SlideShare a Scribd company logo
2
Most read
4
Most read
5
Most read
Information and Network Security:13
Playfair Cipher
Prof Neeraj Bhargava
Vaibhav Khanna
Department of Computer Science
School of Engineering and Systems Sciences
Maharshi Dayanand Saraswati University Ajmer
Playfair Cipher
not even the large number of keys in a monoalphabetic cipher
provides security
one approach to improving security was to encrypt multiple letters
the Playfair Cipher is an example
invented by Charles Wheatstone in 1854, but named after his friend
Baron Playfair
• Consider ways to reduce the "spikyness" of natural language text,
since if just map one letter always to another, the frequency
distribution is just shuffled. One approach is to encrypt more than
one letter at once. The Playfair cipher is an example of doing this,
treats digrams in the plaintext as single units and translates these
units into ciphertext digrams.
Playfair Key Matrix
a 5X5 matrix of letters based on a keyword
fill in letters of keyword (sans duplicates)
fill rest of matrix with other letters
eg. using the keyword MONARCHY
M O N A R
C H Y B D
E F G I/J K
L P Q S T
U V W X Z
• The best-known multiple-letter encryption cipher is the Playfair,
which treats digrams in the plaintext as single units and translates
these units into ciphertext digrams.
• The Playfair algorithm is based on the use of a 5x5 matrix of letters
constructed using a keyword.
• The rules for filling in this 5x5 matrix are: L to R, top to bottom, first
with keyword after duplicate letters have been removed, and then
with the remain letters, with I/J used as a single letter.
• This example comes from Dorothy Sayer's book "Have His Carcase", in
which Lord Peter Wimsey solves it, and describes the use of a
probably word attack.
Encrypting and Decrypting
• plaintext is encrypted two letters at a time
1. if a pair is a repeated letter, insert filler like 'X’
2. if both letters fall in the same row, replace each with letter
to right (wrapping back to start from end)
3. if both letters fall in the same column, replace each with
the letter below it (wrapping to top from bottom)
4. otherwise each letter is replaced by the letter in the same
row and in the column of the other letter of the pair
• Plaintext is encrypted two letters at a time,according to the rules as shown. Note
how you wrap from right side back to left, or from bottom back to top.
• if a pair is a repeated letter, insert a filler like 'X', eg. "balloon" encrypts as "ba lx
lo on"
• if both letters fall in the same row, replace each with letter to right (wrapping
back to start from end), eg. “ar" encrypts as "RM"
• if both letters fall in the same column, replace each with the letter below it
(again wrapping to top from bottom), eg. “mu" encrypts to "CM"
• otherwise each letter is replaced by the one in its row in the column of the other
letter of the pair, eg. “hs" encrypts to "BP", and “ea" to "IM" or "JM" (as desired)
• Decrypting of course works exactly in reverse. Can see this by working the
example pairs shown, backwards.
Security of Playfair Cipher
security much improved over monoalphabetic
since have 26 x 26 = 676 digrams
would need a 676 entry frequency table to analyse (verses 26 for a
monoalphabetic)
and correspondingly more ciphertext
was widely used for many years
eg. by US & British military in WW1
it can be broken, given a few hundred letters
since still has much of plaintext structure
• The Playfair cipher is a great advance over simple monoalphabetic ciphers,
since there are 26*26=676 digrams (vs 26 letters), so that identification of
individual digrams is more difficult.
• Also,the relative frequencies of individual letters exhibit a much greater
range than that of digrams, making frequency analysis much more difficult.
• The Playfair cipher was for a long time considered unbreakable. It was used
as the standard field system by the British Army in World War I and still
enjoyed considerable use by the U.S.Army and other Allied forces during
World War II.
• Despite this level of confidence in its security, the Playfair cipher is
relatively easy to break because it still leaves much of the structure of the
plaintext language intact. A few hundred letters of ciphertext are generally
sufficient.
Assignment
• Explain Playfair Cipher and comment on Security of Playfair Cipher

More Related Content

PPTX
Activity playfair cipher.pptx
PPT
overview of cryptographic techniques
PPTX
Asymmetric Cryptography.pptx
PPTX
Symmetric and asymmetric key cryptography
PDF
SYMMETRIC CRYPTOGRAPHY
PPT
Information Security & Cryptography
PPTX
Classical encryption techniques
PPT
Classical Encryption Techniques
Activity playfair cipher.pptx
overview of cryptographic techniques
Asymmetric Cryptography.pptx
Symmetric and asymmetric key cryptography
SYMMETRIC CRYPTOGRAPHY
Information Security & Cryptography
Classical encryption techniques
Classical Encryption Techniques

What's hot (20)

