Journal articles on the topic 'Playfair cipher algorithm'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 48 journal articles for your research on the topic 'Playfair cipher algorithm.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Din, Maiya, Saibal K. Pal, S. K. Muttoo, and Sushila Madan. "A Hybrid Computational Intelligence based Technique for Automatic Cryptanalysis of Playfair Ciphers." Defence Science Journal 70, no. 6 (2020): 612–18. http://dx.doi.org/10.14429/dsj.70.15749.
Full textRobbi, Rahim, and Ikhwan Ali. "Cryptography Technique with Modular Multiplication Block Cipher and Playfair Cipher." International Journal of Scientific Research in Science and Technology (IJSRST) 2, no. 6 (2016): 71–78. https://doi.org/10.5281/zenodo.239080.
Full textPanjaitan, Fredryk. "Implementation Of Hybrid Cryptography Algorithm RSA-CRT And Play Fair Cipher In Image File Security." Journal Basic Science and Technology 11, no. 1 (2022): 15–22. http://dx.doi.org/10.35335/jbst.v11i1.1771.
Full textPristiwanto, Pristiwanto, Heri Sunandar, and Berto Nadeak. "Analysis and Implementation of PlayFair Chipper Algorithm in Text Data Encoding Process." Jurnal Info Sains : Informatika dan Sains 10, no. 2 (2020): 19–23. http://dx.doi.org/10.54209/infosains.v10i2.33.
Full textGalih Agustian Perdana, Carudin, and Rini Mayasari. "Implementasi Algoritma Kriptografi Playfair Cipher untuk Mengamankan Data Aset." Jurnal Informatika Polinema 7, no. 2 (2021): 109–14. http://dx.doi.org/10.33795/jip.v7i2.394.
Full textPrasetyo, Eko, and Yessi Fitri Annisah Lubis. "Optimasi Keamanan Hasil Enkripsi Algoritma Playfair Cipher ke dalam Kode Morse." JiTEKH 11, no. 1 (2023): 41–50. http://dx.doi.org/10.35447/jitekh.v11i1.703.
Full textQurban, Luheb. "Arabic and English Texts Encryption Using Modified Playfair Algorithm." Wasit Journal for Pure sciences 3, no. 1 (2024): 74–82. http://dx.doi.org/10.31185/wjps.285.
Full textHafiz Nanda Ginting, Subhan, Muhammad Rhifky Wayahdi, and Surya Guntur. "Playfair Cipher Algorithm in Learning Media." Jurnal Minfo Polgan 11, no. 1 (2022): 9–14. http://dx.doi.org/10.33395/jmp.v11i1.11560.
Full textPatel, Yash. "MODIFYING PLAYFAIR CIPHER WITH PADDING." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 008 (2024): 1–2. http://dx.doi.org/10.55041/ijsrem37235.
Full textHermansa, Rusydi Umar, and Anton Yudhana. "Implementation of Playfair Cipher and Least Significant Bit Algorithms in Digital Imagery." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 4, no. 3 (2020): 454–61. http://dx.doi.org/10.29207/resti.v4i3.1877.
Full textRauf, Budi Wijaya. "Kombinasi Steganografi Bit Matching dan Kriptografi Playfair Cipher, Hill Cipher dan Blowfish." Jurnal Teknologi Informasi 4, no. 2 (2020): 228–33. http://dx.doi.org/10.36294/jurti.v4i2.1346.
Full textAltamimi, Ammar Sabeeh Hmoud, and Ali Mohsin Kaittan. "A Proposed Arabic Text Encryption Method Using Multiple Ciphers." Webology 18, Special Issue 04 (2021): 319–26. http://dx.doi.org/10.14704/web/v18si04/web18131.
Full textMohammed Sami Mohammed. "Novel Method Using Crossover (Genetic Algorithms) With Matrix Technique to Modifying Ciphering by Using Playfair." Diyala Journal of Engineering Sciences 6, no. 3 (2013): 97–106. http://dx.doi.org/10.24237/djes.2013.06307.
Full textAgusfrianto, Fakhry Asad, Lukita Ambarwati, and Yudi Mahatma. "Modifikasi algoritma Hill cipher dengan matriks kunci berupa matriks ketetanggaan." Majalah Ilmiah Matematika dan Statistika 23, no. 2 (2023): 106. http://dx.doi.org/10.19184/mims.v23i2.36346.
Full textIbrahim, Abde Al-jalil Sholi, and A. Mohamed Mohamad. "Modifying playfair cipher algorithm using KAJ spiral method to fit any language regardless of the number of characters." Modifying playfair cipher algorithm using KAJ spiral method to fit any language regardless of the number of characters 9, no. 6 (2019): 5400–5411. https://doi.org/10.11591/ijece.v9i6.pp5400-5411.
Full textAzizah, Luthfi Nur. "How Can Playfair Cipher Secure Data?" Proceeding International Conference on Science and Engineering 3 (April 30, 2020): 273–77. http://dx.doi.org/10.14421/icse.v3.512.
