Abstract
Security in digital world has become a paramount issue, even more so in the post pandemic world when the digital footprint of the world has increased. Multiple encryption techniques are used to ensure the same. Certain famous classical ciphers which were in prevalent use during ancient times are now not robust enough to keep up with security requirements of modern world. This paper analyses the different modifications proposed to one such cipher i.e., Playfair Cipher and how these modifications enhance it’s performance thus making it usable in modern world.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Pandey, M., Dubey, M.: Survey paper: cryptography the art of hiding information. Int. J. Comput. Eng. Technol. 2, 3168–3171 (2013)
Chhabra, P.: A survey on classic cipher in cryptography. Int. J. Innov. Res. Sci. Eng. Technol. 6 (2017). https://doi.org/10.15680/IJIRSET.2017.0605020
Rahman, M.N.A., Abidin, A., Yusof, M.K., Usop, N.: Cryptography: a new approach of classical hill cipher. Int. J. Secur. Appl. 7(2), 179–190 (2013)
Majumder, R., Datta, S., Roy, M.: An enhanced cryptosystem based on modified classical ciphers. In: 2022 8th International Conference on Advanced Computing and Communication Systems (ICACCS), vol. 1, pp. 692–696 (2022). https://doi.org/10.1109/ICACCS54159.2022.9785033
Ahmad, J., Ahmed, F.: Efficiency analysis and security evaluation of image encryption schemes. IJENS 12, 18–31 (2012)
Deepthi, R.: A survey paper on playfair cipher and its variants. Int. Res. J. Eng. Technol. 4, 2607–2610 (2017)
Marzan, R.M., Sison, A.M.: An enhanced key security of playfair cipher algorithm. In: ICSCA 2019: Proceedings of the 2019 8th International Conference on Software and Computer Applications, pp. 457–461 (2019). https://doi.org/10.1145/3316615.3316689
Albahrani, E.A., Maryoosh, A.A., Lafta, S.H.: Block image encryption based on modified playfair and chaotic system. J. Inf. Secur. Appl. 51, 102445 (2020). https://doi.org/10.1016/j.jisa.2019.102445
Kaur, G., Verma, H., Singh, R.: Dual steganography approach using 3D playfair cipher and pixel value differencing method. SSRN Electron. J. (2020). https://doi.org/10.2139/ssrn.3526694
Siswanto, A., Wahyuni, S., Arta, Y.: Combination playfair cipher algorithm and LSB steganography for data text protection, pp. 125–129 (2019). https://doi.org/10.5220/0009144501250129
Patil, R., Chaudhari, P.R., Dindorkar, M.R., Bang, S.V., Bangar, R.B.: Improved cryptography by applying transposition on modified playfair algorithm followed by steganography (2021)
Kshiteesh, R.B., Koundinya, U.R., Varun, R., Ajina, A., Prathima, G.: A review on challenges and latest trends on cyber security using text cryptography. In: Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication and Security (ICIIC 2021), pp. 194–201 (2021). https://doi.org/10.2991/ahis.k.210913.024
Ahmed, N., Asif, H., Saleem, G.: A benchmark for performance evaluation and security assessment of image encryption schemes. Int. J. Comput. Netw. Inf. Secur. 8, 18–29 (2016). https://doi.org/10.5815/ijcnis.2016.12.03
Marzan, R.M., Sison, A.M., Medina, R.P.: Randomness analysis on enhanced key security of playfair cipher algorithm. Int. J. Adv. Trends Comput. Sci. Eng. 1248–1253 (2019). https://doi.org/10.30534/ijatcse/2019/34842019
Modupe, A., Adedoyin, A., Titilayo, A.: A comparative analysis of LSB, MSB and PVD based image steganography. Int. J. Res. Rev. 8, 373–377 (2021). https://doi.org/10.52403/ijrr.20210948
Wang, Y.: A classical cipher-playfair cipher and its improved versions. In: 2021 International Conference on Electronic Information Engineering and Computer Science (EIECS), pp. 123–126 (2021). https://doi.org/10.1109/EIECS53707.2021.9587989
Rajeswari, S., Ramya, N., Saranya, K.: Avalanche effect based variants of playfair cipher for data security. Int. J. P2P Netw. Trends Technol. (2017)
Tunga, H., Mukherjee, S.: A new modified playfair algorithm based on frequency analysis. Int. J. Emerg. Technol. Adv. Eng. 2 (2012)
Yadav, M., Dhankhar, A.: A review on image steganography. Int. J. Innov. Res. Sci. Technol. 2, 243–248 (2015)
Oladipupo, E.T., Abikoye, O.C.: Modified playfair cryptosystem for improved data security. Comput. Sci. Inf. Technol. 3, 51–64 (2022). https://doi.org/10.11591/csit.v3i1.p51-64
Hamad, S., Khalifa, A., Elhadad, A., Rida, S.: A modified playfair cipher for encrypting digital images. J. Commun. Comput. Eng. 3, 1 (2014). https://doi.org/10.20454/jcce.2013.731
Shakil, T., Islam, M.: An efficient modification to playfair cipher. ULAB J. Sci. Eng. 5, 26 (2014)
Sankpal, P.R., Vijaya, P.A.: Image encryption using chaotic maps: a survey. In: 2014 Fifth International Conference on Signal and Image Processing, pp. 102–107 (2014). https://doi.org/10.1109/ICSIP.2014.80
Salunkhe, J., Sirsikar, S.: Pixel value differencing a steganographic method: a survey. Int. J. Comput. Appl. 975, 8887 (2013)
Mathur, S.K., Srivastava, S.: Extended 16x16 play-fair algorithm for secure key exchange using RSA algorithm. Int. J. Future Revolution Comput. Sci. Commun. Eng. 4 (2018)
Anshari, M., Mujahidah, A.: Expending technique cryptography for plaintext messages by modifying playfair cipher algorithm with matrix 5 x 19. In: 2019 International Conference on Electrical Engineering and Computer Science (ICECOS), pp. 10–13 (2019). https://doi.org/10.1109/ICECOS47637.2019.8984560
Ahmed, A.M., Ahmed, S.H., Ahmed, O.H.: Enhancing 3D-playfair algorithm to support all the existing characters and increase the resistanceto brute force and frequency analysis attacks. In: 2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT), pp. 81–85 (2017). https://doi.org/10.1109/CRCSIT.2017.7965538
Liu, L., Wang, J.: A cluster of 1D quadratic chaotic map and its applications in image encryption. Math. Comput. Simul. 204, 89–114 (2023). https://doi.org/10.1016/j.matcom.2022.07.030
Sai D, J., Krishnaraj P, M.: Cryptographic interweaving of messages. Int. J. Data Inform. Intell. Comput. 2(1), 42–50 (2023). https://doi.org/10.5281/zenodo.7766607
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Ray, A., Singh, K., Harsh, A., Thorat, S., Kar, N. (2024). Qualitative and Quantitative Analysis of Modifications in Playfair Cipher. In: Dasgupta, K., Mukhopadhyay, S., Mandal, J.K., Dutta, P. (eds) Computational Intelligence in Communications and Business Analytics. CICBA 2023. Communications in Computer and Information Science, vol 1956. Springer, Cham. https://doi.org/10.1007/978-3-031-48879-5_15
Download citation
DOI: https://doi.org/10.1007/978-3-031-48879-5_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-48878-8
Online ISBN: 978-3-031-48879-5
eBook Packages: Computer ScienceComputer Science (R0)