Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Novel Modified Playfair Cipher using a SquareMatrix

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 101 - Number 12
Year of Publication: 2014
Authors:
Harinandan Tunga
Arnab Saha
Akash Ghosh
Swashata Ghosh
10.5120/17739-3854

Harinandan Tunga, Arnab Saha, Akash Ghosh and Swashata Ghosh. Article: Novel Modified Playfair Cipher using a SquareMatrix. International Journal of Computer Applications 101(12):16-21, September 2014. Full text available. BibTeX

@article{key:article,
	author = {Harinandan Tunga and Arnab Saha and Akash Ghosh and Swashata Ghosh},
	title = {Article: Novel Modified Playfair Cipher using a SquareMatrix},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {101},
	number = {12},
	pages = {16-21},
	month = {September},
	note = {Full text available}
}

Abstract

This paper is about encryption and decryption of text using a secret password provided by the user. The encryption machine takes the password and source message as input and generates acipher text based on Modified Playfair Algorithm using dynamic rectangular matrix. The decryption machine takes the same password and the cipher text generated by the encryption engine as input to produce the original message. It also checks if the input is valid and blocks the user when an invalid input is provided. In this paper the entire program will be simulated by using an PHP application.

References

  • Harinandan Tunga, Soumen Mukherjee "A New Modified Playfair Algorithm Based On Frequency Analysis", International Journal of Emerging Technology and Advanced Engineering, (ISSN 2250-2459, Volume 2, Issue 1, January 2012)
  • V. Umakanta Sastry, N. Ravi Shankar, and S. Durga Bhavani "A Modified Playfair Cipher Involving Interweaving and Iteration", International Journal of Computer Theory and Engineering, Vol. 1, No. 5, December, 2009 1793-8201
  • William Stallings, Cryptography and Network Security Principles and Practices, 4th Edition, Pearson Education.
  • Atul Kahate, Cryptography and Network Security, 2nd Ed. , Tata McGraw-Hill Publishing Company Limited, New Delhi.
  • Ravindra Babu K, S. Uday Kumar, A. Vinay Babu, I. V. N. S Aditya , P. Komuraiah "An Extension to Traditional Playfair Cryptographic Method", International Journal of Computer Applications (0975 – 8887) Volume 17– No. 5, March 2011.
  • Shiv Shakti Srivastava, Nitin Gupta "A Novel Approach to Security using Extended Playfair Cipher", International Journal of Computer Applications (0975 – 8887) Volume 20– No. 6, April 2011
  • Gaurav Agrawal, Saurabh Singh, Manu Agarwal "An Enhanced and Secure Playfair Cipher by Introducing the Frequency of Letters in any Plain text", Journal of Current Computer Science and Technology Vol. 1 Issue 3
  • 10-16
  • Packirisamy Murali and Gandhidoss Senthilkumar "Modified Version of Playfair Cipher using Linear Feedback Shift Register", IJCSNS International Journal of Computer Science and Network Security, VOL. 8 No. 12, December 2008
  • Behrouz A. Forouzan, Cryptography and Network Security. Special Indian Edition 2007, Tata McGraw- Hill Publishing Company Limited, New Delhi.
  • Sanjay Basu and Utpal Kumar Ray "Modified Playfair Cipher using Rectangular Matrix", IJCA International Journal of Computer Applications, Volume 46- No. 9, May 2012