Javascript must be enabled to continue!
Security Enhancement of Playfair Cipher Using Modified Blum Blum Shub Algorithm and Keystream Values
View through CrossRef
Abstract
The Playfair cipher operates as a symmetric en-cryption method, simultanously encrypting pairs of letters. This research aims to enhance the Playfair cipher’s security by incorporating a modified Blum Blum Shub algorithm and utilizing Keystream values. The Blum Blum Shub algorithm undergoes modification through the introduction of four Blum prime numbers, complicating prime factorization. These primes are employed to generate random numbers, subsequently forming a key by mapping the equivalent characters of the generated sequences. In this investigation, we ensure secure key swapping, eliminating the necessity for filler characters when combining related characters in to bigrams.
Additionally, we obscure the relationship between plaintext and ciphertext bigrams by altering the Playfair cipher’s encryption mechanism. Notably, the recipient does not directly receive the key; instead , it independently generates the same key as the sender, resolving the key exchange challenge. The proposed algorithm undergoes evaluation on an HP computer using Matlab software, assessing its performance in terms of the avalanche effect, frequency analysis, key generation, key exchange, and resistance against brute force attack.
The simulation results demonstrate that the proposed algorithm yields a high avalanche effect ratio. It generates a complex key, challenging to predict , and requires a substantial amount of time for cryptanalysis attacks to crack. A slight modification in a single plaintext character results in an average avalanche effect of 80%. Consequently, the proposed approach is more secure than the extended algorithm.
Research Square Platform LLC
Title: Security Enhancement of Playfair Cipher Using Modified Blum Blum Shub Algorithm and Keystream Values
Description:
Abstract
The Playfair cipher operates as a symmetric en-cryption method, simultanously encrypting pairs of letters.
This research aims to enhance the Playfair cipher’s security by incorporating a modified Blum Blum Shub algorithm and utilizing Keystream values.
The Blum Blum Shub algorithm undergoes modification through the introduction of four Blum prime numbers, complicating prime factorization.
These primes are employed to generate random numbers, subsequently forming a key by mapping the equivalent characters of the generated sequences.
In this investigation, we ensure secure key swapping, eliminating the necessity for filler characters when combining related characters in to bigrams.
Additionally, we obscure the relationship between plaintext and ciphertext bigrams by altering the Playfair cipher’s encryption mechanism.
Notably, the recipient does not directly receive the key; instead , it independently generates the same key as the sender, resolving the key exchange challenge.
The proposed algorithm undergoes evaluation on an HP computer using Matlab software, assessing its performance in terms of the avalanche effect, frequency analysis, key generation, key exchange, and resistance against brute force attack.
The simulation results demonstrate that the proposed algorithm yields a high avalanche effect ratio.
It generates a complex key, challenging to predict , and requires a substantial amount of time for cryptanalysis attacks to crack.
A slight modification in a single plaintext character results in an average avalanche effect of 80%.
Consequently, the proposed approach is more secure than the extended algorithm.
Related Results
Blum Blum Shub in Generating Key in RC4
Blum Blum Shub in Generating Key in RC4
In the manufacture of RC4 encryption, a user always inputs the key as a security approval. The encryptor usually makes the core. Sometimes the encryptor does not feel that the key ...
[RETRACTED] Rhino XL Male Enhancement v1
[RETRACTED] Rhino XL Male Enhancement v1
[RETRACTED]Rhino XL Reviews, NY USA: Studies show that testosterone levels in males decrease constantly with growing age. There are also many other problems that males face due ...
Analisis Modifikasi Metode Playfair Cipher Dalam Pengamanan Data Teks
Analisis Modifikasi Metode Playfair Cipher Dalam Pengamanan Data Teks
Dunia berkembang kian cepat seiring majunya teknologi informasi. Komunikasi kini menjadi tidak terbatas. Dengan banyaknya kemudahan untuk melakukan pengaksesan informasi, adakalany...
KOMBINASI ALGORITMA ONE TIME PAD CIPHER DAN ALGORITMA BLUM BLUM SHUB DALAM PENGAMANAN FILE
KOMBINASI ALGORITMA ONE TIME PAD CIPHER DAN ALGORITMA BLUM BLUM SHUB DALAM PENGAMANAN FILE
Kriptografi adalah ilmu menyamarkan pesan sehingga hanya dikenal oleh pengirim dan penerima. Salah satu algoritma yang cukup aman dan sulit untuk memecahkan adalah algoritma one-t...
Symmetric Encryption Algorithm using ASCII Values
Symmetric Encryption Algorithm using ASCII Values
Cryptography at its very core is nothing but math - pure, simple, undiluted math. Math created algorithms that are basics for various encryption algorithm. Encryption is a method i...
Modified Playfair cryptosystem for improved data security
Modified Playfair cryptosystem for improved data security
Playfair is the earliest known classical block cipher which is capable of taking two characters as a unit in the process of encryption and decryption. However, the cipher is suffer...
Template attack based on uBlock cipher algorithm
Template attack based on uBlock cipher algorithm
The uBlock cipher algorithm is a family of lightweight block cipher algorithms, which was proposed by Wu Wenling, Zhang Lei and others in 2019. Its block length and key length supp...
Secure Access Control using Ciphertext Policy Attribute-based Encryption with Performance Optimization in Cloud Computing
Secure Access Control using Ciphertext Policy Attribute-based Encryption with Performance Optimization in Cloud Computing
Cipher text-Policy Attribute-Based Encryption is an access control technique widely used in cloud computing for enforcing data access policies based on attributes. However, existin...

