An Improved Playfair Encryption Technique Using Fibonacci Series Generated Secret Key

  • Authors

    • Mohd Vasim Ahamad
    • Misbah Urrahman Siddiqui
    • Maria Masroor
    • Urooj Fatima
    2018-09-22
    https://doi.org/10.14419/ijet.v7i4.5.20104
  • Use about five key words or phrases in alphabetical order, Separated by Semicolon.
  • With the technology advancements and easy availability of internet, every day millions of users share information electronically through emails, file sharing, e-commerce, etc.  As, internet is highly vulnerable to various attacks, sending sensitive information over the Internet may be dangerous. One of the ways to protect the sensitive Information is using the cryptographic techniques. So, while sharing sensitive information over the Internet, it should be sent in encrypted form to prevent the access by unauthorized person. Encryption can be     defined as the process of transforming information in such a manner that only authorized person can understand the shared information. In this paper, we have taken Playfair encryption algorithm for encryption and modified it by using Fibonacci series. Fibonacci series is used to generate a random key, which is used for encrypting the message in Playfair encryption algorithm. Using Fibonacci numbers and generating random keys provide significant security to shared information.

     

  • References

    1. [1] Nadeem Akhtar, Mohd Vasim Ahamad, “Graph Tools for Social Network Analysisâ€. In N. Meghanathan (Ed.), Graph Theoretic Approaches for Analyzing Large-Scale Social Networks (pp. 18-33). Hershey, PA: IGI Global. doi:10.4018/978-1-5225-2814-2.ch002.

      [2] A. Sinkov, Elementary Cryptanalysis: A Mathematical Approach, Mathematical Association of America, 1966.

      [3] Shiv Shakti Srivastava, Nitin Gupta “A Novel Approach to Security using Extended Playfair Cipherâ€, International Journal of Computer Applications (0975 – 8887) Volume 20– No.6, April 2011.

      [4] S.S.Dhenakaran, M. Ilayaraja, “Extension of Playfair Cipher using 16X16 Matrixâ€, International Journal of Computer Applications (0975 – 888) Volume 48– No.7, June 2012.

      [5] Md.Atiullah Khan, Kailash Kr.Mishra, N.Santhi, J.Jayakumari, “A New Hybrid Technique for Data Encryptionâ€, Proceedings of 2015 Global Conference on Communication Technologies (GCCT 2015), 978-1-4799-8553-1/15.

      [6] Subhajit Bhattacharyya, Nisarga Chand, Subham Chakraborty, “A Modified Encryption Technique using Playfair Cipher 10 by 9 Matrix with Six Iteration Stepsâ€, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 3, Issue 2, February 2014.

      [7] https://en.wikipedia.org/wiki/Playfair_cipher, visited on June, 2017.

      [8] https://www.tutorialspoint.com/cryptography/traditional_ciphers.htm, visited on June, 2017

      [9] Asia Mashkoor, Mohd Vasim Ahamad, “Visualization, Security and Privacy Challenges of Big Dataâ€, International Journal of Advanced Technology in Engineering and Science, 5 (6), June 2017, 394 - 400, ISSN No. 2348-7550

  • Downloads

  • How to Cite

    Vasim Ahamad, M., Urrahman Siddiqui, M., Masroor, M., & Fatima, U. (2018). An Improved Playfair Encryption Technique Using Fibonacci Series Generated Secret Key. International Journal of Engineering & Technology, 7(4.5), 347-351. https://doi.org/10.14419/ijet.v7i4.5.20104