Skip to main content

Enhancing the Security of the Playfair Cipher: Leveraging Hierarchical Clustering for Optimized Poly

Page 1

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 11 Issue: 06 | Jun 2024

www.irjet.net

p-ISSN: 2395-0072

Enhancing the Security of the Playfair Cipher: Leveraging Hierarchical Clustering for Optimized Polybius Square Key Matrix Janvi Sanjaykumar Patoliya1, Amiben Maheshbhai Mehta2 1PG Scholar Computer Science and Engineering, Dr. Subhash University, Junagadh, Gujarat, India 2Assistant professor, Computer Science and Engineering, Dr. Subhash University, Junagadh, Gujarat, India

---------------------------------------------------------------------***---------------------------------------------------------------------

Abstract - This study presents a novel enhancement to

One effective method for data protection involves encryption and decryption processes. In this approach, the sender encrypts the message using a secret key, ensuring that only the intended recipient can comprehend it. The recipient, armed with the same secret key, then decodes the message upon reception. This encryption technique is known as symmetric encryption, emphasizing the shared use of a single secret key for both encryption and decryption processes, thereby fortifying the confidentiality of the transmitted data.

the classical Playfair cipher by utilizing hierarchical clustering techniques to optimize the Polybius square key matrix. The traditional Playfair cipher, while historically significant, is prone to cryptographic attacks due to its predictable key matrix structure. By integrating hierarchical clustering, we introduce a method to create a more complex and secure key matrix, thereby enhancing the cipher's overall robustness. This approach leverages the ability of hierarchical clustering to organize data into intricate patterns, improving the security and unpredictability of the Playfair cipher against modern cryptographic challenges.

In any communication network's security architecture, cryptographic techniques are important. Symmetric key algorithms are a particular kind of these algorithms which employ one key to encode and translate data. The stream cipher, in which the encryption rule is developed based on a plaintext symbol's position in the stream of plaintext symbols, and the block cipher encrypts several plaintext symbols continuously in a block, are essentially are techniques ways to create a stronger cipher [8]. The researchers want to change the aforementioned method by making its 5x5 table a 10x10. The main goal of this work is to give an expanded Playfair matrix that includes the special characters from the standard keyboard layout while still covering the original alphanumeric characters, as the original Playfair matrix is constituted of alphanumeric characters. Rather than utilizing contemporary encryption approaches, the simplicity of this modified Playfair cipher may adapt to the requirements of encryption systems.

Key Words: Playfair cipher, Polybius square, Hierarchical clustering, Cryptographic security, Key matrix optimization, Classical ciphers, Data clustering, Encryption techniques

1.INTRODUCTION Cryptography, derived from the Greek words "kryptos" (hidden) and "graphein" (to write), signifies the art and science of secret writing. Today this term refers to the science and art of transforming messages to make them secure and immune to attacks [3]. In the process of transmitting information from the sender to the receiver, it is imperative to exercise caution to prevent accessibility by a third party. One effective method for safeguarding information is encryption-decryption, wherein the sender encrypts the message using a secret key known exclusively to the receiver. Upon receiving the message, the receiver then decrypts it using the identical secret key, ensuring secure communication [6].

The Polybius Square Key Matrix has expanded large because to the increasing number of available characters and the enlargement of the matrix. However, when using shorter keys, the increased 10x10 Polybius square matrix shows little to no avalanche effect. While building the Polybius Square Key Matrix into a 10x10 a matrix expanded the range of characters, a test of the increased matrix's avalanche effect by flipping one bit of the key shows that little changes in shorter keys result in little to no difference in the outputted ciphertext [1].

Cryptography stands as one of the most potent and ancient techniques for ensuring information security, evolving from classical to modern ciphers over time. Throughout the ages, classical ciphers have served as precise tools for safeguarding valuable data against unauthorized access. The enduring relevance of cryptography attests to its resilience and adaptability in the face of evolving threats, emphasizing its pivotal role in upholding the confidentiality and integrity of sensitive information.

2. LITERATURE REVIEW This study concludes that applying the Linear Feedback Shift Register to the extended 10x10 Polybius Square Key Matrix as a key stretching function for short keys to simulate a longer key improves the avalanche effect of the

Securing the transmission of information from sender to receiver is crucial to prevent interception by third parties.

© 2024, IRJET

|

Impact Factor value: 8.226

|

ISO 9001:2008 Certified Journal

|

Page 264


Turn static files into dynamic content formats.

Create a flipbook
Enhancing the Security of the Playfair Cipher: Leveraging Hierarchical Clustering for Optimized Poly by IRJET Journal - Issuu