PPTX
Public Key Cryptography
PPTX
Substitution techniques
PPT
block ciphers
PPTX
Public Key Cryptosystem
PPTX
Kerberos
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PPTX
Cryptography and applications
PPT
DES (Data Encryption Standard) pressentation
PPTX
Advanced encryption standard (aes)
PDF
Transposition cipher
PPT
Network security cryptographic hash function
PDF
2. public key cryptography and RSA
PPTX
Cryptography and network security
PPTX
Hash Function
PPTX
cryptography
PPTX
RSA Algorithm
PPTX
SHA- Secure hashing algorithm
PPTX
Cryptography.ppt
PDF
RSA ALGORITHM
Public Key Cryptography
Substitution techniques
block ciphers
Public Key Cryptosystem
Kerberos
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Cryptography and applications
DES (Data Encryption Standard) pressentation
Advanced encryption standard (aes)
Transposition cipher
Network security cryptographic hash function
2. public key cryptography and RSA
Cryptography and network security
Hash Function
cryptography
RSA Algorithm
SHA- Secure hashing algorithm
Cryptography.ppt
RSA ALGORITHM
Ad

Similar to Information and network security 13 playfair cipher (20)

PDF
06 - Playfair cipher lets learn cryptography together
PPT
2. Classical Cryptosystems Classical.ppt
PPT
section-3 (1).ppt
PPT
Elementary cryptography
PPTX
Classical_Encryption_techniquescryp.pptx
PPT
CNS Subject ppt - Unit 1 covers about cryptography and network security subject
PPT
ch02.ppt
PPTX
Cryptography and Network Security--MOD-2.pptx
PPT
Classical encryption techniques
PPT
PPT
knowing/understanding playfair cipher.ppt
PPT
Chguatda.com/cmx.p02...1
PPT
Cryptography - Symmetric Encryption Ciphers
PPTX
Encrypted message transmitter on public network
PPT
UNIT 2.ppt
PPT
ch02 cryptograpghy in network security.ppt
PPT
PPT
classicalencryptiontechniques.ppt
PPT
Play Fair c cryptography and network security
PPT
History of Cipher System
06 - Playfair cipher lets learn cryptography together
2. Classical Cryptosystems Classical.ppt
section-3 (1).ppt
Elementary cryptography
Classical_Encryption_techniquescryp.pptx
CNS Subject ppt - Unit 1 covers about cryptography and network security subject
ch02.ppt
Cryptography and Network Security--MOD-2.pptx
Classical encryption techniques
knowing/understanding playfair cipher.ppt
Chguatda.com/cmx.p02...1
Cryptography - Symmetric Encryption Ciphers
Encrypted message transmitter on public network
UNIT 2.ppt
ch02 cryptograpghy in network security.ppt
classicalencryptiontechniques.ppt
Play Fair c cryptography and network security
History of Cipher System
Ad

More from Vaibhav Khanna (20)

PPTX
Information and network security 47 authentication applications
PPTX
Information and network security 46 digital signature algorithm
PPTX
Information and network security 45 digital signature standard
PPTX
Information and network security 44 direct digital signatures
PPTX
Information and network security 43 digital signatures
PPTX
Information and network security 42 security of message authentication code
PPTX
Information and network security 41 message authentication code
PPTX
Information and network security 40 sha3 secure hash algorithm
PPTX
Information and network security 39 secure hash algorithm
PPTX
Information and network security 38 birthday attacks and security of hash fun...
PPTX
Information and network security 37 hash functions and message authentication
PPTX
Information and network security 35 the chinese remainder theorem
PPTX
Information and network security 34 primality
PPTX
Information and network security 33 rsa algorithm
PPTX
Information and network security 32 principles of public key cryptosystems
PPTX
Information and network security 31 public key cryptography
PPTX
Information and network security 30 random numbers
PPTX
Information and network security 29 international data encryption algorithm
PPTX
Information and network security 28 blowfish
PPTX
Information and network security 27 triple des
Information and network security 47 authentication applications
Information and network security 46 digital signature algorithm
Information and network security 45 digital signature standard
Information and network security 44 direct digital signatures
Information and network security 43 digital signatures
Information and network security 42 security of message authentication code
Information and network security 41 message authentication code
Information and network security 40 sha3 secure hash algorithm
Information and network security 39 secure hash algorithm
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 37 hash functions and message authentication
Information and network security 35 the chinese remainder theorem
Information and network security 34 primality
Information and network security 33 rsa algorithm
Information and network security 32 principles of public key cryptosystems
Information and network security 31 public key cryptography
Information and network security 30 random numbers
Information and network security 29 international data encryption algorithm
Information and network security 28 blowfish
Information and network security 27 triple des

Recently uploaded (20)

