To see the other types of publications on this topic, follow the link: Playfair cipher algorithm.

Journal articles on the topic 'Playfair cipher algorithm'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 48 journal articles for your research on the topic 'Playfair cipher algorithm.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Din, Maiya, Saibal K. Pal, S. K. Muttoo, and Sushila Madan. "A Hybrid Computational Intelligence based Technique for Automatic Cryptanalysis of Playfair Ciphers." Defence Science Journal 70, no. 6 (2020): 612–18. http://dx.doi.org/10.14429/dsj.70.15749.

Full text
Abstract:
The Playfair cipher is a symmetric key cryptosystem-based on encryption of digrams of letters. The cipher shows higher cryptanalytic complexity compared to mono-alphabetic cipher due to the use of 625 different letter-digrams in encryption instead of 26 letters from Roman alphabets. Population-based techniques like Genetic algorithm (GA) and Swarm intelligence (SI) are more suitable compared to the Brute force approach for cryptanalysis of cipher because of specific and unique structure of its Key Table. This work is an attempt to automate the process of cryptanalysis using hybrid computationa
APA, Harvard, Vancouver, ISO, and other styles
2

Robbi, Rahim, and Ikhwan Ali. "Cryptography Technique with Modular Multiplication Block Cipher and Playfair Cipher." International Journal of Scientific Research in Science and Technology (IJSRST) 2, no. 6 (2016): 71–78. https://doi.org/10.5281/zenodo.239080.

Full text
Abstract:
There are many data security techniques like a cryptography, there are many algorithm like a MMB (Modular Multiplication Block Cipher) and Playfair Cipher. MMB operates using 128-bit plaintext, but it also uses 32-bit subblock MMB text (x0, x1, x2, x3) and 32-bit key subblock (k0, k1, k2, k3) and then the fundamental of this algorithm is determined by a multiplication modulo operation 2<sup>32</sup>-1. Different from MMB, playfair cipher is a diagram substitution cipher which takes two letter from message and replace with two another pair letter, this paper combines playfair cipher as a key su
APA, Harvard, Vancouver, ISO, and other styles
3

Panjaitan, Fredryk. "Implementation Of Hybrid Cryptography Algorithm RSA-CRT And Play Fair Cipher In Image File Security." Journal Basic Science and Technology 11, no. 1 (2022): 15–22. http://dx.doi.org/10.35335/jbst.v11i1.1771.

Full text
Abstract:
The development of technology currently allows everyone to exchange information without any limitations of time and distance. The possibility that will happen is the existence of data leakage during the process of information exchange conducted. Therefore in the data transmission, especially image, security aspects, confidentiality and efficiency of data storage are necessary. If the important information falls into the wrong hands, it will cause undesirable things, for example image manipulation with a negative shape and can harm the image owner. One of the methods used to maintain the securi
APA, Harvard, Vancouver, ISO, and other styles
4

Pristiwanto, Pristiwanto, Heri Sunandar, and Berto Nadeak. "Analysis and Implementation of PlayFair Chipper Algorithm in Text Data Encoding Process." Jurnal Info Sains : Informatika dan Sains 10, no. 2 (2020): 19–23. http://dx.doi.org/10.54209/infosains.v10i2.33.

Full text
Abstract:
This research discusses the implementation of Playfair Cipher to encode text data. Playfair Cipher is one of the classic cryptographic algorithms that use symmetry keys. Originally invented by Sir Charles Wheatstone and Baron Lyon Playfair, the algorithm used a 5x5 keyboard to encrypt and decrypt. The process of encryption and decryption is done by grouping the letters in a bigram. By using a 5x5 keyboard, we can encrypt plaintext (original text data to be encrypted) and decrypt the ciphertext (encrypted text data) by grouping it by removing the letter J from plaintext. The keypad is generated
APA, Harvard, Vancouver, ISO, and other styles
5

Galih Agustian Perdana, Carudin, and Rini Mayasari. "Implementasi Algoritma Kriptografi Playfair Cipher untuk Mengamankan Data Aset." Jurnal Informatika Polinema 7, no. 2 (2021): 109–14. http://dx.doi.org/10.33795/jip.v7i2.394.

