SlideShare a Scribd company logo
Playfair Cipher
Playfair Cipher
• First practical digraph substitution cipher.
• Invented by Charles Wheatstone in 1854
• Named after Lord Playfair
• Used for tactical purposes by British
Forces in Second Boer War an in World
War I and for the same purpose by
the Australians during World War II
Encryption Algorithm Steps
• Generate the Key Square (5x5)
– The key square is a 5x5 grid of alphabets that
acts as the key for encrypting the plaintext.
– One letter is omitted from the table (letter J)
– The initial alphabets in the key square are the
unique alphabets of the key in the
order in which they appear followed
by the remaining letters of the
alphabet in order.
Encryption Algorithm Steps
• Algorithm to encrypt the plain text
– The plaintext is split into pairs of two letters.
– If there is an odd number of letters, a Q is
added to the last letter.
Rules for Encryption
• If both the letters are in the same column:
– Take the letter below each one (going back to
the top if at the bottom)
• If both the letters are in the same row:
– Take the letter to the right of each one (going
back to the leftmost if at the rightmost
position)
Rules for Encryption
• If neither of the above rules is true:
– Form a rectangle with the two letters and take
the letters on the horizontal opposite corner of
the rectangle.
Examples
• Keyword: KEYWORD
• Plaintext: Why Don’t You?
• Plaintext: Come to the Window
K E Y W O
B D A B C
F G H I/J L
M N P Q S
T U V X Z
P: WH YD ON TY OU
C: YI EA ES VK EZ
P: CO ME TO TH EW IN DO WQ
C: LC NK ZK VF YO GQ CE BX
Practice
1. If key = “computer”, write the playfair cipher key matrix
2. Solve using playfair cipher key: “primrose”, plaintext is
“hike the foothills.”
3. For the given PT = CRYPTOGRAPHY and key is
SECURITY find the cipher text using playfair.
4. If key = “colgate”, write the playfair cipher key matrix.
5. Find cipher text using Playfair cipher for given
PT = UNIVERSITY
key = HELLO

More Related Content

PPTX
Activity playfair cipher.pptx
PPT
Play Fair c cryptography and network security
PPTX
4.SUBSTITUTION TECHNIQUES-1.pptxjjggddssadssdddf
PDF
Classical Encryption Techniques.pdf
PPTX
WINSEM2024-25_BCSE309L_TH_VL2024250501869_2025-01-03_Reference-Material-I.pptx
PPTX
Topic3 playfain
PPTX
Polygraphic Substitution Cipher -Part 1
PPT
Classical Encryption
Activity playfair cipher.pptx
Play Fair c cryptography and network security
4.SUBSTITUTION TECHNIQUES-1.pptxjjggddssadssdddf
Classical Encryption Techniques.pdf
WINSEM2024-25_BCSE309L_TH_VL2024250501869_2025-01-03_Reference-Material-I.pptx
Topic3 playfain
Polygraphic Substitution Cipher -Part 1
Classical Encryption

Similar to knowing/understanding playfair cipher.ppt (13)

PDF
06 - Playfair cipher lets learn cryptography together
PPTX
Playfair Cipher Cryptography and Network Security
PPTX
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
PPTX
Cryptography and Network Security--MOD-2.pptx
PPTX
Cryptography make easy
PPT
playfair-cipherwith simple explanantion .pptppt
PDF
Computer Security Lecture 2: Classical Encryption Techniques 1
PDF
IS_Classical-Encryption-Techniques_5.pdf
PDF
algorithms so d6yeudh yedghd eg edej.pdf
PPTX
Information security (Symmetric encryption, cryptography, crypto-analysis)
PPTX
Unit 3 -Symmetric Key Cryptographic Algorithms – I.pptx
PPT
EncryptionTechChap2.ppt
PPT
Classical Encryption Techniques
06 - Playfair cipher lets learn cryptography together
Playfair Cipher Cryptography and Network Security
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
Cryptography and Network Security--MOD-2.pptx
Cryptography make easy
playfair-cipherwith simple explanantion .pptppt
Computer Security Lecture 2: Classical Encryption Techniques 1
IS_Classical-Encryption-Techniques_5.pdf
algorithms so d6yeudh yedghd eg edej.pdf
Information security (Symmetric encryption, cryptography, crypto-analysis)
Unit 3 -Symmetric Key Cryptographic Algorithms – I.pptx
EncryptionTechChap2.ppt
Classical Encryption Techniques
Ad

Recently uploaded (20)

PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
RMMM.pdf make it easy to upload and study
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
Classroom Observation Tools for Teachers
PPTX
Cell Types and Its function , kingdom of life
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
01-Introduction-to-Information-Management.pdf
PPTX
master seminar digital applications in india
Microbial disease of the cardiovascular and lymphatic systems
O7-L3 Supply Chain Operations - ICLT Program
Final Presentation General Medicine 03-08-2024.pptx
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
Final Presentation General Medicine 03-08-2024.pptx
RMMM.pdf make it easy to upload and study
2.FourierTransform-ShortQuestionswithAnswers.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Classroom Observation Tools for Teachers
Cell Types and Its function , kingdom of life
STATICS OF THE RIGID BODIES Hibbelers.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
O5-L3 Freight Transport Ops (International) V1.pdf
01-Introduction-to-Information-Management.pdf
master seminar digital applications in india
Ad

knowing/understanding playfair cipher.ppt

  • 2. Playfair Cipher • First practical digraph substitution cipher. • Invented by Charles Wheatstone in 1854 • Named after Lord Playfair • Used for tactical purposes by British Forces in Second Boer War an in World War I and for the same purpose by the Australians during World War II
  • 3. Encryption Algorithm Steps • Generate the Key Square (5x5) – The key square is a 5x5 grid of alphabets that acts as the key for encrypting the plaintext. – One letter is omitted from the table (letter J) – The initial alphabets in the key square are the unique alphabets of the key in the order in which they appear followed by the remaining letters of the alphabet in order.
  • 4. Encryption Algorithm Steps • Algorithm to encrypt the plain text – The plaintext is split into pairs of two letters. – If there is an odd number of letters, a Q is added to the last letter.
  • 5. Rules for Encryption • If both the letters are in the same column: – Take the letter below each one (going back to the top if at the bottom) • If both the letters are in the same row: – Take the letter to the right of each one (going back to the leftmost if at the rightmost position)
  • 6. Rules for Encryption • If neither of the above rules is true: – Form a rectangle with the two letters and take the letters on the horizontal opposite corner of the rectangle.
  • 7. Examples • Keyword: KEYWORD • Plaintext: Why Don’t You? • Plaintext: Come to the Window
  • 8. K E Y W O B D A B C F G H I/J L M N P Q S T U V X Z P: WH YD ON TY OU C: YI EA ES VK EZ P: CO ME TO TH EW IN DO WQ C: LC NK ZK VF YO GQ CE BX
  • 9. Practice 1. If key = “computer”, write the playfair cipher key matrix 2. Solve using playfair cipher key: “primrose”, plaintext is “hike the foothills.” 3. For the given PT = CRYPTOGRAPHY and key is SECURITY find the cipher text using playfair. 4. If key = “colgate”, write the playfair cipher key matrix. 5. Find cipher text using Playfair cipher for given PT = UNIVERSITY key = HELLO