Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Security Enhancement of Playfair Cipher Using Modified Blum Blum Shub Algorithm and Keystream Values

View through CrossRef
Abstract The Playfair cipher operates as a symmetric en-cryption method, simultanously encrypting pairs of letters. This research aims to enhance the Playfair cipher’s security by incorporating a modified Blum Blum Shub algorithm and utilizing Keystream values. The Blum Blum Shub algorithm undergoes modification through the introduction of four Blum prime numbers, complicating prime factorization. These primes are employed to generate random numbers, subsequently forming a key by mapping the equivalent characters of the generated sequences. In this investigation, we ensure secure key swapping, eliminating the necessity for filler characters when combining related characters in to bigrams. Additionally, we obscure the relationship between plaintext and ciphertext bigrams by altering the Playfair cipher’s encryption mechanism. Notably, the recipient does not directly receive the key; instead , it independently generates the same key as the sender, resolving the key exchange challenge. The proposed algorithm undergoes evaluation on an HP computer using Matlab software, assessing its performance in terms of the avalanche effect, frequency analysis, key generation, key exchange, and resistance against brute force attack. The simulation results demonstrate that the proposed algorithm yields a high avalanche effect ratio. It generates a complex key, challenging to predict , and requires a substantial amount of time for cryptanalysis attacks to crack. A slight modification in a single plaintext character results in an average avalanche effect of 80%. Consequently, the proposed approach is more secure than the extended algorithm.
Title: Security Enhancement of Playfair Cipher Using Modified Blum Blum Shub Algorithm and Keystream Values
Description:
Abstract The Playfair cipher operates as a symmetric en-cryption method, simultanously encrypting pairs of letters.
This research aims to enhance the Playfair cipher’s security by incorporating a modified Blum Blum Shub algorithm and utilizing Keystream values.
The Blum Blum Shub algorithm undergoes modification through the introduction of four Blum prime numbers, complicating prime factorization.
These primes are employed to generate random numbers, subsequently forming a key by mapping the equivalent characters of the generated sequences.
In this investigation, we ensure secure key swapping, eliminating the necessity for filler characters when combining related characters in to bigrams.
Additionally, we obscure the relationship between plaintext and ciphertext bigrams by altering the Playfair cipher’s encryption mechanism.
Notably, the recipient does not directly receive the key; instead , it independently generates the same key as the sender, resolving the key exchange challenge.
The proposed algorithm undergoes evaluation on an HP computer using Matlab software, assessing its performance in terms of the avalanche effect, frequency analysis, key generation, key exchange, and resistance against brute force attack.
The simulation results demonstrate that the proposed algorithm yields a high avalanche effect ratio.
It generates a complex key, challenging to predict , and requires a substantial amount of time for cryptanalysis attacks to crack.
A slight modification in a single plaintext character results in an average avalanche effect of 80%.
Consequently, the proposed approach is more secure than the extended algorithm.

Related Results

Statistical attack on combination keystream generators with irregular clocking
Statistical attack on combination keystream generators with irregular clocking
Combination keystream generators with irregular clocking are the basis for constructing of stream ciphers, the most famous of which are A5 and Alpha1. Each such generator consists ...
MODIFIKASI TABEL CIPHER PADA ALGORITMA PLAYFAIR
MODIFIKASI TABEL CIPHER PADA ALGORITMA PLAYFAIR
Playfair Cipher merupakan metoda enkripsi klasik yang sangat sulit untuk dikriptanalisis secara manual. Meskipun demikian Playfair dapat dipecahkan dengan menggunakan informasi fre...
Blum Blum Shub in Generating Key in RC4
Blum Blum Shub in Generating Key in RC4
In the manufacture of RC4 encryption, a user always inputs the key as a security approval. The encryptor usually makes the core. Sometimes the encryptor does not feel that the key ...
[RETRACTED] Rhino XL Male Enhancement v1
[RETRACTED] Rhino XL Male Enhancement v1
[RETRACTED]Rhino XL Reviews, NY USA: Studies show that testosterone levels in males decrease constantly with growing age. There are also many other problems that males face due ...
Attacks on the Random Gamming Code
Attacks on the Random Gamming Code
In 1917, Hilbert Vernam patented a top-secret encryption scheme, which at first was called a one-time notepad and later a Vernam cipher. At the time that Vernam proposed this schem...
KOMBINASI ALGORITMA ONE TIME PAD CIPHER DAN ALGORITMA BLUM BLUM SHUB DALAM PENGAMANAN FILE
KOMBINASI ALGORITMA ONE TIME PAD CIPHER DAN ALGORITMA BLUM BLUM SHUB DALAM PENGAMANAN FILE
Kriptografi adalah ilmu menyamarkan pesan sehingga hanya dikenal oleh pengirim dan penerima. Salah satu algoritma yang cukup aman dan sulit untuk memecahkan adalah  algoritma one-t...
Analisis Modifikasi Metode Playfair Cipher Dalam Pengamanan Data Teks
Analisis Modifikasi Metode Playfair Cipher Dalam Pengamanan Data Teks
Dunia berkembang kian cepat seiring majunya teknologi informasi. Komunikasi kini menjadi tidak terbatas. Dengan banyaknya kemudahan untuk melakukan pengaksesan informasi, adakalany...
Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images
Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images
This paper investigates the encryption efficiency of RC6 block cipher application to digital images, providing a new mathematical measure for encryption efficiency, which we ...

Back to Top