Full textHabib, Hamza. "Modifying Playfair Cipher Algorithm by using Legendre Symbol." Diyala Journal For Pure Science 15, no. 4 (2019): 76–87. http://dx.doi.org/10.24237/djps.15.04.502a.
Full textKako, Najdavan Abduljawad, Haval Tariq Sadeeq, and Araz Rajab Abrahim. "New symmetric key cipher capable of digraph to single letter conversion utilizing binary system." Indonesian Journal of Electrical Engineering and Computer Science 18, no. 2 (2020): 1028. http://dx.doi.org/10.11591/ijeecs.v18.i2.pp1028-1034.
Full textNajdavan, Abduljawad Kako, Tariq Sadeeq Haval, and Rajab Abrahim Araz. "New symmetric key cipher capable of digraph to single letter conversion utilizing binary system." Indonesian Journal of Electrical Engineering and Computer Science (IJEECS) 18, no. 2 (2020): 1028–34. https://doi.org/10.11591/ijeecs.v18.i2.pp1028-1034.
Full textSholi, Ibrahim A., and Mohamad A. Mohamed. "Modifying playfair cipher algorithm using KAJ spiral method to fit any language regardless of the number of characters." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 6 (2019): 5400. http://dx.doi.org/10.11591/ijece.v9i6.pp5400-5411.
Full textAlawiyah, Tuti, Agung Baitul Hikmah, Wildan Wiguna, Mira Kusmira, Herlan Sutisna, and Bambang Kelana Simpony. "Generation of Rectangular Matrix Key for Hill Cipher Algorithm Using Playfair Cipher." Journal of Physics: Conference Series 1641 (November 2020): 012094. http://dx.doi.org/10.1088/1742-6596/1641/1/012094.
Full textHamad, Safwat, Amal Khalifa, Ahmed Elhadad, and Saad Rida. "A Modified Playfair Cipher for Encrypting Digital Images." Journal of Communications and Computer Engineering 3, no. 2 (2014): 1. http://dx.doi.org/10.20454/jcce.2013.731.
Full textAl Akbar, Arief, Muhammad Taufiq Sumadi, and Faldi Faldi. "IMPLEMENTATION OF LSB AND PLAYFAIR METHODS TO SECURE TEXT FILES INTO WAV AUDIO FILES." Jurnal Teknik Informatika (Jutif) 5, no. 6 (2024): 1529–37. https://doi.org/10.52436/1.jutif.2024.5.6.1793.
Full textAtito, Ahmed, A. Khalifa, and S. Z. Rida. "DNA-Based Data Encryption and Hiding Using Playfair and Insertion Techniques." Journal of Communications and Computer Engineering 2, no. 3 (2011): 44. http://dx.doi.org/10.20454/jcce.2012.242.
Full textNewroz Nooralddin Abdulrazaq. "Generating of A Dynamic and Secure S-Box for AES Block Cipher System Based on Modified Hexadecimal Playfair Cipher." Zanco Journal of Pure and Applied Sciences 36, no. 5 (2024): 82–94. http://dx.doi.org/10.21271/zjpas.36.5.8.
Full textHardi, S. M., J. T. Tarigan, and N. Safrina. "Hybrid cryptosystem for image file using elgamal and double playfair cipher algorithm." Journal of Physics: Conference Series 978 (March 2018): 012068. http://dx.doi.org/10.1088/1742-6596/978/1/012068.
Full textAmalia, M. A. Budiman, and R. Sitepu. "File text security using Hybrid Cryptosystem with Playfair Cipher Algorithm and Knapsack Naccache-Stern Algorithm." Journal of Physics: Conference Series 978 (March 2018): 012114. http://dx.doi.org/10.1088/1742-6596/978/1/012114.
Full textPriyatna, Bayu, and April Lia Hananto. "Password Data Authentication Using a Combination of MD5 and Playfair Cipher Matrix 13x13." Buana Information Technology and Computer Sciences (BIT and CS) 1, no. 2 (2020): 33–36. http://dx.doi.org/10.36805/bit-cs.v1i2.980.
Full textAnwar, Md Navid Bin, and Maherin Mizan Maha. "AMPC: A Lightweight Hybrid Cryptographic Algorithm for Wireless Sensor Networks." International Journal of Innovative Science and Research Technology 5, no. 6 (2020): 1142–46. http://dx.doi.org/10.38124/ijisrt20jun975.
Full textChowdhary, Chiranji Lal, Pushpam Virenbhai Patel, Krupal Jaysukhbhai Kathrotia, Muhammad Attique, Kumaresan Perumal, and Muhammad Fazal Ijaz. "Analytical Study of Hybrid Techniques for Image Encryption and Decryption." Sensors 20, no. 18 (2020): 5162. http://dx.doi.org/10.3390/s20185162.
Full textPutri, Ananda Dwi, Dian Rachmawati, and Heriyance Heriyance. "Analisis Dan Implementasi Algoritma Kriptografi Playfair Chiper Dan Algoritma Kompresi Run Length Encoding Dalam Pengamanan Dan Kompresi Data Teks." Talenta Conference Series: Science and Technology (ST) 1, no. 1 (2018): 069–77. http://dx.doi.org/10.32734/st.v1i1.191.
