Modified 3-D Playfair Stream Cipher
نویسندگان
چکیده
منابع مشابه
Cryptmt Stream Cipher Version 3
In the previous manuscripts, we proposed CryptMT pseudorandom number generator (PRNG) for a stream cipher, which is a combination of (1) an F2-linear generator of a wordsize-integer sequence with a huge state space, and (2) a filter with one wordsize memory, based on the accumulative integer multiplication and extracting some most significant bits from the memory. No valid attacks have been rep...
متن کاملBreaking A Playfair Cipher Using Memetic Algorithm
The playfair cipher operates on pairs of letters. The cipher text is broken into group of blocks, each block contains two letters. Encryption and decryption cipher depends on key search, which is a square matrix that contains 5x5 letters. The matrix contains every letter expect letter j. In this paper the cryptanalyst a playfair is presented using search techniques. It is a Memetic Algorithm, a...
متن کاملMachine reconstruction of the Playfair cipher
A Playfair cipher is a digraph substitution, where each letter pair of the plaintext is replaced by a letter pair in the ciphertext. The chart of substitutions is summarized by the placement of letters in a table, called the Playfair square, constructed in some customary manner from a keyword. We denote a substitution of plaintext digraph cd with ciphertext digraph ab by ab− cd. There are two r...
متن کاملCryptMT Stream Cipher Ver . 3 : Description ?
CryptMT Version 3 (CryptMT3) is a stream cipher obtained by combining a large LFSR and a nonlinear filter with memory using integer multiplication. Its period is proved to be no less than 219937−1, and the 8-bit output sequence is at least 1241-dimensionally equidistributed. It is one of the fastest stream ciphers on a CPU with SIMD operations, such as Intel Core 2 Duo.
متن کامل3 D ( 6 X 4 X 4 ) - Playfair
The role of Cryptography in today’s digital world is significant. It secures information mathematically by mangling message with key. The privacy of intended sender and receiver information is protected from eavesdropper. The objective of the paper is playfair cipher. The existing methods of playfair cipher are studied. The restrictions of earlier works a playfair cipher using 5X5 matrix, 7X4 m...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2013
ISSN: 0975-8887
DOI: 10.5120/14649-2904