2022
DOI: 10.11591/csit.v3i1.p51-64
|View full text |Cite
|
Sign up to set email alerts
|

Modified Playfair cryptosystem for improved data security

Abstract: Playfair is the earliest known classical block cipher which is capable of taking two characters as a unit in the process of encryption and decryption. However, the cipher is suffering from vulnerability to many cryptanalysis attacks due to a lack of confusion and diffusion properties, an inability to handle numbers and special characters in the process of encryption and decryption, and a host of other deficiencies. Although several modifications and improvements had been done by different researchers, the emph… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
1
1
1

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…Confusion and diffusion constitute the two vital features of cryptography techniques [25,26]. Researchers use substitution boxes (S-boxes) to achieve the confusion property [27], while the bit permutation technique is normally used to achieve the diffusion property [28]. However, the use of an S-box increases the demands for memory (for storage) and computing power (for production) [29].…”
Section: Motivationmentioning
confidence: 99%
“…Confusion and diffusion constitute the two vital features of cryptography techniques [25,26]. Researchers use substitution boxes (S-boxes) to achieve the confusion property [27], while the bit permutation technique is normally used to achieve the diffusion property [28]. However, the use of an S-box increases the demands for memory (for storage) and computing power (for production) [29].…”
Section: Motivationmentioning
confidence: 99%
“…Algorithm 4: Reshuffling of bits during Reverse mapping Process [49] Module ReshuffleforReversemapping(ctext, secretkey) Output: plaintext[1…”
Section: Reverse Mapping Algorithmmentioning
confidence: 99%
“…Pseudocode for Reshuffling bits (adopted from[49])Module Reshuffleformapping( mtext, secretkey) Output Atext[1..C]: 1D array of bits Variables Integer: k, col, x, C msg[1..C]: arrays of bits START LET C = LENGTH(mtext) INITIALIZE msg as empty array LET k = 1 FOR col = 1 TO C LET x = secretkey[col] LET msg( k) = mtext[x] LET k = k + 1 END LET atext = mtext DISPLAY atext STOP…”
mentioning
confidence: 99%