Professional Documents
Culture Documents
Abstract—3D-Playfair cipher is a multiple letter encryption Linear Feedback Shift Registers are good candidate for
cipher. Trigraphs (combination of 3 characters) of the plaintext generating random sequences. Due to its logical circuit
are treated as single unit and converted into corresponding variation and its implementation on software and hardware are
cipher text trigraphs and vice-versa. Classical Playfair Cipher also easy [6].
supports English alphabets with limitation that only one alphabet
“i” or “j” will be considered at a time. 3D-Playfair Cipher came A novel approach of encryption is presented in this paper,
into focus to eliminate this limitation. In addition to that 3D- with moving structure of key matrix on each trigraph
Playfair Cipher also overlooks the limitation of similar fashion processing. A random key will be required for structure
encryption of diagrams and its reverse diagrams. 3D-Playfair movement. So LSFR is used to generate keys for rotations of
cipher supports all 26 English alphabets {A-Z}, 10 digits {0-9} key matrix of 3D-Playfair Cipher in this research. At first
and 28 special characters including { ! “ * # $ % & ‘ + , - . / : ; ( ) plaintext trigraphs will be converted into corresponding
< = > ? @ [ ] \ ^ _ | }. The theme of this research is to enhance the ciphertext trigraphs based on 3D-Playfair cipher rules and then
security of text files that contains alphabets, numerals and special rotated key matrix will be used to process next trigraph.
characters. In this approach we developed a structure rotation
concept on key matrix of 3D-Playfair cipher using random key to
achieve the objective. Random sequences are generated through II. 3D- PLAYFAIR CIPHER
Linear Feedback Shift Register due to its simplicity and better 3D-Playfair cipher is the multiple letter encryption cipher,
performance. and encrypts a trigraph of plaintext into corresponding cipher
text trigraph and vice-versa by using a 4 X 4 X 4 matrix to
Keywords—3D-Playfair cipher; trigraph; rotations; bitwise store twenty-six (26) alphabets, ten (20) numerals and twenty-
operations; LFSR eight (28) special symbols. These letters are arranged in the
matrix by using secret key in the same manner as classical
I. INTRODUCTION playfair cipher. A matrix is represented in below table by
The relationship of security and bitwise operations are very assuming a null key:
casual [2]. A bitwise operation is used to operate on one or
more than one bit patterns or on any binary numerals at the TABLE I. SEQUENCE OF LETTERS IN 3D PLAYFAIR CIPHER
level of their individual bits. Shifting the binary value of any
Floor 1 Floor 2
integer in circular fashion in called rotation, Rotations are
0 1 2 3 G H I J
considered bitwise operations [3], because they operate on the 4 5 6 7 K L M N
binary representation of an integer instead of its numerical 8 9 A B O P Q R
value; however, rotations do not operate on pairs of C D E F S T U V
corresponding bits therefore cannot properly be called bit-wise
[4]. Rotations play crucial roles in data security; it move or Floor 3 Floor 4
shift the position of bits according to the user’s command [5] to W X Y Z - . / :
the left/ right in circular fashion. It is very popular and being ! “ # $ ; < = >
% & ‘ ( ? @ [ \
used in most of the cryptographic algorithms due to its easy
) * + , ] ^ _ |
implementation and fast response.
978-1-4673-6911-4/15/$31.00©2015 IEEE
1004
2015 International Conference on Advances in Computer Engineering and Applications (ICACEA)
IMS Engineering College, Ghaziabad, India
3D-Playfair cipher has 3 main parts Key Matrix generation, fashion. This approach can be better understand by the
Encryption and Decryption. All these parts are better explained following diagram-
in following section [1]-
A. Key-Matrix Generation
3D-Playfair Cipher uses a 4 X 4 X 4 matrix (table) to store TABLE III. ENCRYPTION PROCESS OF 3D PLAYFAIR CIPHER
a keyword that becomes the key for encryption and decryption
process. Storing keyword into 4 X 4 X 4 matrix is based on Plain Text Plain Text Trigraph Cipher Text
given rules- Trigraph 1st Letter 2nd Letter 3rd letter Trigraph
1st Letter Row Column Floor 1st Letter
1. Enter the secret (password) which may contain 2nd Letter Floor Row Column 2nd Letter
numerals, alphabets and special symbols like: 3rd letter Column Floor Row 3rd letter
aman2015nitj@gmail.com, cipher, 29101989,
ravindra_1987_singh@nitj.ac.in etc. Circular fashion means 2nd letter is the next letter and 3rd
letter will be the next-to-next letter for 1st letter. 3rd letter will
2. Drop the duplicate letters of key to get the keyword. Ex: be the next letter and 1st letter will be the next-to-next letter for
amn2015itj@g.com, ravind_1987sgh@tj.c, cipher, 2nd letter and 1st letter will be the next letter and 2nd letter will
29108 for above keys. be the next-to-next letter for 3rd letter.