PPTX
CHAPTER 2 - PM Management and IT Context
PDF
Softaken Excel to vCard Converter Software.pdf
PPTX
ai tools demonstartion for schools and inter college
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PPTX
ISO 45001 Occupational Health and Safety Management System
PDF
Nekopoi APK 2025 free lastest update
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PPTX
ManageIQ - Sprint 268 Review - Slide Deck
PDF
How Creative Agencies Leverage Project Management Software.pdf
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PPTX
history of c programming in notes for students .pptx
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
CHAPTER 2 - PM Management and IT Context
Softaken Excel to vCard Converter Software.pdf
ai tools demonstartion for schools and inter college
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
2025 Textile ERP Trends: SAP, Odoo & Oracle
ISO 45001 Occupational Health and Safety Management System
Nekopoi APK 2025 free lastest update
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
How to Migrate SBCGlobal Email to Yahoo Easily
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
ManageIQ - Sprint 268 Review - Slide Deck
How Creative Agencies Leverage Project Management Software.pdf
Wondershare Filmora 15 Crack With Activation Key [2025
Design an Analysis of Algorithms I-SECS-1021-03
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
history of c programming in notes for students .pptx
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises

Information and network security 13 playfair cipher

  • 1. Information and Network Security:13 Playfair Cipher Prof Neeraj Bhargava Vaibhav Khanna Department of Computer Science School of Engineering and Systems Sciences Maharshi Dayanand Saraswati University Ajmer
  • 2. Playfair Cipher not even the large number of keys in a monoalphabetic cipher provides security one approach to improving security was to encrypt multiple letters the Playfair Cipher is an example invented by Charles Wheatstone in 1854, but named after his friend Baron Playfair
  • 3. • Consider ways to reduce the "spikyness" of natural language text, since if just map one letter always to another, the frequency distribution is just shuffled. One approach is to encrypt more than one letter at once. The Playfair cipher is an example of doing this, treats digrams in the plaintext as single units and translates these units into ciphertext digrams.
  • 4. Playfair Key Matrix a 5X5 matrix of letters based on a keyword fill in letters of keyword (sans duplicates) fill rest of matrix with other letters eg. using the keyword MONARCHY M O N A R C H Y B D E F G I/J K L P Q S T U V W X Z
  • 5. • The best-known multiple-letter encryption cipher is the Playfair, which treats digrams in the plaintext as single units and translates these units into ciphertext digrams. • The Playfair algorithm is based on the use of a 5x5 matrix of letters constructed using a keyword. • The rules for filling in this 5x5 matrix are: L to R, top to bottom, first with keyword after duplicate letters have been removed, and then with the remain letters, with I/J used as a single letter. • This example comes from Dorothy Sayer's book "Have His Carcase", in which Lord Peter Wimsey solves it, and describes the use of a probably word attack.
  • 6. Encrypting and Decrypting • plaintext is encrypted two letters at a time 1. if a pair is a repeated letter, insert filler like 'X’ 2. if both letters fall in the same row, replace each with letter to right (wrapping back to start from end) 3. if both letters fall in the same column, replace each with the letter below it (wrapping to top from bottom) 4. otherwise each letter is replaced by the letter in the same row and in the column of the other letter of the pair
  • 7. • Plaintext is encrypted two letters at a time,according to the rules as shown. Note how you wrap from right side back to left, or from bottom back to top. • if a pair is a repeated letter, insert a filler like 'X', eg. "balloon" encrypts as "ba lx lo on" • if both letters fall in the same row, replace each with letter to right (wrapping back to start from end), eg. “ar" encrypts as "RM" • if both letters fall in the same column, replace each with the letter below it (again wrapping to top from bottom), eg. “mu" encrypts to "CM" • otherwise each letter is replaced by the one in its row in the column of the other letter of the pair, eg. “hs" encrypts to "BP", and “ea" to "IM" or "JM" (as desired) • Decrypting of course works exactly in reverse. Can see this by working the example pairs shown, backwards.
  • 8. Security of Playfair Cipher security much improved over monoalphabetic since have 26 x 26 = 676 digrams would need a 676 entry frequency table to analyse (verses 26 for a monoalphabetic) and correspondingly more ciphertext was widely used for many years eg. by US & British military in WW1 it can be broken, given a few hundred letters since still has much of plaintext structure
  • 9. • The Playfair cipher is a great advance over simple monoalphabetic ciphers, since there are 26*26=676 digrams (vs 26 letters), so that identification of individual digrams is more difficult. • Also,the relative frequencies of individual letters exhibit a much greater range than that of digrams, making frequency analysis much more difficult. • The Playfair cipher was for a long time considered unbreakable. It was used as the standard field system by the British Army in World War I and still enjoyed considerable use by the U.S.Army and other Allied forces during World War II. • Despite this level of confidence in its security, the Playfair cipher is relatively easy to break because it still leaves much of the structure of the plaintext language intact. A few hundred letters of ciphertext are generally sufficient.
  • 10. Assignment • Explain Playfair Cipher and comment on Security of Playfair Cipher