Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Secure Key Exchange using RSA in Extended Playfair Cipher Technique

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 104 - Number 15
Year of Publication: 2014
Authors:
Surendra Singh Chauhan
Hawa Singh
Ram Niwas Gurjar
10.5120/18277-9180

Surendra Singh Chauhan, Hawa Singh and Ram Niwas Gurjar. Article: Secure Key Exchange using RSA in Extended Playfair Cipher Technique. International Journal of Computer Applications 104(15):13-19, October 2014. Full text available. BibTeX

@article{key:article,
	author = {Surendra Singh Chauhan and Hawa Singh and Ram Niwas Gurjar},
	title = {Article: Secure Key Exchange using RSA in Extended Playfair Cipher Technique},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {104},
	number = {15},
	pages = {13-19},
	month = {October},
	note = {Full text available}
}

Abstract

In today's digital world cryptography is used to secure information in order to provide the privacy for the intended sender and receiver by managing the message with the public key. The objective of this work is to securing the key of Playfair cipher using RSA algorithm. It is a two stage application, in first stage the existing methods of Playfair cipher modified by increasing in the size of matrix, so that the restrictions of earlier works of PF cipher using 5×5 matrix were overcome in the proposed work. The proposed method use a 12×8 matrix which contain all alphabetic, numeric and special character use in keyboard as input. This work is an enhancement to the existing algorithms that uses 5×5 matrix to pick cipher characters. It makes use of alphabets both lower and upper case characters, number and special characters for constructing the contents of the matrix. In the second stage, RSA public key encryption technique is used for sending the key of the PF ciphers securely. Finally, the security strength of the whole system has been analyzed and tried to fulfil the requirement of security.

References

  • Ravindra Babu K, S. Uday Kumar, A. Vinay Babu, I. V. N. S. Aditya, P. Komuraiah, "An Extension to Traditional PF Cryptographic Method". International Journal of Computer Applications (0975 – 8887), Volume 17- No. 5, March 2011.
  • S. S. Dhenakaran, M. Ilayaraja, "Extension of PF Cipher using 16X16 Matrix", International Journal of Computer Applications (0975 – 888), Volume 48– No. 7, June 2012.
  • Chandra M. Kota and Cherif Aissi1," Implementation of the RSA algorithm and its cryptanalysis".
  • R. L. Rivest. A. Shamir and L. Adleman, "A method for obtaining digital signatures and public key cryptosystems," Commun. ACM, Vol. 21, No. 2, pp. 158-164, Feb 1978.
  • Andrew S. Tanenbaum, Networks Computer, 5th Edition, Pearson Education, ISBN-10: 0132553171. Diffie, W. , and Hellman, M. New directions in cryptography. IEEE Trans. Inform. Theory IT-22,(Nov. 1976), 644-654.
  • Diffie, W. , and Hellman, M. Exhaustive cryptanalysis of the NBS data encryption standard. Computer 10 (June 1977), 74-84.
  • William Stallings, "Cryptography and Network Security: Principles and Practice", 4th edition, Prentice Hall, 2006.
  • Atul Kahate, "Cryptography and Network Security", 2nd edition, McGraw-Hill, 2010.
  • Bernard Menezes, "Network Security and Cryptography", CENGAGE Learning, 2014.