An Enhanced Playfair Algorithm with Dynamic Matrix Using the Novel Multidimensional Element-in-Grid Sequencer (MEGS)

An Enhanced Playfair Algorithm with Dynamic Matrix Using the Novel Multidimensional Element-in-Grid Sequencer (MEGS)

  IJETT-book-cover           
  
© 2022 by IJETT Journal
Volume-70 Issue-3
Year of Publication : 2022
Authors : Jan Carlo T. Arroyo, Ariel M. Sison, Ruji P. Medina, Allemar Jhone P. Delima
https://doi.org/10.14445/22315381/IJETT-V70I3P215

How to Cite?

Jan Carlo T. Arroyo, Ariel M. Sison, Ruji P. Medina, Allemar Jhone P. Delima, "An Enhanced Playfair Algorithm with Dynamic Matrix Using the Novel Multidimensional Element-in-Grid Sequencer (MEGS)," International Journal of Engineering Trends and Technology, vol. 70, no. 3, pp. 132-139, 2022. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I3P215

Abstract
This study enhanced the Playfair algorithm with the novel Multidimensional Element-in-Grid Sequencer (MEGS). A 16x16 dynamic matrix with a new character sequencing scheme is introduced before substitution for a more secure encryption process. The proposed modification incorporates matrix rotation, matrix shifting, matrix rolling, and crossover operations in producing the ciphertext. The enhanced Playfair algorithm will pave the way for a robust system to secure information where similar plaintext characters may not have the same encryption value. The generated ciphertext will only contain printable ASCII characters. Simulation results revealed that the modified Playfair algorithm obtained an average of 53.54% avalanche effect when tested using plaintext with varying lengths ranging from 10 to 1000 characters, thus, surpassing the Strict Avalanche Criterion (SAC) standard. Applying the modified Playfair algorithm in image steganography or password security is recommended for future works, and other performance metrics such as the randomness test and brute force attack analysis be tested.

Keywords
Stackoverflow, Quora, ML, Technologies, Social Media.