Full text
Abstract:
Data is very important for humans, data is also needed to collect information. But given that cybercrime crime has occurred in the digital era today. Therefore, data security is very important to be considered. Inside the company has important data. One of the companies in Karawang, namely PT Adyawinsa Stamping Industries, has a data input application that is the company's asset data. Many data crime problems make database systems vulnerable to manipulation. Therefore, the implementation of data security for asset data is implemented using Playfair Cipher cryptography. The Playfair Cipher encr
APA, Harvard, Vancouver, ISO, and other styles
6

Prasetyo, Eko, and Yessi Fitri Annisah Lubis. "Optimasi Keamanan Hasil Enkripsi Algoritma Playfair Cipher ke dalam Kode Morse." JiTEKH 11, no. 1 (2023): 41–50. http://dx.doi.org/10.35447/jitekh.v11i1.703.

Full text
Abstract:
Improving the security of cryptosystems is a challenge that attracts many researchers to propose and develop new cryptosystems to achieve cryptographic goals. In addition to implementing new cryptographic algorithms, the way that can be done is to modify, combine algorithms or even add other methods to improve existing cryptographic algorithms. Playfair Cipher is a cryptographic algorithm that has long been known and is still widely used and studied today. To optimize or strengthen the confidentiality of data from encryption (ciphertext) using the Playfair Cipher algorithm, research will be ca
APA, Harvard, Vancouver, ISO, and other styles
7

Qurban, Luheb. "Arabic and English Texts Encryption Using Modified Playfair Algorithm." Wasit Journal for Pure sciences 3, no. 1 (2024): 74–82. http://dx.doi.org/10.31185/wjps.285.

Full text
Abstract:
To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets i
APA, Harvard, Vancouver, ISO, and other styles
8

Hafiz Nanda Ginting, Subhan, Muhammad Rhifky Wayahdi, and Surya Guntur. "Playfair Cipher Algorithm in Learning Media." Jurnal Minfo Polgan 11, no. 1 (2022): 9–14. http://dx.doi.org/10.33395/jmp.v11i1.11560.

Full text
Abstract:
The level of security and confidentiality of information / data becomes very important in the era of increasingly sophisticated and developing technology. Cryptographic methods can be one solution to overcome problems in the level of security and confidentiality of information. However, knowledge about cryptography is still a lot of audiences who do not know and understand its use in securing the secrets of information, for that we need an application which presents a learning media that is expected to help provide knowledge from cryptography. This study implements a learning media application
APA, Harvard, Vancouver, ISO, and other styles
9

Patel, Yash. "MODIFYING PLAYFAIR CIPHER WITH PADDING." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 008 (2024): 1–2. http://dx.doi.org/10.55041/ijsrem37235.

Full text
Abstract:
There are billions and trillions of pieces of data being produced at any given time because to the internet. The majority of it is connected to the financial industry, the intelligence sector, or perhaps personal information about people and the country. Therefore, it is essential to safeguard and protect it. Data is encrypted using cryptography, which also secures its transmission over the internet. Different methods have developed over time to cypher the original text. The most used cryptographic algorithm is the Playfair algorithm. However, it is exploited by brute force. By altering the ma
APA, Harvard, Vancouver, ISO, and other styles
10

Hermansa, Rusydi Umar, and Anton Yudhana. "Implementation of Playfair Cipher and Least Significant Bit Algorithms in Digital Imagery." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 4, no. 3 (2020): 454–61. http://dx.doi.org/10.29207/resti.v4i3.1877.

Full text
Abstract:
Message security is very important now. Because security is part of the privacy of someone who wants to protect messages from those who do not have the right to read or receive them. The method used for securing information messages with message encryption and decryption techniques is the Playfair Cipher algorithm combined with the Least Significant Bit (LSB) method. In this study it was found that the Playfair Cipher algorithm is quite safe in implementing cryptographic encryption or ciphertext because the playfair cipher has a level of appearance of letters that is so difficult to predict so
APA, Harvard, Vancouver, ISO, and other styles
11

Rauf, Budi Wijaya. "Kombinasi Steganografi Bit Matching dan Kriptografi Playfair Cipher, Hill Cipher dan Blowfish." Jurnal Teknologi Informasi 4, no. 2 (2020): 228–33. http://dx.doi.org/10.36294/jurti.v4i2.1346.

Full text
Abstract:
Abstract - To secure data, cryptographic techniques are needed, but many cryptographic methods are vulnerable that require attacks. But not with the Blowfish method which includes a symmetric key algorithm that has the same key to encrypt and decrypt data. The blowfish algorithm is a block cipher and until now. Blowfish is still superior in the field of strength endurance will receive attacks from outside by people who are not responsible. In this study, a test will be carried out to see the time used to make a suitable steganographic combination and to combine several cryptographic methods su
APA, Harvard, Vancouver, ISO, and other styles
12

Altamimi, Ammar Sabeeh Hmoud, and Ali Mohsin Kaittan. "A Proposed Arabic Text Encryption Method Using Multiple Ciphers." Webology 18, Special Issue 04 (2021): 319–26. http://dx.doi.org/10.14704/web/v18si04/web18131.

