Skip to main content
Top

2020 | OriginalPaper | Chapter

An Extended Playfair Encryption Technique Based on Fibonacci Series

Authors : Mohd Vasim Ahamad, Mohd Imran, Nazish Siddiqui, Tasleem Jamal

Published in: Advances in Data and Information Sciences

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The rapid advancement in networking technologies leads to the sharing of information by millions of users at a much higher rate. Information sharing over unprotected network may lead to compromise of the sensitive and confidential information to unauthorized person. Cryptography is one of the several ways to guard sensitive and confidential information. Before sharing the information over the Internet, it must be encrypted to preserve its confidentiality. Encryption is a process of converting readable information into scrambled form so that no unauthorized person can make use of it. In this paper, the Playfair encryption technique is taken into consideration for encrypting the information to be shared. In its simplest form, the Playfair encryption technique generates a 5 × 5 key table by taking a key as input and encrypts the diagraphs of actual message. The key generation process is improved by modifying it with Fibonacci series. The Fibonacci series is used create a random key, which is passed to generate 5 × 5 key table. This key table is used to encrypt the actual message using rules defined by Playfair encryption algorithm. In this paper, the limitations of 5 × 5 key table are removed by using an 8 × 8 key table, which provides much higher level of security to the message being encrypted.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Akhtar, N., & Ahamad, M. V. (2017). Graph tools for social network analysis. In N. Meghanathan (eds.) Graph Theoretic Approaches for Analyzing Large-Scale Social Networks, pp. 18–33. IGI Global. Akhtar, N., & Ahamad, M. V. (2017). Graph tools for social network analysis. In N. Meghanathan (eds.) Graph Theoretic Approaches for Analyzing Large-Scale Social Networks, pp. 18–33. IGI Global.
2.
go back to reference Khan, H., Ahamad, M. V., & Samad, A. (2017). Security challenges and threats in cloud computing systems. International Journal of Advanced Research in Computer Science, 8(2), 36–39. Khan, H., Ahamad, M. V., & Samad, A. (2017). Security challenges and threats in cloud computing systems. International Journal of Advanced Research in Computer Science, 8(2), 36–39.
3.
go back to reference Rivest, R. L. (1990). Cryptography. In Van Leeuwen, J. (ed.) Handbook of Theoretical Computer Science, vol. 1. Elsevier. Rivest, R. L. (1990). Cryptography. In Van Leeuwen, J. (ed.) Handbook of Theoretical Computer Science, vol. 1. Elsevier.
4.
go back to reference Ahamad, M. V., Masroor, M., & Fatima, U. (2017). A modified Playfair encryption using fibonacci numbers. International Journal of Advanced Technology in Engineering and Science, 5(6), 306–315. Ahamad, M. V., Masroor, M., & Fatima, U. (2017). A modified Playfair encryption using fibonacci numbers. International Journal of Advanced Technology in Engineering and Science, 5(6), 306–315.
5.
go back to reference Khan, M. A., Mishra, K. K., & Jayakumari, S. J. (2015). A new hybrid technique for data encryption. In Proceedings of Global Conference on Communication Technologies. Khan, M. A., Mishra, K. K., & Jayakumari, S. J. (2015). A new hybrid technique for data encryption. In Proceedings of Global Conference on Communication Technologies.
7.
go back to reference Goyal, P., Sharma, G., & Kushwah, S. S. (2015). A new modified Playfair algorithm using CBC. In International Conference on Computational Intelligence and Communication Networks, pp. 1008–1012. Goyal, P., Sharma, G., & Kushwah, S. S. (2015). A new modified Playfair algorithm using CBC. In International Conference on Computational Intelligence and Communication Networks, pp. 1008–1012.
8.
go back to reference Srivastava, S. S., & Gupta, N. (2011). A novel approach to security using extended Playfair cipher. International Journal of Computer Applications, 20(6), 39–43.CrossRef Srivastava, S. S., & Gupta, N. (2011). A novel approach to security using extended Playfair cipher. International Journal of Computer Applications, 20(6), 39–43.CrossRef
9.
go back to reference Bhattacharyya, S., Chand, N., & Chakraborty, S. (2014). A modified encryption technique using Playfair Cipher 10 by 9 matrix with six iteration steps. International Journal of Advanced Research in Computer Engineering & Technology, 3(2), 308–312. Bhattacharyya, S., Chand, N., & Chakraborty, S. (2014). A modified encryption technique using Playfair Cipher 10 by 9 matrix with six iteration steps. International Journal of Advanced Research in Computer Engineering & Technology, 3(2), 308–312.
10.
go back to reference Dipthi, R., A survey paper on Playfair cipher and its variants. International Research Journal of Engineering and Technology, 4(4), 2607–2610. Dipthi, R., A survey paper on Playfair cipher and its variants. International Research Journal of Engineering and Technology, 4(4), 2607–2610.
11.
go back to reference Sinkov, A. (1996). Elementary cryptanalysis: A mathematical approach. Mathematical Association of America. Sinkov, A. (1996). Elementary cryptanalysis: A mathematical approach. Mathematical Association of America.
12.
go back to reference Agarwal, P., Agarwal, N., & Saxena, R. (2015). Data encryption through fibonacci sequence and unicode characters. MIT International Journal of Computer Science and Information Technology, 5(2), 79–82. Agarwal, P., Agarwal, N., & Saxena, R. (2015). Data encryption through fibonacci sequence and unicode characters. MIT International Journal of Computer Science and Information Technology, 5(2), 79–82.
13.
go back to reference Kumar, A., Mehra, P. S., Gupta, G., & Sharma, M. (2013). Enhanced Block Playfair cipher. In International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, pp. 689–695. Kumar, A., Mehra, P. S., Gupta, G., & Sharma, M. (2013). Enhanced Block Playfair cipher. In International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, pp. 689–695.
Metadata
Title
An Extended Playfair Encryption Technique Based on Fibonacci Series
Authors
Mohd Vasim Ahamad
Mohd Imran
Nazish Siddiqui
Tasleem Jamal
Copyright Year
2020
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-0694-9_14