Reference
[1] W. Stallings, Cryptography and Network Security Principles and Practices. Prentice-Hall, (2005).
[2] M. H. Saracevic et al., Data Encryption for Internet of Things Applications Based on Catalan Objects and Two Combinatorial Structures, IEEE Trans. Reliab., 70(2) (2021) 819–830 doi: 10.1109/TR.2020.3010973.
[3] A. Rajab, S. Aqeel, M. S. Al Reshan, A. Ashraf, S. Almakdi, and K. Rajab, Cryptography-based encryption techniques for the security of data in cloud computing paradigm, Int. J. Eng. Trends Technol., 69(10) (2021) 1–6. doi: 10.14445/22315381/IJETT-V69I10P201.
[4] J. V. Karthik and B. V. Reddy, Authentication of secret information in image steganography, Int. J. Latest Trends Eng. Technol., 3(1)(2013) 97–104. doi: 10.1109/TENCON.2008.4766581.
[5] R. Deepthi, A Survey Paper on Playfair Cipher and its Variants, Int. Res. J. Eng. Technol. 4(4)(2017) 2607–2610.
[6] M. Syahrizal, M. Murdani, S. D. Nasution, M. Mesran, R. Rahim, and A. P. U. Siahaan, Modified Playfair Cipher Using Random Key Linear Congruent Method,( 2017).
[7] R. Rahim and A. Ikhwan, Cryptography Technique with Modular Multiplication Block Cipher and Playfair Cipher, Int. J. Sci. Res. Sci. Technol., 2(6) (2016) 71–78.
[8] H. B. Macit, A. Koyun, and M. E. Yüksel, Embedding Data Crypted With Extended Shifting Polybius Square Supporting Turkish Character Set, BEU J. Sci., 8(1)(2019) 234–242.
[9] E. V. Haryannto, M. Zulfadly, Daifiria, M. B. Akbar, and I. Lazuly, Implementation of Nihilist Cipher Algorithm in Securing Text Data With Implementation of Nihilist Cipher Algorithm in Securing Text Data With Md5 Verification, J. Phys. Conf. Ser.1361, (01) (2020) (2019), doi: 10.1088/1742-6596/1361/1/012020.
[10] G. Manikandan, P. Rajendiran, R. Balakrishnan, and S. Thangaselvan, A Modified Polybius Square Based Approach for Enhancing Data Security, Int. J. Pure Appl. Math.119(12) (2018) 13317–13324.
[11] M. Maity, A Modified Version of Polybius Cipher Using Magic Square and Western Music Notes, Int. J. Technol. Res. Eng., 1,(10) (2014) 1117–1119.
[12] C. Kumar, S. Dutta, and S. Chakraborty, A Hybrid Polybius-Playfair Music Cipher A Hybrid Polybius-Playfair Music Cipher, Int. J. Multimed. Ubiquitous Eng.,10(8),(2015)187–198. doi: 10.14257/ijmue.2015.10.8.19.
[13] A. Singh and S. Sharma, Enhancing Data Security in Cloud Using Split Algorithm, Caesar Cipher, and Vigenere Cipher, Homomorphism Encryption Scheme, in Emerging Trends in Expert Applications and Security (841) (2019) 157–166. doi: 10.1007/978-981-13-2285-3.
[14] I. Gunawan, Sumarno, H. S. Tambunan, E. Irawan, H. Qurniawan, and D. Hartama, Combination of Caesar Cipher Algorithm and Rivest Shamir Adleman Algorithm for Securing Document Files and Text Messages, J. Phys. Conf. Ser., 1255, (2019). doi: 10.1088/1742-6596/1255/1/012077.
[15] D. Gautam, C. Agrawal, P. Sharma, M. Mehta, and P. Saini, An Enhanced Cipher Technique Using Vigenere and Modified Caesar Cipher,( 2018), doi: 10.1109/ICOEI.2018.8553910.
[16] A. Banerjee, M. Hasan, and H. Kafle, Secure Cryptosystem Using Randomized Rail Fence Cipher for Mobile Devices, in Intelligent Computing - Proceedings of the Computing Conference, (2019)737–750,
doi: 10.1007/978-3-030-22868-2.
[17] A. P. U. Siahaan, Rail Fence Cryptography in Securing Information, Int. J. Sci. Eng. Res., 7(7)(2016) 535–538.
[18] A. C. Licayan, B. D. Gerardo, and A. A. Hernandez, Enhancing Playfair Cipher using Seed Based Color Substitution, Proc. - 2020 16th IEEE Int. Colloq. Signal Process. Its Appl. CSPA 2020,(2020)242–246. doi: 10.1109/CSPA48992.2020.9068730.
