Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30172
A NXM Version of 5X5 Playfair Cipher for any Natural Language (Urdu as Special Case)

Authors: Muhammad Salam, Nasir Rashid, Shah Khalid, Muhammad Raees Khan

Abstract:

In this paper a modified version NXM of traditional 5X5 playfair cipher is introduced which enable the user to encrypt message of any Natural language by taking appropriate size of the matrix depending upon the size of the natural language. 5X5 matrix has the capability of storing only 26 characters of English language and unable to store characters of any language having more than 26 characters. To overcome this limitation NXM matrix is introduced which solve this limitation. In this paper a special case of Urdu language is discussed. Where # is used for completing odd pair and * is used for repeating letters.

Keywords: cryptography, decryption, encryption, playfair cipher, traditional cipher.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1073451

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1768

References:


[1] Andrew S. Tanenbaum, "Networks Computer", 4th Edition
[2] http://www.sirraksbey.com/cryptography.html
[3] http://eclipsed.net/~gr/20030702/320000- symmetric_v_pki.html
[4] Behrouz A. Forouzan, "Data Communications and Networking", 4th Edition, McGraw-Hills, 2006
[5] William Stallings, "Cryptography and Network Security: Principles and Practice", 4th Edition, Prentice Hall, 2005
[6] http://en.wikipedia.org/wiki
[7] http://unicode.org/standard/WhatIsUnicode.html
[8] http://www.tremu.gov.pk/tremu1/workingroups/pdfpresentations/UZT% 20UNICODE%20MAPPING.pdf
[9] http://unicode.org/charts/PDF/U0600.pdf
[10] H. A. A. Hassan, M. Saeb, and H. D. Hamed, "The PYRAMIDS block cipher", International Journal of Network Security, Vol. 1, No. 1, pp. 52- 60, 2005.
[11] Y. Kurniawan, A. S. A., M. S. Mardiyanto, I. S. S., and S. Sutikno, "The new block cipher: BC2", International Journal of Network Security, Vol. 8, No. 1, pp. 16-24, 2009.
[12] P. Lin, W. L. Wu, C. K. Wu, "Security analysis of double length compression function based on block cipher" International Journal of Network Security, Vol. 4, No. 2, pp. 121-127, 2007.