double playfair cipher algorithm
    Hardi, S. M.
    Tarigan, J. T.
    Safrina, N.
    [J]. 2ND INTERNATIONAL CONFERENCE ON COMPUTING AND APPLIED INFORMATICS 2017, 2018, 978