[19] R. Patil, S. V Bang, and R. B. Bangar, Improved Cryptography by Applying Transposition on Modified Playfair Algorithm Followed by Steganography, Int. J. Innov. Sci. Res. Technol., 6(5) (2021) 616–620.
[20] M. I. Jabiullah, A. D. Arni, and B. B. Brishti, A Playfair Cipher-based Secured Patients ’ Information Transaction System, J. Netw. Secur. Data Min., 4(1)(2021)1–6. doi: 10.5281/zenodo.4699968.
[21] N. Chand, S. Bhattacharyya, and A. Sarkar, A Novel Encryption Technique to Protect Patient Health Information Electronically Using Playfair Cipher 15 by 14 Matrix, in Advances in Medical Physics and Healthcare Engineering, (2021)423–431.
[22] K. J. Devi, P. Singh, R. K. Yadav, and M. Z. Gafaru, Reversible and Secured Image Watermarking Technique for IoMT Healthcare, in 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT), (2021)1–6, doi: 10.1109/ICCCNT51525.2021.9580071.
[23] M. R. Sani, A Play-Fair Cipher Based Authentication Medical Data Image Transaction Process,(2019).
[24] R. Saharan and S. Yadav, A Novel Method for Image Encryption, Inf. Commun. Technol. Intell. Syst. Smart Innov. Syst. Technol., 106(2019)427–434.doi: 10.1007/978-981-13- 1742-2_42.
[25] H. R. Shakir and S. A. Yassir, Image Encryption-Compression Method Based on Playfair, OTP and DWT for Secure Image Transmission, in Advances in Cyber Security. ACeS 2021. Communications in Computer and Information Science, , 1487(2021) 95–113. doi: 10.1007/978-981-16-8059-5_7.
[26] M. Saraswathi and K. N. Meera, An Application of Radio Mean Labeling in Cryptography, (2021), doi: 10.1109/phdedits53295.2021.9649460.
[27] J. David Livingston and E. Kirubakaran, Implementation of extended play-fair algorithm for client-side encryption of cloud data, Intell. Big Data Technol. Hype. Adv. Intell. Syst. Comput., 1167(2021). 485–493. doi: 10.1007/978-981-15-5285-4_48.
[28] S. Karthiga and T. Velmurugan, Enhancing Security in Cloud Computing using Playfair and Ceasar Cipher in Substitution Techniques, Int. J. Innov. Technol. Explore. Eng., 9( 4)(2020) 912–920.
doi: 10.35940/ijitee.d1363.029420.
[29] B. Priyatna and A. L. Hananto, Password Data Authentication Using a Combination of MD5 and Playfair Cipher Matrix 13x13, Buana Inf. Technol. Comput. Sci. (BIT CS),1(2)(2020) 33–36.
doi: 10.36805/bit-cs.v1i2.980.
[30] R. K. Salih and M. S. Yousif, Playfair with Multi Strata Encryption, Iraqi J. Sci.,62(9)(2021)3237–3242.
doi: 10.24996/ijs.2021.62.9.36.
[31] E. Zadok, I. Badulescu, and A. Shender, Cryptfs: A Stackable Vnode Level Encryption File System, Columbia Univ. Acad. Commons, (1998) doi: https://doi.org/10.7916/D82N5935.
[32] P. Guldin and Y. Zhuge, What Do You Mean My CSV Doesn’t Match My SAS® Dataset?, in SAS Conference Proceedings: SouthEast SAS Users Group 2016, 2016, pp. 1–10, [Online]. Available: https://analytics.ncsu.edu/sesug/2016/CC-132_Final_PDF.pdf.
[33] K. Berisso, Reed-Solomon Based Bar Code Character Substitution Rates,J. Bus. Manag. Sci., v 6(3)(2018). 70–75. doi: 10.12691/jbms-6-3-1.
[34] D. Moses and C. Deisy, A Novel Lossless ECG Compression Technique for Transmission in GSM Networks, in Proceedings of the Third International Conference on Soft Computing for Problem Solving - Advances in Intelligent Systems and Computing, 259(2014), doi: 10.1007/978-81-322-1768-8.
[35] S. J. Sarkar, P. K. Kundu, and G. Sarkar, Realization of a Cloud Server Based Power System Operational Data Management System, in ICECE 2018 - 10th International Conference on Electrical and Computer Engineering, (2019)105–108, doi: 10.1109/ICECE.2018.8636816.