Full text
Abstract:
Most encryption techniques are deals with English language, but that deals with Arabic language are few. Therefore, many researchers interests with encryption ciphers that applied on text which wrote in Arabic language. This reason is behind this paper. In this paper, there are three cipher methods implemented together on Arabic text. Using more than one cipher method is increase the security of algorithm used. Each letter of plaintext is encrypted by a specified cipher method. Selection process of one of three cipher methods used in this work is done by controlling process that selects one ci
APA, Harvard, Vancouver, ISO, and other styles
13

Mohammed Sami Mohammed. "Novel Method Using Crossover (Genetic Algorithms) With Matrix Technique to Modifying Ciphering by Using Playfair." Diyala Journal of Engineering Sciences 6, no. 3 (2013): 97–106. http://dx.doi.org/10.24237/djes.2013.06307.

Full text
Abstract:
Two techniques combined with each other, to get complex one. One from technique of genetic algorithm (GA) and the other is PlayFair cipher method, in this research using one step of Genetic Algorithm (GA) which called Crossover to make offspring of two parents (characters) to get one or two new character by using these techniques then using PlayFair technique to cipher text (plain text). So the person who wants to break code, two techniques must know.This research is a novel method of ciphering by getting a new generation of offspring from two characters, when we give a new theory of symbols a
APA, Harvard, Vancouver, ISO, and other styles
14

Agusfrianto, Fakhry Asad, Lukita Ambarwati, and Yudi Mahatma. "Modifikasi algoritma Hill cipher dengan matriks kunci berupa matriks ketetanggaan." Majalah Ilmiah Matematika dan Statistika 23, no. 2 (2023): 106. http://dx.doi.org/10.19184/mims.v23i2.36346.

Full text
Abstract:
Cryptography is one of the parts in mathematics, especially applied mathematics. Cryptography is the science that studies how to secure information that we don't want others to know about the information we have. Based on the development of the times, cryptography is divided into two consisting of classical cryptography and modern cryptography. In this paper, the focus of discussion is on classical cryptography. Furthermore, there are many kinds of classical cryptographic algorithms, such as the Caesar cipher algorithm, the Playfair cipher algorithm, the Vigenere cipher algorithm, and the Hill
APA, Harvard, Vancouver, ISO, and other styles
15

Ibrahim, Abde Al-jalil Sholi, and A. Mohamed Mohamad. "Modifying playfair cipher algorithm using KAJ spiral method to fit any language regardless of the number of characters." Modifying playfair cipher algorithm using KAJ spiral method to fit any language regardless of the number of characters 9, no. 6 (2019): 5400–5411. https://doi.org/10.11591/ijece.v9i6.pp5400-5411.

Full text
Abstract:
In this paper we proposed KAJ Spiral method for supporting PlayFair cipher algorithm to use languages other than English and utilize block with more than two characters at once. Original method does not support block of characters and other languages. The method uses a spiral shape with two axes (X, Y) and the letters are spread on the axis within circles depending on the language. We use Friedman method analysis (index of coincidence) as a tool to test and prove the efficiency of KAJ Spiral method, and we found that it is at least equally secure to the original PlayFair cipher. The aims of th
APA, Harvard, Vancouver, ISO, and other styles
16

Azizah, Luthfi Nur. "How Can Playfair Cipher Secure Data?" Proceeding International Conference on Science and Engineering 3 (April 30, 2020): 273–77. http://dx.doi.org/10.14421/icse.v3.512.

Full text
Abstract:
Cryptography plays an important role in the digital world today. Information can be mathematically secured by the message sender with a key. The intended sender's privacy and recipient's information will be protected from eavesdroppers. The purpose of this paper is to find out how to secure data using a playfair cipher with a 16 X 16 matrix. This algorithm will provide the power to playfair cipher. The encryption and decryption process in cryptography uses keywords that have been agreed upon by the sender and recipient of the message. Entries of this matrix are large and small alphabet letters
APA, Harvard, Vancouver, ISO, and other styles
17

Habib, Hamza. "Modifying Playfair Cipher Algorithm by using Legendre Symbol." Diyala Journal For Pure Science 15, no. 4 (2019): 76–87. http://dx.doi.org/10.24237/djps.15.04.502a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Kako, Najdavan Abduljawad, Haval Tariq Sadeeq, and Araz Rajab Abrahim. "New symmetric key cipher capable of digraph to single letter conversion utilizing binary system." Indonesian Journal of Electrical Engineering and Computer Science 18, no. 2 (2020): 1028. http://dx.doi.org/10.11591/ijeecs.v18.i2.pp1028-1034.

