Research Article

Modified 3-D Playfair Stream Cipher

by  Sagar Gurnani, Nitish Mhalgi, Samyukta Iyer, Deepika Dixit
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 84 - Issue 15
Published: December 2013
Authors: Sagar Gurnani, Nitish Mhalgi, Samyukta Iyer, Deepika Dixit
10.5120/14649-2904
PDF

Sagar Gurnani, Nitish Mhalgi, Samyukta Iyer, Deepika Dixit . Modified 3-D Playfair Stream Cipher. International Journal of Computer Applications. 84, 15 (December 2013), 1-3. DOI=10.5120/14649-2904

                        @article{ 10.5120/14649-2904,
                        author  = { Sagar Gurnani,Nitish Mhalgi,Samyukta Iyer,Deepika Dixit },
                        title   = { Modified 3-D Playfair Stream Cipher },
                        journal = { International Journal of Computer Applications },
                        year    = { 2013 },
                        volume  = { 84 },
                        number  = { 15 },
                        pages   = { 1-3 },
                        doi     = { 10.5120/14649-2904 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2013
                        %A Sagar Gurnani
                        %A Nitish Mhalgi
                        %A Samyukta Iyer
                        %A Deepika Dixit
                        %T Modified 3-D Playfair Stream Cipher%T 
                        %J International Journal of Computer Applications
                        %V 84
                        %N 15
                        %P 1-3
                        %R 10.5120/14649-2904
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

The purpose of this algorithm is to offer heightened security for data transmission. The data may include any alphabet, numerals, or special characters. This work proposes an improved version of a 3-D Playfair cipher, by improving the complexity of encryption and decryption. The algorithm uses a 5x5 key matrix for encoding, which not only increases the complexity by providing each character with three-dimensional uniqueness, but also eliminates the idea of dummy characters required in other versions of this cipher. One can consider various types of cryptography attacks and comparisons of the resistance offered by the proposed algorithm with the resistance offered by existing algorithms to judge its practicality.

References
  • William Stallings, Cryptography and Network Security, principles and practices, 4th Edition.
  • Reference: Matt J. B. Rob Shaw, Stream Ciphers Technical Report TR-701, version 2. 0, RSA Laboratories, 1995.
  • Amandeep Kaur, Harsh Kumar Verma and Ravindra Kumar Singh. Article: 3D(4 X 4 X 4) - Playfair Cipher. International Journal of Computer Applications 51(2):36-38, August 2012.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Playfair Cipher Security 3D Cube

Powered by PhDFocusTM