Cryptography Technique with Modular Multiplication Block Cipher and Playfair Cipher
Keywords:
Cryptography, Encryption, Combination Algorithm, MMB, Playfair CipherAbstract
There are many data security techniques like a cryptography, there are many algorithm like a MMB (Modular Multiplication Block Cipher) and Playfair Cipher. MMB operates using 128-bit plaintext, but it also uses 32-bit subblock MMB text (x0, x1, x2, x3) and 32-bit key subblock (k0, k1, k2, k3) and then the fundamental of this algorithm is determined by a multiplication modulo operation 232-1. Different from MMB, playfair cipher is a diagram substitution cipher which takes two letter from message and replace with two another pair letter, this paper combines playfair cipher as a key substitution and messages in plaintext to be encrypted with algorithms MMB, this combination is expected to increase the security level of messages
References
- Joux, Algorithmic Crypanalysis, United States: CRC Press, 2009.
- Seberry, Cryptography: An Introduction to Computer Security (Advances in Computer Science Series), Prentice Hall, 1989.
- Jia, J. Chen, M. Wang and X. Wang, "Practical-time Attack on the Full MMB Block Cipher," International Association for Cryptologic Research, 2010.
- Alam, S. Khalid and M. Salam, "A Modified Version of Playfair Cipher Using 7," IJCTE, pp. 626-628, 2013.
- Wang, J. Nakahara and Y. Sun, "Cryptanalysis of the full MMB block ciphe," InfoScience, pp. 234-251, 2003.
- V.U.K and K. Shirisha, "A Block Cipher Involving a Key Matrix and a Key bunch Matrix, Supplemented with Mix," International Journal Of Engineering And Science, vol. II, no. 9, pp. 37-43, 2013.
- Negi, J. S. Farswan, V. Thakkar and S. Ghansala, "Cryptography Playfair Cipher using Linear Feedback Shift Register," IOSR Journal of Engineering, vol. II, no. 5, pp. 1212-1216, 2012.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST
This work is licensed under a Creative Commons Attribution 4.0 International License.