Adaptive playfair cipher Crypto algorithm

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Breaking A Playfair Cipher Using Memetic Algorithm

The playfair cipher operates on pairs of letters. The cipher text is broken into group of blocks, each block contains two letters. Encryption and decryption cipher depends on key search, which is a square matrix that contains 5x5 letters. The matrix contains every letter expect letter j. In this paper the cryptanalyst a playfair is presented using search techniques. It is a Memetic Algorithm, a...

متن کامل

Machine reconstruction of the Playfair cipher

A Playfair cipher is a digraph substitution, where each letter pair of the plaintext is replaced by a letter pair in the ciphertext. The chart of substitutions is summarized by the placement of letters in a table, called the Playfair square, constructed in some customary manner from a keyword. We denote a substitution of plaintext digraph cd with ciphertext digraph ab by ab− cd. There are two r...

متن کامل

A Novel Approach to Security using Extended Playfair Cipher

The well known multiple letter encryption cipher is the Playfair cipher. Here the digrams in the plaintext are treated as single units and converted into corresponding cipher text digrams. However because of the drawbacks inherent in the 5*5 Playfair cipher which adversely affects the security we proposed an 8*8 Playfair cipher. For details one can refer to [1]. This paper analyses the new prop...

متن کامل

An Evolutionary Approach for the Playfair Cipher Cryptanalysis

In this paper we describe the Playfair substitution cipher and we propose an evolutionary algorithm for Playfair’s cryptanalysis. The structural properties of the cipher and its enciphering rules determine the suitability of an evolutionary, genetic-like approach for the cipher’s cryptanalysis. Classical cryptographic ciphers like Playfair are no longer used in practice, but evolutionary approa...

متن کامل

Enhanced ARM with Security Using Two Keyword Playfair Cipher

With large amounts of data continuously being collected and stored in databases, many companies are interested in mining of association rules among their databases to increase their sales. FP-Growth (Frequent Pattern) algorithm is one of the ARM (Association Rule Mining) techniques for generating frequent patterns. To provide security for these obtained frequent item sets, we used modified Play...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Al-Qadisiyah for computer science and mathematics

سال: 2017

ISSN: 2521-3504,2074-0204

DOI: 10.29304/jqcm.2017.9.2.320