[36] Z. A. Genç, G. Lenzini, and P. Y. A. Ryan, Security analysis of key acquiring strategies used by cryptographic ransomware, in CECC 2018: Proceedings of the Central European Cybersecurity Conference 2018 - ACM International Conference Proceeding Series, (2018)1–6, doi: 10.1145/3277570.3277577.
[37] A. Singh, P. Agarwal, and M. Chand, Image Encryption and Analysis using Dynamic AES, 2019 Int. Conf. Optim. Appl. ICOA 2019, (2019) 1–6.
doi: 10.1109/ICOA.2019.8727711.
[38] S. S. Hameed, SMX Algorithm : A Novel Approach to Avalanche Effect on Advanced Encryption Standard AES, 5th Int. Conf. Computing Sustain. Glob. Dev.(2018)727–732.
[39] I. A. Shoukat, U. Iqbal, A. Rauf, and M. R. Faheem, Randomized Substitution Method for Effectively Secure Block Ciphers in I.O.T Environment,Arab. J. Sci. Eng.45(12)(2020) 11019–11036.
doi: 10.1007/s13369-020-04919-3.
[40] N. Jain and S. S. Chauhan, Novel Approach Transforming Stream Cipher to Block Cipher, in 2021 International Conference on Technological Advancements and Innovations (ICTAI), (2021) 182–187,
doi: 10.1109/ICTAI53825.2021.9673175.
[41] C. Sharma, A. Kumar, A. Sinha, and M. Ahmad, A Novel Encryption RAAM Algorithm in Different Multimedia Applications, Int. J. Soft Comput. Eng., 10(5) (2021) 9–13. doi: 10.35940/ijsce.f3492.0510521.
[42] M. M. Maha, M. Masuduzzaman, and A. Bhowmik, An effective modification of play fair cipher with performance analysis using 6X6 matrix, in ICCA 2020: Proceedings of the International Conference on Computing Advancements, (2020) 1–6, doi: 10.1145/3377049.3377085.
[43] R. M. Marzan, A. M. Sison, and R. P. Medina, An Enhanced Key Security of Playfair Cipher Algorithm,( 2019), doi: 10.1145/3316615.3316689.
[44] G. Sharma, P. Goyal, and S. S. Kushwah, Implementation of Modified Playfair CBC Algorithm, Int. J. Eng. Res., 5(06) (2016) 679–684. doi: 10.17577/ijertv5is060631.
[45] S. A. Noaman, Adaptive Playfair cipher Crypto algorithm, J. Al-Qadisiyah Comput. Sci. Math., 9(2) (2017) 114–121. doi: 10.29304/jqcm.2017.9.2.320.
[46] R. Deepthi, A Survey Paper on Playfair Cipher and its Variants, Int. Res. J. Eng. Technol., 4(4) (2017) 2607–2610.[Online].Available: https://www.irjet.net/archives/V4/i4/IRJET-V4I4642.pdf.
[47] A. Sharma, N. Gupta, A. Thakur, K. Guleri, and M. Dhiman, Enhancing Communication Using 8 × 8 Extended Playfair Cipher and Steganography,(2020). doi: 10.36227/techrxiv.12287483.v1.
[48] S. M. Hardi, J. T. Tarigan, and N. Safrina, Hybrid cryptosystem for an image file using elgamal and double Playfair cipher algorithm, in Journal of Physics: Conference Series,978 (2018).
doi: 10.1088/1742-6596/978/1/012068.
[49] S. S. Srivastava and N. Gupta, A Novel Approach to Security using Extended Playfair Cipher, Int. J. Comput. Appl.20(6)(2011)39–43. doi: 10.5120/2435-3276.
[50] J. C. T. Arroyo and A. J. P. Delima, An Improved Affine Cipher using Blum Blum Shub Algorithm, Int. J. Adv. Trends Comput. Sci. Eng. 9(3)(2020) 3295–3298.
doi: 10.30534/ijatcse/2020/126932020.
[51] J. Lee, N. Sultana, F. Yi, and I. Moon, Avalanche and bit independence properties of photon-counting double random phase encoding in gyrator domain, Curr. Opt. Photonics,2(4)(2018) 368–377. doi: 10.3807/COPP.2018.2.4.368.
[52] N. Kapalova and A. Haumen, The model of encryption algorithm based on non-positional polynomial notations and constructed on an SP-network, Open Eng.,8(1) (2018) 140–146.
doi: 10.1515/eng-2018-0013.
[53] X. Tong, M. Cui, and Z. Wang, A new feedback image encryption scheme based on perturbation with dynamical compound chaotic sequence cipher generator, Opt. Commun.,282(14) (2009) 2722–2728.
doi: 10.1016/j.optcom.2009.03.075.

Keywords
Modified Playfair algorithm, MEGS-based Playfair algorithm, matrix rotation, matrix rolling, matrix shift.