Modified Version of Playfair Technique to Enhance the Security of Plaintext and Key Using Rectangular and Substitution Matrix
Kamal Kumar Gola1, Manish Dhingra2, Rahul Rathore3

1Kamal Kumar Gola, Faculty of Engineering, Teerthanker Mahaveer University, Moradabad, 244001, India.
2Manish Dhingra, Faculty of Engineering, Teerthanker Mahaveer University, Moradabad, 244001, India.
3Rahul Rathore, Faculty of Engineering, Teerthanker Mahaveer University, Moradabad, 244001, India.

Manuscript received on 18 June 2019 | Revised Manuscript received on 25 June 2019 | Manuscript published on 30 June 2019 | PP: 2079-2084 | Volume-8 Issue-5, June 2019 | Retrieval Number: E7518068519/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: To make the data more secure there are several techniques. Most of the techniques have modified many times. Most authors used those modified techniques in their algorithm. Playfair technique is one of them. Playfair technique has also modified several time. Most authors used 6*6 matrix which include alphabets in lowercase, integer value as well as special symbols, most 7*7 matrix which include alphabets in uppercase and in lower case both, integer value as well as special symbols. We used 9*9 matrix which includes alphabets in lowercase or in uppercase both, integer value as well as list of operators and putting in the matrix according to their value in ASCII code. ASCII code stands for American Standard Code for Information Interchange. This work uses ASCII code to provide more security. For dual security, a substitution matrix is also used so that no one can understand it easily, even decoder have to do more and more efforts for decrypting the cipher text. Hence with the help of this technique we make our data safe
Keywords: Rectangular Matrix, Substitution Matrix, Playfair, Encryption and Decryption.

Scope of the Article: Security, Trust and Privacy