Full text
Abstract:
In this paper, a new Playfair cipher built on bits level symmetric key cryptographic was proposed for the purpose of converting pairs of letters (digraphs) into single letters. The proposed algorithm is capable to overcome many of the shortcoming and vulnerabilities that exist in the current classical version of Playfair algorithm. The Playfair cipher is exceedingly complex than a classical substitution cipher, but still simple to hack using automated tactics. It is famous as a digraph cipher because two letters are exchanged by other two letters. This destroys any solo letter occurrence stati
APA, Harvard, Vancouver, ISO, and other styles
19

Najdavan, Abduljawad Kako, Tariq Sadeeq Haval, and Rajab Abrahim Araz. "New symmetric key cipher capable of digraph to single letter conversion utilizing binary system." Indonesian Journal of Electrical Engineering and Computer Science (IJEECS) 18, no. 2 (2020): 1028–34. https://doi.org/10.11591/ijeecs.v18.i2.pp1028-1034.

Full text
Abstract:
In this paper, a new Playfair cipher built on bits level symmetric key cryptographic was proposed for the purpose of converting pairs of letters (digraphs) into single letters. The proposed algorithm is capable to overcome many of the shortcoming and vulnerabilities that exist in the current classical version of Playfair algorithm. The Playfair cipher is exceedingly complex than a classical substitution cipher, but still simple to hack using automated tactics. It is famous as a digraph cipher because two letters are exchanged by other two letters. This destroys any solo letter occurrence stati
APA, Harvard, Vancouver, ISO, and other styles
20

Sholi, Ibrahim A., and Mohamad A. Mohamed. "Modifying playfair cipher algorithm using KAJ spiral method to fit any language regardless of the number of characters." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 6 (2019): 5400. http://dx.doi.org/10.11591/ijece.v9i6.pp5400-5411.

Full text
Abstract:
In this paper we proposed KAJ Spiral method for supporting PlayFair cipher algorithm to use languages other than English and utilize block with more than two characters at once. Original method does not support block of characters and other languages. The method uses a spiral shape with two axes (X, Y) and the letters are spread on the axis within circles depending on the language. We use Friedman method analysis (index of coincidence) as a tool to test and prove the efficiency of KAJ Spiral method, and we found that it is at least equally secure to the original PlayFair cipher. The aims of th
APA, Harvard, Vancouver, ISO, and other styles
21

Alawiyah, Tuti, Agung Baitul Hikmah, Wildan Wiguna, Mira Kusmira, Herlan Sutisna, and Bambang Kelana Simpony. "Generation of Rectangular Matrix Key for Hill Cipher Algorithm Using Playfair Cipher." Journal of Physics: Conference Series 1641 (November 2020): 012094. http://dx.doi.org/10.1088/1742-6596/1641/1/012094.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Hamad, Safwat, Amal Khalifa, Ahmed Elhadad, and Saad Rida. "A Modified Playfair Cipher for Encrypting Digital Images." Journal of Communications and Computer Engineering 3, no. 2 (2014): 1. http://dx.doi.org/10.20454/jcce.2013.731.

Full text
Abstract:
In this paper, a new extension of the Playfair cipher algorithm is proposed to encrypt image data more securely. The proposed method constructs a 16×16 secret key matrix to scramble image data byte by byte. In addition, the algorithm complexity is increased using masking and XOR procedure. That is, the key is used to generate a mask that is subsequently XORed with the scrambled image. Experimental results showed that using two slightly different secret keys, the resultant encrypted images are still completely different.
APA, Harvard, Vancouver, ISO, and other styles
23

Al Akbar, Arief, Muhammad Taufiq Sumadi, and Faldi Faldi. "IMPLEMENTATION OF LSB AND PLAYFAIR METHODS TO SECURE TEXT FILES INTO WAV AUDIO FILES." Jurnal Teknik Informatika (Jutif) 5, no. 6 (2024): 1529–37. https://doi.org/10.52436/1.jutif.2024.5.6.1793.

Full text
Abstract:
In the rapidly evolving digital communication era, the demand for information security is escalating. Three main security techniques are required: cryptography, watermarking, and steganography. Despite cryptography and watermarking having detectability weaknesses, steganography emerges as a more reliable choice as it can conceal messages across various media without arousing suspicion. This article discusses the utilization of steganography, particularly the Least Significant Bit (LSB) technique, for embedding messages within audio wave files as the medium. In this research, the author combine
APA, Harvard, Vancouver, ISO, and other styles
24

Atito, Ahmed, A. Khalifa, and S. Z. Rida. "DNA-Based Data Encryption and Hiding Using Playfair and Insertion Techniques." Journal of Communications and Computer Engineering 2, no. 3 (2011): 44. http://dx.doi.org/10.20454/jcce.2012.242.

