Professional Documents
Culture Documents
Merits:
The proposed algorithm is dealing both
alphabetic as well as numeric letters.
The algorithm also handling white spaces
and few special characters.
Demerits: A B C D E F G H I J K L M
The proposed cipher is not capable to deal N O P Q R S T U V W X Y Z
with lower case alphabets. 0 1 2 3 4 5 6 7 8 9 a b c
The LFSR is a time consuming process and d e f g h i j k l m n o p
the cipher does not remains time efficient.
q r s t u v w x y z \ , .
2.4. Modified Playfair Cipher using Rectangular ; : ‘ “ / ? [ ] { } ( ) -
Matrix by Sanjay Basu and Uptal Kumar Ray [7] _ = + * & ^ % $ # @ ! > <
Proposed an advancement of playfair cipher in which
the 5 by 5 matrix is replaced by a 10 by 9 matrix to
accommodate all the uppercase alphabets, lowercase
alphabets, numeric digits, other symbols as well as
white space. The table of this proposed cipher is as
given
3. OUR PROPOSAL
Renovated Playfair Cipher
i A g t U o B . A C D E F
G H I J K L M N O P Q R S
T V W X Y Z 0 1 2 3 4 5 6
7 8 9 b c d e f h j k l m
n P q r s u v w x y z \ ,
; : ‘ “ / ? [ ] { } ( ) -
_ = + * & ^ % $ # @ ! > <
3.1.1. Encryption
M G q x E e f r A B C D F
H I J K L N O P Q R S T U
V W X Y Z 0 1 2 3 4 5 6 7
8 9 a b c d g h i j k l m
n o p s t u v w y z \ , .
; : ‘ “ / ? [ ] { } ( ) -
_ = + * & ^ % $ # @ ! > <
Third cipher text As well as traditional playfair cipher the method
ha MC pJ yQ Gq xE ef rA ,I ju up Aq v8 I, Ex of decryption Renovated Playfair Cipher is same the
Now select the next key for the fourth round. We last N key use in decryption as first key and the N-1
select the next 8 characters as a key for fourth round key use as a second key for decryption in the end the
Key: ,IjuupAq original key use for decryption and gets the Pain text.
7x13 matric place for fourth round
, I j u p A q B C D E F G
H J K L M N O P Q R S T U
V W X Y Z 0 1 2 3 4 5 6 7
8 9 a b c d e f g h i k l
m n o r s t v w x y z \ .
; : ‘ “ / ? [ ] { } ( ) -
_ = + * & ^ % $ # @ ! > <
Fourth cipher text
ib Qp IM xR CU zC fg tu Ij up pA qB me jI Cz
Now select the next key for the fifth round. We select
the next 8 characters as a key for fourth round
Key: mejICz
Cipher text
kcJwMZ{4GNAzghuvCIvqvmweejICzA
N Key: mejICz
m e j I C z A B D E F G H
J K L M N O P Q R S T U V
W X Y Z 0 1 2 3 4 5 6 7 8
9 a b c d f g h i k l n o
p q r s t u v w x y \ , .
; : ‘ “ / ? [ ] { } ( ) -
_ = + * & ^ % $ # @ ! > <
ib Qp IM xR CU zC fg tu Ij up pA qB me jI Cz
Fifth Plain text:
N-1 Key: ,IjuupAq IamgoingtoUniversityofBaltistan.
M G q x E e f r A B C D F
H I J K L N O P Q R S T U
V W X Y Z 0 1 2 3 4 5 6 7
8 9 a b c d g h i j k l m
n o p s t u v w y z \ , .
; : ‘ “ / ? [ ] { } ( ) -
_ = + * & ^ % $ # @ ! > <
H g 9 F B a q i A C D E G
I J K L M N O P Q R S T U
V W X Y Z 0 1 2 3 4 5 6 7
8 b c d e f h j k l m n o
p r s t u v w x y z \ , .
; : ‘ “ / ? [ ] { } ( ) -
_ = + * & ^ % $ # @ ! > <
[2] Wikipedia
(http://en.wikipedia.org/wiki/Playfair_cipher)