Full textCowan, Michael J. "Breaking Short Playfair Ciphers with the Simulated Annealing Algorithm." Cryptologia 32, no. 1 (2008): 71–83. http://dx.doi.org/10.1080/01611190701743658.
Full textAbdul, Haseeb A., Premraj E.P Neethu, Nehla, P.K Sruthi, and Hrudya K.P Mentor-. "HYBRID DNA BASED STEGNOGRAPHY." International Journal of Advances in Engineering & Scientific Research 3, no. 5 (2016): 37–43. https://doi.org/10.5281/zenodo.10774396.
Full textMhatre, Sahil. "Securing Text Files: A Comprehensive Study on AES and Diffie-Hellman Encryption." International Journal for Research in Applied Science and Engineering Technology 12, no. 6 (2024): 2192–99. http://dx.doi.org/10.22214/ijraset.2024.63457.
Full textMustafa, Dhiaa Al-Hassani, and Talib Gaata Methaq. "Development of playfair cryptosystem based on generation a multi-dimensional key matrix." Bulletin of Electrical Engineering and Informatics 12, no. 3 (2023): 1849~1856. https://doi.org/10.11591/eei.v12i3.5052.
Full textWijayanti, Dian Eka, and Wulansari Romadlon. "Keamanan Pesan Menggunakan Kriptografi dan Steganografi Least Significant Bit pada File Citra Digital." Euler : Jurnal Ilmiah Matematika, Sains dan Teknologi 10, no. 2 (2022): 181–92. http://dx.doi.org/10.34312/euler.v10i2.16646.
Full textAbdulkhaleq Noaman, Salam. "Adaptive playfair cipher Crypto algorithm." Journal of Al-Qadisiyah for computer science and mathematics 9, no. 2 (2017). http://dx.doi.org/10.29304/jqcm.2017.9.2.320.
Full textMittal, Yash. "Improved Playfair Cipher Algorithm." SSRN Electronic Journal, 2020. http://dx.doi.org/10.2139/ssrn.3584686.
Full textSuhael, Saja Mohammed, Zaynab Anwer Ahmed, and Abir Jaafer Hussain. "Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem." Baghdad Science Journal, May 20, 2023. http://dx.doi.org/10.21123/bsj.2023.8361.
Full textPermanasari, Yurika, and Erwin Harahap. "Kriptografi Polyalphabetic." Matematika 17, no. 1 (2018). http://dx.doi.org/10.29313/jmtm.v17i1.4065.
Full textM. Marzan, Richard. "Randomness Analysis on Enhanced Key Security of Playfair Cipher Algorithm." International Journal of Advanced Trends in Computer Science and Engineering, August 25, 2019, 1248–53. http://dx.doi.org/10.30534/ijatcse/2019/34842019.
Full text"Enhancing Security in Cloud Computing using Playfair and Ceasar Cipher in Substitution Techniques." International Journal of Innovative Technology and Exploring Engineering 9, no. 4 (2020): 912–20. http://dx.doi.org/10.35940/ijitee.d1363.029420.
Full text"An Improved Version of Playfair Technique." International Journal of Innovative Technology and Exploring Engineering 8, no. 9 (2019): 2581–85. http://dx.doi.org/10.35940/ijitee.i8552.078919.
Full textLawal, Ibrahim, Musa Yusuf, Adamu Sulaiman Usman, and Oluwasegun Ishaya Adelaiye. "A lightweight 256 hexadecimal character substitution Cipher algorithm." Journal of Electrical Systems and Information Technology 12, no. 1 (2025). https://doi.org/10.1186/s43067-025-00217-w.
Full textSugirtham, N., R. Sherine Jenny, B. Thiyaneswaran, et al. "Modified Playfair for Text File Encryption and Meticulous Decryption with Arbitrary Fillers by Septenary Quadrate Pattern." International Journal of Networked and Distributed Computing, February 1, 2024. http://dx.doi.org/10.1007/s44227-023-00019-4.
Full text"Client/Server Model of Data Privacy using Extended Playfair Cipher for SaaS Applications on the Cloud." VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE 8, no. 10 (2019): 1933–36. http://dx.doi.org/10.35940/ijitee.j9274.0881019.
Full textHarjito, Bambang, Dwiko Satriyo.U.Y.S, and Faisal Rahutomo. "Analysis and Implementation of Steganography Using Playfair Techniques and DNA Substitution To Improve Message Security." Khazanah Informatika : Jurnal Ilmu Komputer dan Informatika 9, no. 1 (2023). http://dx.doi.org/10.23917/khif.v9i1.18259.
Full textReddy, Gottam Ravi Teja, Gudipati Harsha Vardhan, Thota Nagesh, and D. S. R. Murthy. "Secured Personal Notes Application using PlayFair Cipher 8 x 8 Matrix." International Journal of Computer and Information Technology(2279-0764) 13, no. 1 (2024). https://doi.org/10.24203/37nevj90.
Full text