0% found this document useful (0 votes)
91 views2 pages

The Playfair Cipher Presentation PDF

computer security

Uploaded by

sethmurenje
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
91 views2 pages

The Playfair Cipher Presentation PDF

computer security

Uploaded by

sethmurenje
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

The Playfair Cipher

❖ This ciphering technic is also known as the Playfair square or Wheatstone-


Playfair cipher.
❖ Playfair cipher is a manual symmetric encryption technique.
❖ Makes use of the multiple letter encryption technique and this will confuse
the attacker.
❖ It follows the diagrams’ approach.
❖ It uses a 5 x 5 matrix and a keyword that must be shared between the two
communicating parties in the same way the Caesar key is shared. In this case
a key is a word for example Monarchy can be our keyword.
❖ This 5 x 5 matrix is constructed using a keyword (Monarchy) that is the first
rows of the table must be populated with characters of the keyword in the
order they appear. The longer the keyword, the more secure the cipher
becomes.

M O N A R
C H Y B D
E F G I/J K
L P Q S T
U V W X Z

❖ Note that the characters I and J (I/J) count as one letter.


❖ The remaining cells of the table are populated using the remaining
letters of the alphabet that are not already in the table.
❖ To encrypt a message, arrange the letters of the plaintext in pairs
in the order they appear.
Examples of diagrams:
Ex 1: Plain text: instruments
Diagrams: in st ru me nt sx
The last letter s alone is not a diagram and it is left alone, so we need
to insert a filler character x so that it also becomes a diagram but in
decryption you will need to remove the character
Ex 2: Plain text: balloon
Diagrams: ba lx lo on
RULES FOR ENCRYPTION USING PLAYCIPHER
1) Creating diagrams
2) After creating diagrams, if you have repeating letters one need to insert filler
characters
3) After creating the diagrams, if you see both the characters are in the same
column of the matrix table one would need to go down and if you are
already at the bottom you need to wrap around.
4) After creating the diagrams, if you see both the characters are in the same
row of the matrix table one would need to move right that is one step and if
already at the end you need to wrap around.
5) And finally, the letters in the diagram can be appearing as a rectangle that is
different rows and different columns

Advantages of Playfair Cipher as compared to other techniques


1) It is simple
2) Offers better security compared to ceasar cipher.

Disadvantages of playfair
1) Limited key space

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy