CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

3D(4 X 4 X 4) - Playfair Cipher

by Amandeep Kaur, Harsh Kumar Verma, Ravindra Kumar Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 51 - Number 2
Year of Publication: 2012
Authors: Amandeep Kaur, Harsh Kumar Verma, Ravindra Kumar Singh
10.5120/8017-1286

Amandeep Kaur, Harsh Kumar Verma, Ravindra Kumar Singh . 3D(4 X 4 X 4) - Playfair Cipher. International Journal of Computer Applications. 51, 2 ( August 2012), 36-38. DOI=10.5120/8017-1286

@article{ 10.5120/8017-1286,
author = { Amandeep Kaur, Harsh Kumar Verma, Ravindra Kumar Singh },
title = { 3D(4 X 4 X 4) - Playfair Cipher },
journal = { International Journal of Computer Applications },
issue_date = { August 2012 },
volume = { 51 },
number = { 2 },
month = { August },
year = { 2012 },
issn = { 0975-8887 },
pages = { 36-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume51/number2/8017-1286/ },
doi = { 10.5120/8017-1286 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:49:24.472028+05:30
%A Amandeep Kaur
%A Harsh Kumar Verma
%A Ravindra Kumar Singh
%T 3D(4 X 4 X 4) - Playfair Cipher
%J International Journal of Computer Applications
%@ 0975-8887
%V 51
%N 2
%P 36-38
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The theme of this research is to provide security for the data that contains alphabets numerals and special characters during its transmission. However because of the drawbacks inherent in the classical Playfair cipher which adversely affects the security, this research proposed 3D-Playfair Cipher (4 X 4 X 4 Playfair cipher) which works on trigraph rather than using digraph which eliminates the fact that a diagram and its reverse will encrypt in a similar fashion. 3D-Playfair cipher supports all 26 alphabets {A-Z}, 10 digits {0-9} and 28 special characters { ! " # $ % & ' ( ) * + , - . / : ; < = > ? @ [ ] ^ _ | } which eliminate the limitation of classical Playfair in which "i" and "j" both character cannot appear at the same time. 3D-Playfair enhances the security by increasing complexity. Various types of cryptography attacks have been taken under consideration for original Playfair cipher but not vulnerable for this proposed cipher.

References
  1. William Stallings, Cryptography and Network Security Principles and Practice. Second edition, Pearson Education.
  2. Schnier B, Applied cryptography: protocols, algorithms and source code in C. New York: John Wiley and sons, 1996.
  3. Menezes AJ, Oorschot PCV, Vanstone SA, Handbook of applied cryptography. Boca Raton, Florida, USA: CRC Press; 1997.
  4. Johannes A. Buchmann, Introduction to Cryptography. Second Edition, Springer –Verlag NY, LLC, 2001.
  5. Behrouz A. Forouzan, Cryptography and Network Security. Special Indian Edition, The McGraw- Hill companies, New Delhi, 2007.
  6. Dhiren R. Patel, Information Security Theory and Practice. First Edition, Prentice-Hall of India Private Limited, 2008.
  7. Keith Harrison, Bill Munro and Tim Spiller, Security through uncertainty. P Laboratories, February, 2007.
Index Terms

Computer Science
Information Sciences

Keywords

3D Playfair cipher trigraph