Loading

An Improved Version of Playfair Technique
Manish Dhingra1, Gulista Khan2, Kamal Kumar Gola3

1Manish Dhingra, Faculty of Engineering, Teerthanker Mahaveer University, Moradabad, 244001, India.
2Gulista Khan, Faculty of Engineering, Teerthanker Mahaveer University, Moradabad, 244001, India.
3Kamal Kumar Gola, Faculty of Engineering, Teerthanker Mahaveer University, Moradabad, 244001, India.

Manuscript received on 30 June 2019 | Revised Manuscript received on 05 July 2019 | Manuscript published on 30 July 2019 | PP: 2581-2585 | Volume-8 Issue-9, July 2019 | Retrieval Number: I8552078919/19©BEIESP | DOI: 10.35940/ijitee.I8552.078919
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Encryption which is defined as a process which converts plain text into a coded form i.e. which is in an unreadable form, so that no one can extract it or read it. It is very important to keep our data safe. There are a lot of techniques which are used for this purpose. Playfair technique is one of them. Playfair technique is used for the encryption of data. Playfair technique allows the existence of alphabets (upper case and lower case both), integer value and special symbol. In many algorithms only alphabets is used, most of the algorithm used alphabets as well as integer value and so on. Playfair techniques consider the plain text as single unit and convert the plain text into cipher text. The use of this technique is a challenge to the attack to understand the text and then decrypt it. Some time it may be possible for the attacker to understand the plaintext due to their weak matrix and key. To overcome this problem, this work proposes a technique that enhances the security of play fair technique using rectangular and substitution matrix. This work uses 8*8 matrices that contain alphabets, integers and special symbols. The objective of this work is to provide security for the data that contain alphabets, integer value as well as special symbols during transmission.
Keywords: Rectangular Matrix, Substitution Matrix, Gray Coder, Encryption and Decryption and Key Compression.

Scope of the Article: Software Engineering Techniques and Production Perspectives