- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
What are the Playfair Cipher Technique in Information Security?
Playfair is a substitution cipher. Playfair cipher was originally invented by Charles Wheatstone in 1854 but it bears the name of Lord Playfair because he assisted the need of this method.
Playfair ciphers are an approach of block cipher and the ciphertext character that restore a specific plaintext character in the encryption will rely upon in an element on an contiguous character in the plaintext.
Encryption is adept using a square array of characters, built from the encryption key. Because the group of plaintext characters is the 26-letter English alphabet. This array would be 5 × 5, with 2 of the 26 characters appearing an individual position in the array.
Generally, these two characters are i and j, because usually it can be simply to categorize from the context which of these two letters was pre-determined in the plaintext. The encryption key for a Playfair cipher is a word through a finite order of characters taken from the group of plaintext characters.
Playfair is digraph substitution cipher which need a 5×5 matrix, in which the key word is written first and the remaining cells of the matrix are filled with different letter of alphabets with I and J taken in the similar cell.
The message is divided into digraphs, in which re-currenting letters in the equal pair are divided by filler letter X. In the method of odd number of letters in the message a spare letter X is padded with the word to complete the pair.
The general approach of dividing the Playfair cipher is about implementing frequency analysis of pairs of letters. Knowing estimated frequencies for a language that was utilized in the message, one can try to connect frequent ciphertext pairs to frequent group of letters in the language.
Because of its integrity, the cipher is characterized by features that create it simpler to break. First, one can notice that pairs of letters and their inverse pairs (that define pairs such as AC and CA) create the similar pairs in the ciphertext.
It can be identified by making databases of famous words and phrases that include such combinations. It can also the Playfair cipher's ciphertext is characterized by a lack of the similar repeated letters that are placed next to each other.
The other approach of attacking the cipher is about randomly filling the table and attempting to decode the ciphertext depends on its current values. Thus, the attacker can slightly change the table and try to decipher the ciphertext again.
It can continue changing the table, accepting changes that enhance quality of the current proposed plaintext. It is a relatively easy method, quite simply to implement.
The third very efficient approach of breaking the Playfair cipher is about guessing plaintext fragments, for instance salutations to a sender, or dates and areas of sending the message.
- Related Articles
- What are the principle of Symmetric Cipher in Information Security?
- What are the components of Modern Block Cipher in Information Security?
- What is Block Cipher in information security?
- What is Stream Cipher in Information Security?
- What is Monoalphabetic Cipher in Information Security?
- What is Polyalphabetic Substitution Cipher in Information Security?
- What is a Feistel Cipher in Information Security?
- What is the comparison between Stream Cipher and Block Cipher in information security?
- What are the different modes of operation in Block Cipher in information security?
- Difference between Substitution Cipher Technique and Transposition Cipher Technique
- What are the main Security Frameworks in information security?
- What are the specific security mechanism in Information Security?
- What are the Pervasive Security Mechanisms in Information Security?
- What are the security services of Information Security?
- What are the challenges in information security?
