CS8792 - CRYPTOGRAPHY AND NETWORK SECURITY - UNIT 1 - TOPIC 9.3 -PLAYFAIR CIPHER IN TAMIL BY ABISHA
The Playfair cipher is a classical symmetric encryption technique that was invented by Sir Charles Wheatstone in 1854, but it was named after Lord Playfair, ...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Kenya under the topic 'tottenham vs man united'.
About this video
The Playfair cipher is a classical symmetric encryption technique that was invented by Sir Charles Wheatstone in 1854, but it was named after Lord Playfair, who promoted its use. It's a type of substitution cipher that encrypts pairs of letters (digraphs), making it more secure than simple substitution ciphers.
Here's how the Playfair cipher works:
Key Table Setup:
1. Key Square (5x5 Grid): A key square is created by placing a keyword (without repeating letters) in a 5x5 grid. The remaining letters of the alphabet (excluding the ones in the keyword) are added to the grid in order.
Example Key Square (using the keyword "KEYWORD"):
```
K E Y W O
R D A B C
F G H I L
M N P Q S
T U V X Z
```
Encryption Process:
1. Breaking the Message into Digraphs:
- Break the plaintext message into pairs of letters (digraphs).
- Add a filler (like 'X') if there is an odd number of letters.
2. Rule for Same Letter:
- If both letters of a digraph are the same, add a filler letter ('X') after the first letter.
3. Letter Pairs in Same Row:
- If both letters are in the same row of the key square, replace each letter with the letter to its right (wrapping around to the left if at the end of the row).
4. Letter Pairs in Same Column:
- If both letters are in the same column of the key square, replace each letter with the letter below it (wrapping around to the top if at the bottom of the column).
5. Letter Pairs in Different Rows and Columns:
- Form a rectangle with the two letters and replace each letter with the letter at the other end of the rectangle.
6. Handling Repeated Letters:
- If a letter is repeated in the same digraph, insert a filler letter ('X') between them and proceed.
Decryption:
1. The decryption process is the reverse of encryption. It involves finding the positions of the letters in the key square and moving accordingly.
Example:
Let's encrypt the message "HELLO" using the key square provided above.
1. Break the message into digraphs: "HE", "LL", "O".
2. Apply the Playfair rules to encrypt each digraph.
- "HE" becomes "BY" (H and E are in the same row).
- "LL" becomes "AO" (Ls are in the same column).
- "O" becomes "ON" (O and N form a rectangle).
So, the encrypted message is "BYAOON."
Keep in mind that the Playfair cipher has limitations and is vulnerable to frequency analysis, but it provides a higher level of security compared to simpler substitution ciphers.
CS8792 - CRYPTOGRAPHY AND NETWORK SECURITY - UNIT 1 - TOPIC 9.3 -PLAYFAIR CIPHER IN TAMIL BY ABISHA
LIKE SHARE SUBSCRIBE
ANY DOUBTS, COMMENT.
HAVE A HAPPY LEARNING
Video Information
Views
6.5K
Total views since publication
Likes
106
User likes and reactions
Duration
8:21
Video length
Published
Sep 26, 2020
Release date
Quality
hd
Video definition
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
#CNS #CRYPTOGRAPHY AND NETWORK SECURITY #2017 REGULATION #STEGANOGRAPHY #CSE #7TH SEM #ANNA UNIVERSITY #Playfair Cipher #Classical Ciphers #Cryptography #Symmetric Encryption #Playfair Cipher Explained #Encryption Techniques #Secure Communication #Information Security #Cryptanalysis #Digraph Encryption #Wheatstone Cipher #Symmetric Key Encryption #Classical Cryptography #Cipher Algorithms #Encryption Methods #Playfair Algorithm #Cryptography Basics #Data Security
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.