An Enhanced Key Security of Playfair Cipher Algorithm

Cryptography is one of the best methods to keep the information safe from security attack by unauthorized people. At present, many studies had been conducted to generate a more robust cryptographic algorithm to provide high security for data communication. In this study, the authors proposed an enhanced key security of Playfair cipher algorithm using Playfair cipher 16x16 matrix, XOR, two's complement, and bit swapping. The result of the study shows that the processing time for encryption and decryption processes are linearly proportional. It means the longer characters of the key; the more significant times needed to encrypt and decrypt the key. Also, the proposed method is faster than the existing key security of Playfair cipher algorithm. Experimental results also show that the proposed key security algorithm exhibits strong avalanche effect. It was also found that the key cannot be easily cracked by an attacker performing brute-force attack.

[1]  Jerone B. Alimpia An Enhanced Hash-based Message Authentication Code using BCrypt , 2018 .

[2]  C. S. Subramaniyam Playfair using DES Algorithm, 7 by 9 Matrix and Colour Substitution , 2016 .

[3]  Subham Chakraborty,et al.  A Modified Encryption Technique using Playfair Cipher 10 by 9 Matrix with Six Iteration Steps , 2014 .

[4]  M. Sumbwanyambe,et al.  An analysis and a comparative study of cryptographic algorithms used on the Internet of Things (IoT) based on avalanche effect , 2018, 2018 International Conference on Information and Communications Technology (ICOIACT).

[5]  Yahaya Bala Zakariyau,et al.  Securing Message Transactions through Modified Playfair Cipher Technique , 2015 .

[6]  Himani Agrawal,et al.  A Survey Report on Various Cryptanalysis Techniques , 2013 .

[7]  J T Tarigan,et al.  Hybrid cryptosystem for image file using elgamal and double playfair cipher algorithm , 2018 .

[8]  Amalia,et al.  File text security using Hybrid Cryptosystem with Playfair Cipher Algorithm and Knapsack Naccache-Stern Algorithm , 2018 .

[9]  Bhumika Gupta,et al.  Enhanced the Security of Playfair Technique using Excess 3 Code (XS3) and Ceasar Cipher , 2014 .

[10]  M. Ilayaraja,et al.  Extension of Playfair Cipher using 16X16 Matrix , 2012 .

[11]  Kenneth B. Kent,et al.  The effectiveness of brute force attacks on RC4 , 2004, Proceedings. Second Annual Conference on Communication Networks and Services Research, 2004..

[12]  Gaurav Shrivastava,et al.  A Modified Version Of Extended Plafair Cipher (8x8) , 2013 .

[13]  Generation of Key Matrix for Hill Cipher Encryption Using Classical Cipher , 2017, 2017 World Congress on Computing and Communication Technologies (WCCCT).

[14]  Sadiq Ali Khan,et al.  Enhancing the Security of Communication Using Encryption Algorithm Based on ASCII Values of Data , 2017 .

[15]  Vashitva Kumar Srivastava,et al.  A Symmetric Key Cryptographic Algorithm , 2012 .

[16]  Surendra Singh Chauhan,et al.  Secure Key Exchange using RSA in Extended Playfair Cipher Technique , 2014 .