Full text
Abstract:
In this paper, we propose a novel algorithm to communicate data securely. The proposed technique is a composition of both encryption and data hiding using some properties of Deoxyribonucleic Acid (DNA) sequences. Hence, the proposed scheme consists mainly of two phases. In the first phase, the secret data is encrypted using a DNA and Amino Acids-Based Playfair cipher. While in the second phase the encrypted data is steganographically hidden into some reference DNA sequence using an insertion technique.The proposed algorithm can successfully work on any binary data since it is actually transfor
APA, Harvard, Vancouver, ISO, and other styles
25

Newroz Nooralddin Abdulrazaq. "Generating of A Dynamic and Secure S-Box for AES Block Cipher System Based on Modified Hexadecimal Playfair Cipher." Zanco Journal of Pure and Applied Sciences 36, no. 5 (2024): 82–94. http://dx.doi.org/10.21271/zjpas.36.5.8.

Full text
Abstract:
In today's digital world, the extensive use of devices, including smartphones, tablets, IoT devices, and the internet, emphasizes the necessity for strong security measures. These measures are essential to safeguard both user data and sensitive government information. As technology advances, the enhancement of cryptographic methods becomes imperative, ensuring alignment with this rapid progression. This paper introduces a novel approach to encrypting classified data using the modified AES cipher system. It employs a dynamic and secure substitution byte operation with a 4×4 matrix, replacing th
APA, Harvard, Vancouver, ISO, and other styles
26

Hardi, S. M., J. T. Tarigan, and N. Safrina. "Hybrid cryptosystem for image file using elgamal and double playfair cipher algorithm." Journal of Physics: Conference Series 978 (March 2018): 012068. http://dx.doi.org/10.1088/1742-6596/978/1/012068.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Amalia, M. A. Budiman, and R. Sitepu. "File text security using Hybrid Cryptosystem with Playfair Cipher Algorithm and Knapsack Naccache-Stern Algorithm." Journal of Physics: Conference Series 978 (March 2018): 012114. http://dx.doi.org/10.1088/1742-6596/978/1/012114.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Priyatna, Bayu, and April Lia Hananto. "Password Data Authentication Using a Combination of MD5 and Playfair Cipher Matrix 13x13." Buana Information Technology and Computer Sciences (BIT and CS) 1, no. 2 (2020): 33–36. http://dx.doi.org/10.36805/bit-cs.v1i2.980.

Full text
Abstract:
Data security and confidentiality are the most important things that must be considered in information systems. To protect the cryptographic algorithm reliability it uses. MD5 is one technique that is widely used in password data security issues, which algorithm has many advantages including. MD5 has a one-way hash function so that the message has been converted to a message digest, and it is complicated to restore it to the original message (plaintext). In addition to the advantages of MD5 also has a variety of shortcomings including; very easy to solve because MD5 has a fixed encryption resu
APA, Harvard, Vancouver, ISO, and other styles
29

Anwar, Md Navid Bin, and Maherin Mizan Maha. "AMPC: A Lightweight Hybrid Cryptographic Algorithm for Wireless Sensor Networks." International Journal of Innovative Science and Research Technology 5, no. 6 (2020): 1142–46. http://dx.doi.org/10.38124/ijisrt20jun975.

Full text
Abstract:
Wireless sensor network (WSN) is a group of several autonomous sensor nodes attached to each other. Wireless sensor networks are commonly used in a lot of applications and are expected to have a cheap deployment cost. The network of sensors continues to grow aiding the need of the system. Due to that, sensors become vulnerable to attacks and need strong security mechanism. To strengthen the security of data which are transmitted through sensors in WSN, different cryptographic schemes are used. As WSN has limited energy source, therefore, complex cryptographic algorithms may require excessive c
APA, Harvard, Vancouver, ISO, and other styles
30

Chowdhary, Chiranji Lal, Pushpam Virenbhai Patel, Krupal Jaysukhbhai Kathrotia, Muhammad Attique, Kumaresan Perumal, and Muhammad Fazal Ijaz. "Analytical Study of Hybrid Techniques for Image Encryption and Decryption." Sensors 20, no. 18 (2020): 5162. http://dx.doi.org/10.3390/s20185162.

