New symmetric key cipher capable of digraph to single letter conversion utilizing binary system

Najdavan Abduljawad Kako, Haval Tariq Sadeeq, Araz Rajab Abrahim


In this paper, a new Playfair cipher built on bits level symmetric key cryptographic was proposed for the purpose of converting pairs of letters (digraphs) into single letters. The proposed algorithm is capable to overcome many of the shortcoming and vulnerabilities that exist in the current classical version of Playfair algorithm. The Playfair cipher is exceedingly complex than a classical substitution cipher, but still simple to hack using automated tactics. It is famous as a digraph cipher because two letters are exchanged by other two letters. This destroys any solo letter occurrence statistics, but the digraph statistics still unaffected (frequencies of two letters). Unluckily letter pairs have a flatter distribution than the one letter frequencies, so this intricacy matters for solving the code using pen and paper procedures. The suggested encryption process is conducted as follows; letters are first arranged in a spiral manner in Polybius square, afterwards, each pair will be replaced utilizing before-after technique if we are arranging pairs horizontally and down-up technique (vertically). The former process produces pairs of Plaintext that will be converted to binary bit stream then will be divided over blocks with stable sizes. Bits of these blocks are taken from pairs then fit them into square matrix of suitable order to put the concept of row-wise and revers row-wise matrix. Bits of this matrix are split into 2x2 square matrixes. The sub-matrixes are formed 8 bits. Here the XNOR operation is taken into consideration for bitwise operation to generate the keys for decryption and produce the cipher-text.


Cryptography ,symmetri, cipher Playfair, cipher digraph, XNOR, ASCII code



W. Stallings. Cryptography and network security: principles and practice, 6th Edition. Upper Saddle River, NJ: Pearson, 2014.

M. Paul1, J. Mandal, “A Novel Symmetric Key Cryptographic Technique at Bit Level Based on Spiral Matrix Concept,” International Conference on Information Technology, Electronics and Communications, ICITEC 2013, Bangalore, India, March 30 – 31, 2013, H. Suwastio, S. Najeeb, Eds. Bangalore: International Academic and Industrial Research Solutions, 2013. pp. 06-11.

B. A. Forouzan, D. Mukhopadhyay, Cryptography and Network Security, 2nd Edition, Noida, Uttar Pradesh, India: Tata McGraw-Hill Education Pvt. Ltd., 2010.

V. Verma, D. Kaur, “3D - Playfair Cipher with additional Bitwise Operation,” International Conference on Control, Computing, Communication and Materials, ICCCCM 2013, Allahabad, India, August 03-04, 2013, D. Bartaria, V. Rao, Eds. Allahabad: IEEE Joint Chapter, 2013. pp. 1-6.

S. Singh, R. Singh, “Developing 3D-Playfair Cipher Algorithm Using Structure Rotation,” International Conference on Advances in Computer Engineering and Applications, ICACEA 2015, Ghaziabad, India, March 19-20, Ghaziabad, India: IEEE, 2015, pp. 1004-1008.

N. A. Kako, "Classical Cryptography for Kurdish Language," in Civil & Computer Engineering Applications: Proc. of the 4th Int. Conf. on Developments, IEC 2018, Erbil, Iraq, February 26-27, 2018, B. Çelik, B. Hassan, M. Awni, Eds. Erbil: Ishik University, 2018. pp. 20-28.

S. Srivastava, N. Gupta, “Security aspects of the Extended Playfair cipher,” International Conference on Communication Systems and Network Technologies, CSNT 2011, Katra, Jammu, India, June 3-5, 2011, G. Tomar, A. Abraham, D. Bhatnagar, A. Pandit, Eds. Katra, Jammu: IEEE Computer Society, 2011. pp. 144-147.

Ayushi, “A Symmetric Key Cryptographic Algorithm,” International Journal of Computer Applications, vol. 1, no. 15, p. 1-4, February 2010, [Online]. Available: Foundation of Computer Science, [Accessed Feb., 2010].

V. U. K. Sastry, K. Anup kumar, “A Modified Feistel Cipher involving a key as a multiplicant on both the sides of the Plaintext matrix and supplemented with Mixing Permutation and XOR Operation”, International Journal of Computer Technology and Applications, vol. 3, no, 1, pp. 23-31, Jan-Feb 2012.

V. Subhashini, N. Geethanjali, P. Vidyasagar, P. Amrutha, “A Novel Approach on Encryption and Decryption of 5X5 Playfair Cipher Algorithm”, International Conference on Innovative Applications in Engineering and Information Technology, ICIAEIT 2017, March 2017, vol. 3, no. 01, pp. 102-105, Mar 2017.

Murali P, Senthilkumar G, "Modified Version of Playfair Cipher Using Linear Feedback Shift Register", IEEE Computer Society, pp. 488-490, Jun 2009.

S. Krishnaswamy, H. K. Pillai, "On the Number of Linear Feedback Shift Registers with a Special Structure", IEEE Transactions on Information Theory, vol. 58, no. 3, pp. 1783-1790, Mar 2012.

A. Nath, S. Ghosh, M.A. Mallik, “Symmetric Key Cryptography Using Random Key Generator”, Proceedings of the International Conference on Security & Management, SAM 2010, July 12-15, 2010, Las Vegas Nevada, USA: DBLP, 2010. vol. 2, pp. 239-244.

A. M. Abdulazeez, A. Sh. Tahir, “Design and Implementation of Advanced Encryption Standard Security Algorithm Using FPGA”, International Journal of Scientific & Engineering Research, vol. 4, Issue 9, pp. 1988-1993, Sept 2013.

N. M. Fares, Sh. Askar, “A Novel Semi-Symmetric Encryption Algorithm for Internet Applications”, Journal of University of Duhok, vol. 19, no. 1, pp. 1-9, Jan 2016.

A. M. Abdulazeez, F. S. Khamo, “A Proposed Data Security Algorithm Based on Cipher Feedback Mode and its Simulink Implementation”, International Journal of Scientific & Engineering Research, Vol 4, Issue 9, pp. 1598-1606. Sept 2013.

D. A. Zebari, H. Haron, S. R. Zeebaree, D. Q. Zeebaree, “Multi-Level of DNA Encryption Technique Based on DNA Arithmetic and Biological Operations”, International Conference on Advanced Science and Engineering, ICOASE 2018, Oct 9-11, 2018, Duhok, Kurdistan Region-Iraq: IEEE 2018, pp. 312-317.

Brifcani, A. M. A., & Brifcani, W. M. A. (2010). Stego-based-crypto technique for high security applications. International Journal of Computer Theory and Engineering, 2(6), 835.

Abdulazeez, A. M., & Tahir, A. S. (2013). Design and Implementation of Advanced Encryption Standard Security Algorithm using FPGA. Int. J. of Computers & Technology, 4(9), 1988-1993.

Utomo, P., Nasution, N. W., & Arisman, R. W. S. A Theoretical and Experimental Comparison of One Time Pad Cryptography using Key and Plaintext Insertion and Transposition (KPIT) and Key Coloumnar Transposition (KCT) Method.

RK, M., & Arivazhagan, A. (2017). RTL modelling for the cipher block chaining mode (CBC) for data security. Indonesian Journal of Electrical Engineering and Computer Science, 8(3), 709-711.

Total views : 26 times


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

shopify stats IJEECS visitor statistics