An Improved Playfair Encryption Technique Using Fibonacci Series Generated Secret Key

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    With the technology advancements and easy availability of internet, every day millions of users share information electronically through emails, file sharing, e-commerce, etc.  As, internet is highly vulnerable to various attacks, sending sensitive information over the Internet may be dangerous. One of the ways to protect the sensitive Information is using the cryptographic techniques. So, while sharing sensitive information over the Internet, it should be sent in encrypted form to prevent the access by unauthorized person. Encryption can be     defined as the process of transforming information in such a manner that only authorized person can understand the shared information. In this paper, we have taken Playfair encryption algorithm for encryption and modified it by using Fibonacci series. Fibonacci series is used to generate a random key, which is used for encrypting the message in Playfair encryption algorithm. Using Fibonacci numbers and generating random keys provide significant security to shared information.

     


  • Keywords


    Use about five key words or phrases in alphabetical order, Separated by Semicolon.

  • References


      [1] Nadeem Akhtar, Mohd Vasim Ahamad, “Graph Tools for Social Network Analysis”. In N. Meghanathan (Ed.), Graph Theoretic Approaches for Analyzing Large-Scale Social Networks (pp. 18-33). Hershey, PA: IGI Global. doi:10.4018/978-1-5225-2814-2.ch002.

      [2] A. Sinkov, Elementary Cryptanalysis: A Mathematical Approach, Mathematical Association of America, 1966.

      [3] Shiv Shakti Srivastava, Nitin Gupta “A Novel Approach to Security using Extended Playfair Cipher”, International Journal of Computer Applications (0975 – 8887) Volume 20– No.6, April 2011.

      [4] S.S.Dhenakaran, M. Ilayaraja, “Extension of Playfair Cipher using 16X16 Matrix”, International Journal of Computer Applications (0975 – 888) Volume 48– No.7, June 2012.

      [5] Md.Atiullah Khan, Kailash Kr.Mishra, N.Santhi, J.Jayakumari, “A New Hybrid Technique for Data Encryption”, Proceedings of 2015 Global Conference on Communication Technologies (GCCT 2015), 978-1-4799-8553-1/15.

      [6] Subhajit Bhattacharyya, Nisarga Chand, Subham Chakraborty, “A Modified Encryption Technique using Playfair Cipher 10 by 9 Matrix with Six Iteration Steps”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 3, Issue 2, February 2014.

      [7] https://en.wikipedia.org/wiki/Playfair_cipher, visited on June, 2017.

      [8] https://www.tutorialspoint.com/cryptography/traditional_ciphers.htm, visited on June, 2017

      [9] Asia Mashkoor, Mohd Vasim Ahamad, “Visualization, Security and Privacy Challenges of Big Data”, International Journal of Advanced Technology in Engineering and Science, 5 (6), June 2017, 394 - 400, ISSN No. 2348-7550


 

View

Download

Article ID: 20104
 
DOI: 10.14419/ijet.v7i4.5.20104




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.