Full text
Abstract:
The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption and decryption. This paper propose an analysis for performing image encryption and decryption by hybridization of Elliptic Curve Cryptography (ECC) with Hill Cipher (HC), ECC with Advanced Encryption Standard (AES) and ElGamal with Double Playfair Cipher (DPC). This analysis is based on the following parameters: (i) Encryption and decryption ti
APA, Harvard, Vancouver, ISO, and other styles
31

Putri, Ananda Dwi, Dian Rachmawati, and Heriyance Heriyance. "Analisis Dan Implementasi Algoritma Kriptografi Playfair Chiper Dan Algoritma Kompresi Run Length Encoding Dalam Pengamanan Dan Kompresi Data Teks." Talenta Conference Series: Science and Technology (ST) 1, no. 1 (2018): 069–77. http://dx.doi.org/10.32734/st.v1i1.191.

Full text
Abstract:
Komunikasi dan bertukar informasi secara jarak jauh sudah sangat mudah dan praktis. Kemudahan ini menuntut peningkatan keamanan terhadap kerahasiaan data yang dikirim. Kriptografi adalah salah satu cara yang digunakan untuk menjaga kerahasian dari sebuah pesan, dimana pesan disamarkan menjadi sandi. Selain keamanan data yang perlu diperhatikan juga adalah kecepatan dalam pengiriman data tersebut. Kecepatan pengiriman ini tergantung dari ukuran informasi tersebut. Kompresi adalah proses pengubahan sekumpulan data menjadi bentuk kode dengan tujuan untuk menghemat kebutuhan tempat penyimpanan dan
APA, Harvard, Vancouver, ISO, and other styles
32

Cowan, Michael J. "Breaking Short Playfair Ciphers with the Simulated Annealing Algorithm." Cryptologia 32, no. 1 (2008): 71–83. http://dx.doi.org/10.1080/01611190701743658.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Abdul, Haseeb A., Premraj E.P Neethu, Nehla, P.K Sruthi, and Hrudya K.P Mentor-. "HYBRID DNA BASED STEGNOGRAPHY." International Journal of Advances in Engineering & Scientific Research 3, no. 5 (2016): 37–43. https://doi.org/10.5281/zenodo.10774396.

Full text
Abstract:
<strong>Abstract: </strong> &nbsp; <strong>Objective-</strong>The information capacity is growing significantly as well as its level of importance and its transformation rate. In this paper, a blind data hiding hybrid technique is introduced using the concepts of cryptography and steganography in order to achieve double layer secured system. <strong>Phases-</strong>The proposed method consists of two phases: phase one is converting the message to DNA format using the proposed n-bits binary coding rule leading to high algorithm's cracking probability compared with those of other algorithms. Fol
APA, Harvard, Vancouver, ISO, and other styles
34

Mhatre, Sahil. "Securing Text Files: A Comprehensive Study on AES and Diffie-Hellman Encryption." International Journal for Research in Applied Science and Engineering Technology 12, no. 6 (2024): 2192–99. http://dx.doi.org/10.22214/ijraset.2024.63457.

Full text
Abstract:
Abstract: In today's digital landscape, data security is of utmost importance, and cryptography plays a crucial role in safeguarding sensitive information. This review papermeticulously examines recent developments in cryptographic methodologies, covering enhancements in the Playfair cipher, integration of cryptography with steganography for smart devices, advancements in Elliptic Curve Cryptography (ECC), and the efficacy ofAdvanced Encryption Standard (AES) in cloud computing. Additionally, it discusses innovative approaches to mitigating security vulnerabilities, such as RSA DiffieHellman i
APA, Harvard, Vancouver, ISO, and other styles
35

Mustafa, Dhiaa Al-Hassani, and Talib Gaata Methaq. "Development of playfair cryptosystem based on generation a multi-dimensional key matrix." Bulletin of Electrical Engineering and Informatics 12, no. 3 (2023): 1849~1856. https://doi.org/10.11591/eei.v12i3.5052.

Full text
Abstract:
Playfair is considered as one of the classical encryption symmetric methods, it has a limitation of using just 5&times;5 matrix, which means only 25 English letters could be represented. In this work, a 2D and 3D method is adopted as an expanded matrix that encompass the overall American standard code for information interchange (ASCII) codes in a permuted manner for all symbols of any language. Any sort of the multi-dimensional matrix will enhance the security by increasing the complexity on the attacker to try 256! patterns of keys probabilities instead of 25!. The key-matrix is generated fr
APA, Harvard, Vancouver, ISO, and other styles
36

Wijayanti, Dian Eka, and Wulansari Romadlon. "Keamanan Pesan Menggunakan Kriptografi dan Steganografi Least Significant Bit pada File Citra Digital." Euler : Jurnal Ilmiah Matematika, Sains dan Teknologi 10, no. 2 (2022): 181–92. http://dx.doi.org/10.34312/euler.v10i2.16646.

