11 × 11 Playfair Cipher based on a Cascade of LFSRs
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 12, Issue 1
Abstract
Playfair cipher is one of the better-known multiple letter encryption ciphers. In this method, the diagrams in the plaintext are treated as a single unit and then these units converted into ciphertext diagrams. This paper implements and discusses a new system which proposed by using 11 × 11 Playfair cipher that supports all 26 alphabets in both: upper case letters (A-Z) as well as lower case letters (a-z), ten digits (0-9), special characters and the extended special characters. This combination will tackle the limitation of 5×5 Playfair cipher in which both “i” and “j” letters could not appear simultaneously. In order to increase the level of security of this method, the output of an 11×11 Playfair procedure will be an input to the complete procedure of a cascade LFSRs. Finally, this system was implemented using MATLAB 8.0 (R2012b).
Authors and Affiliations
Ouday Hanosh
Concomitant use of Dopamine agonist Bromocriptine with Glimepride Improves Insulin Sensitivity in Type II Diabetic Patients
Type -2 diabetes mellitus (T2DM) is a complex syndrome originated by a multifactorial pathogenesis. Restoration of a normal glycaemia is very difficult and requires a multiple medication with different mechanismsof actio...
Gender related differences in the use of the Internet by university academics
Abstract: This paper reports in part some of the findings of a PhD study regarding visibility of gender issues in the use of the internet in university contexts. The study adopted a cross sectional descriptive surv...
A Novel identity based secure distributed data storage scheme
Abstract: Secure distributed data storage can shift the burden of maintaining a large number of files from the owner to proxy servers. Proxy servers can convert encrypted files for the owner to encrypted files for...
Anomaly Detection in Data with Extremely High Dimensional Space via Online Oversampling Principal Component Analysis
Abstract: Anomaly detection is a crucial analysis topic in the field of data mining as well as machine learning. Several real-world applications like Intrusion or MasterCard fraud detection need a good and efficien...
Client Based Cache Consistency Scheme in Wireless Mobile Networks
Abstract: This paper proposes a client based cache consistency scheme for maintaining cache consistency in wireless mobile networks using a distributed cache invalidation method. This is implemented on top of a pre...