3. Arrange this keyword in 4 X 4 X 4 matrix floor by
floor, row-wise: left to right and then top-to-bottom. C. Decryption
A letter in the trigraph will be replaced by the letter that
4. Fill all remaining spaces of the matrix with the rest of will lay on the same row of the letter and at the floor of the
numerals (0-9), alphabets (A-Z), special symbols. next letter and the column of next-to-next letter in circular
Ex: if secret is FRIENDS4EVER@NITJ_2012.CSE fashion. This approach can be better understand by the
Then keyword will be FRIENDS4V@TJ_201.C following diagram-
And Key-Matrix is given in the table below:
TABLE IV. DECRYPTION PROCESS OF 3D-PLAYFAIR CIPHER
TABLE II. KEY MATRIX GENERATION
Cipher Text Cipher Text Trigraph Plain Text
Floor 1 Floor 2 Trigraph 1st Letter 2nd Letter 3rd letter Trigraph
F R I E . C 3 5 1st Letter Row Floor Column 1st Letter
N D S 4 6 7 8 9 2nd Letter Column Row Floor 2nd Letter
V @ T J A B G H 3rd letter Floor Column Row 3rd letter
_ 2 0 1 K L M O
Remove the filler letter from the trigraph (Dropping any extra
Floor 3 Floor 4 X and Z that don't make sense in the final message) to find the
P Q U W * + , - actual text (plaintext).
X Y Z ! / : ; <
“ # $ % = > ? [
III. LINEAR FEEDBACK SHIFT REGISTER (LFSR)
& ‘ ( ) \ ] ^ |
Linear Feedback Shift Register is the rotation based
B. Encryption arrangement to produce a random bit and changes its state in
Encryption process will require trigraph (group of 3 letters). each iteration [7]. This state is a linear function of (using XOR
Grouping of letters are following few rules in order to produce and/or inverse–XOR) its previous state which is responsible to
trigraph. generate the random sequence [8]. Here few selected bits are
1. If any two letters are the same or only one letter is left, processed by this function and drive next state along with
add two filler letter X and Z after the first letter in the random bit. These selected bits are considered as “tap” [9] in
trigraph. other words “bit positions that affects next state is known as
tap”. The state Linear Feedback Shift Register at very start is
2. And if any two letter is left, add a filler X after the considered as “seed”. Seed is the initial value (L-bit) of LFSR;
second letter. here L represents the no of register in this arrangement,
So that BALLOON would be treated as {BAL}, {LOX}, generally called “length” [10]. Generated random sequence
{ONX}, and HELLOWORLDS would be treated as {HEL}, will be more dynamic if we frequently change the tap. Thus
{LOW}, {ORL}, {DSX} and MASTI_M.TECH @NITJ.2012 the scenario is illustrated in the figure as follows [8].
would be treated as {MAS}, {TI_}, {M.T}, {ECH}, {@NI},
{TJ.}, {201}, {2XZ}.
A letter in the trigraph will be replaced by the letter that
will lay on the same row of the letter and the column of the
next letter and at the floor of next-to-next letter in circular
1005
2015 International Conference on Advances in Computer Engineering and Applications (ICACEA)
IMS Engineering College, Ghaziabad, India
1006
2015 International Conference on Advances in Computer Engineering and Applications (ICACEA)
IMS Engineering College, Ghaziabad, India
1007
2015 International Conference on Advances in Computer Engineering and Applications (ICACEA)
IMS Engineering College, Ghaziabad, India
1008