Full text
Abstract:
In the current era, data security disturbances often occur, such as data theft by unwanted people. To overcome security problems can be handled using cryptography and steganography methods. The cryptography process generates random writing that can obscure the message making it difficult for others to read. However, cryptography itself is still too weak to secure messages, so steganography is needed to disguise the existence of the message so that it is not visible to the human eye. Apart from hiding messages, another goal is to know the impact of message insertion. In this study, the encrypti
APA, Harvard, Vancouver, ISO, and other styles
37

Abdulkhaleq Noaman, Salam. "Adaptive playfair cipher Crypto algorithm." Journal of Al-Qadisiyah for computer science and mathematics 9, no. 2 (2017). http://dx.doi.org/10.29304/jqcm.2017.9.2.320.

Full text
Abstract:
A well known cryptographic techniques is Playfair Cryptography, it is considered one of the classical method. After the invention of different techniques, it is easy to break Playfair. This paper proposed some way for removal of the traditional Playfair drawbacks. The Adaptive playfair algorithm proposed in this paper, add more security and complexity to the classical playfair algorithm. In addition to the use of two keys in form of matrices to encrypt the message, the proposed method works depending on using the odd even positions for the every pairs of the letters. The odd pairs encrypt thro
APA, Harvard, Vancouver, ISO, and other styles
38

Mittal, Yash. "Improved Playfair Cipher Algorithm." SSRN Electronic Journal, 2020. http://dx.doi.org/10.2139/ssrn.3584686.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Suhael, Saja Mohammed, Zaynab Anwer Ahmed, and Abir Jaafer Hussain. "Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem." Baghdad Science Journal, May 20, 2023. http://dx.doi.org/10.21123/bsj.2023.8361.

Full text
Abstract:
Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decrypti
APA, Harvard, Vancouver, ISO, and other styles
40

Permanasari, Yurika, and Erwin Harahap. "Kriptografi Polyalphabetic." Matematika 17, no. 1 (2018). http://dx.doi.org/10.29313/jmtm.v17i1.4065.

Full text
Abstract:
Abstrak. Kriptografi polyalphabetic merupakan improvisasi dari teknik substitusi monoalphabetic. Polyalphabetic substitution chiper melakukan teknik kriptografi monoalphabetic satu kali proses untuk suatu plainteks pesan. Algoritma polyalphabetic cipher membuat ciperteks lebih kuat untuk dapat dipecahkan karena karakter plainteks yang sama tidak dienkripsi dengan cipherteks yang sama. Kunci enkripsi polyalphabetic cipher dapat berbeda sehingga mempunyai kemungkinan kombinasi yang lebih bervariasi dan lebih sulit dipecahkan. Metode Vigenere cipher menjadi dasar dari polyalphabetic substitution
APA, Harvard, Vancouver, ISO, and other styles
41

M. Marzan, Richard. "Randomness Analysis on Enhanced Key Security of Playfair Cipher Algorithm." International Journal of Advanced Trends in Computer Science and Engineering, August 25, 2019, 1248–53. http://dx.doi.org/10.30534/ijatcse/2019/34842019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

"Enhancing Security in Cloud Computing using Playfair and Ceasar Cipher in Substitution Techniques." International Journal of Innovative Technology and Exploring Engineering 9, no. 4 (2020): 912–20. http://dx.doi.org/10.35940/ijitee.d1363.029420.

Full text
Abstract:
Cloud Computing is playing the significant role in the existent submissions the humans life. Cloud computing is an extravagant set of conveniently and operative virtualized assets, like as hardware, evolution platforms and utility. Cloud computing is a exclusive generation of the parallel conception. The cloud computing extensibility is a concern of the allotment of revenue on mastery demand. Cloud computing accommodate the operation of uniting. The elevation of the cloud automation also raises the security controversy twice. So, there is a need to solve the security contention in the cloud au
APA, Harvard, Vancouver, ISO, and other styles
43

"An Improved Version of Playfair Technique." International Journal of Innovative Technology and Exploring Engineering 8, no. 9 (2019): 2581–85. http://dx.doi.org/10.35940/ijitee.i8552.078919.

Full text
Abstract:
Encryption which is defined as a process which converts plain text into a coded form i.e. which is in an unreadable form, so that no one can extract it or read it. It is very important to keep our data safe. There are a lot of techniques which are used for this purpose. Playfair technique is one of them. Playfair technique is used for the encryption of data. Playfair technique allows the existence of alphabets (upper case and lower case both), integer value and special symbol. In many algorithms only alphabets is used, most of the algorithm used alphabets as well as integer value and so on. Pl
APA, Harvard, Vancouver, ISO, and other styles
44

Lawal, Ibrahim, Musa Yusuf, Adamu Sulaiman Usman, and Oluwasegun Ishaya Adelaiye. "A lightweight 256 hexadecimal character substitution Cipher algorithm." Journal of Electrical Systems and Information Technology 12, no. 1 (2025). https://doi.org/10.1186/s43067-025-00217-w.

Full text
Abstract:
Abstract Traditionally, playfair matrix encryption is done by encrypting only 8 bits characters to generate ciphers which are equal to the plaintext. Over the years researchers have proposed to incorporate other characters into the plaintext matrix in order to increase the decryption time. However, these solutions have resulted to generating different ciphers and too many ciphertext, thereby increasing the computational resource utilization in terms of memory usage and the size of the ciphertext after encryption. This paper proposes a Hexadecimal Character Substitution Cipher (HCSC) algorithm
APA, Harvard, Vancouver, ISO, and other styles
45

Sugirtham, N., R. Sherine Jenny, B. Thiyaneswaran, et al. "Modified Playfair for Text File Encryption and Meticulous Decryption with Arbitrary Fillers by Septenary Quadrate Pattern." International Journal of Networked and Distributed Computing, February 1, 2024. http://dx.doi.org/10.1007/s44227-023-00019-4.

Full text
Abstract:
AbstractCryptography secures data and serves to ensure the confidentiality of records. Playfair is a cryptographic symmetrical algorithm that encrypts statistics based on key costs. This secret is shared with an authorized person to retrieve data. In the conventional pattern, there is an area complexity and deficiency in letters, numbers, and special characters. This hassle has been overcome in previous studies by editing pattern dimensions. The fillers used throughout the enciphering were not eliminated during the retrieval process, which resulted in the indiscrimination of the retrieved stat
APA, Harvard, Vancouver, ISO, and other styles
46

"Client/Server Model of Data Privacy using Extended Playfair Cipher for SaaS Applications on the Cloud." VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE 8, no. 10 (2019): 1933–36. http://dx.doi.org/10.35940/ijitee.j9274.0881019.

Full text
Abstract:
Cloud Computing is a paradigm of distributed computing that delivers on-demand and utility-based services to its customers. It provides a set of shared computing resources such as networking, servers, storage, and applications in the form of services to an organization or an individual. The major benefits of cloud computing include on-demand self-service and cost-effectiveness. For the customer, there is no up-front cost for setting up and running the applications on the cloud. Despite the benefits provided by various cloud services, the outsourcing of data storage and computation raise many n
APA, Harvard, Vancouver, ISO, and other styles
47

Harjito, Bambang, Dwiko Satriyo.U.Y.S, and Faisal Rahutomo. "Analysis and Implementation of Steganography Using Playfair Techniques and DNA Substitution To Improve Message Security." Khazanah Informatika : Jurnal Ilmu Komputer dan Informatika 9, no. 1 (2023). http://dx.doi.org/10.23917/khif.v9i1.18259.

Full text
Abstract:
Along with the development of the internet, the need for data security is increasing. Ensuring the security of data requires special ways. Among these are cryptography and steganography. Because of the need for this method, many new data security methods have emerged. One of them is using DNA media. DNA cryptography and steganography utilize the properties of DNA to secure and hide secret messages. This paper proposes a combined method between the Playfair cipher cryptographic technique and the DNA substitution steganography algorithm for data security. Comparative analysis was conducted on te
APA, Harvard, Vancouver, ISO, and other styles
48

Reddy, Gottam Ravi Teja, Gudipati Harsha Vardhan, Thota Nagesh, and D. S. R. Murthy. "Secured Personal Notes Application using PlayFair Cipher 8 x 8 Matrix." International Journal of Computer and Information Technology(2279-0764) 13, no. 1 (2024). https://doi.org/10.24203/37nevj90.

Full text
Abstract:
Secured personal notes application is a mobile application that allows a person to secure his personal and confidential information by storing it in the application after encrypting the data. This application involves complex encryption algorithms which keeps user data secured. Traditional notes applications allow users to barely have a password for the application which does not provide security at the higher level. So, in this application users are allowed to encrypt their personal information in order to provide high level security by entering a key which the user alone knows.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!