{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:32:02Z","timestamp":1750221122639,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,2,19]],"date-time":"2019-02-19T00:00:00Z","timestamp":1550534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,2,19]]},"DOI":"10.1145\/3316615.3316689","type":"proceedings-article","created":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T12:17:59Z","timestamp":1557749879000},"page":"457-461","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["An Enhanced Key Security of Playfair Cipher Algorithm"],"prefix":"10.1145","author":[{"given":"Richard M.","family":"Marzan","sequence":"first","affiliation":[{"name":"Technological Institute of the Philippines, Quezon City, Philippines"}]},{"given":"Ariel M.","family":"Sison","sequence":"additional","affiliation":[{"name":"Technological Institute of the Philippines, Quezon City, Philippines"}]}],"member":"320","published-online":{"date-parts":[[2019,2,19]]},"reference":[{"volume-title":"A symmetric key cryptographic algorithm. 2010 International Journal of Computer Applications (0975-8887)","author":"Ayushi M.","key":"e_1_3_2_1_1_1","unstructured":"Ayushi , M. 2010. A symmetric key cryptographic algorithm. 2010 International Journal of Computer Applications (0975-8887) Volume 1- No. 15 . Ayushi, M. 2010. A symmetric key cryptographic algorithm. 2010 International Journal of Computer Applications (0975-8887) Volume 1- No. 15."},{"volume-title":"2nd World Congress on Computing and Communication Technologies, WCCCT 2017: 51--54","author":"Mahendran R.","key":"e_1_3_2_1_2_1","unstructured":"Mahendran , R. , and Mani , K . 2017. Generation of key matrix for hill cipher encryption using classical cipher . 2nd World Congress on Computing and Communication Technologies, WCCCT 2017: 51--54 . Mahendran, R., and Mani, K. 2017. Generation of key matrix for hill cipher encryption using classical cipher. 2nd World Congress on Computing and Communication Technologies, WCCCT 2017: 51--54."},{"key":"e_1_3_2_1_3_1","unstructured":"Kumar Sanjay and Mathur Sandeep 2018. Extended 16x16 Playfair algorithm for secure key exchange using RSA. International Journal of Scientific and Innovative Research 2017; 5(1): 74--81 P-ISSN 2347-2189 E-ISSN 2347-497 (February).  Kumar Sanjay and Mathur Sandeep 2018. Extended 16x16 Playfair algorithm for secure key exchange using RSA. International Journal of Scientific and Innovative Research 2017; 5(1): 74--81 P-ISSN 2347-2189 E-ISSN 2347-497 (February)."},{"issue":"2","key":"e_1_3_2_1_4_1","first-page":"287","article-title":"A survey report on various cryptanalysis techniques","volume":"3","author":"Kendhe","year":"2013","unstructured":"Kendhe , Ashish Kumar, and Himani Agrawal 2013 . A survey report on various cryptanalysis techniques . International Journal of Soft Computing and Engineering (IJSCE) 3 ( 2 ): 287 -- 293 . Kendhe, Ashish Kumar, and Himani Agrawal 2013. A survey report on various cryptanalysis techniques. International Journal of Soft Computing and Engineering (IJSCE) 3(2): 287--93.","journal-title":"International Journal of Soft Computing and Engineering (IJSCE)"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/978\/1\/012114"},{"volume-title":"International Journal of Computer Applications (0975-8887)","author":"Chauhan S. S.","key":"e_1_3_2_1_6_1","unstructured":"Chauhan , S. S. , & Gurjar , R. N. 2014. Secure key exchange using RSA in extended Playfair cipher technique , International Journal of Computer Applications (0975-8887) Volume 104 - No 15, (October 2014). Chauhan, S. S., & Gurjar, R. N. 2014. Secure key exchange using RSA in extended Playfair cipher technique, International Journal of Computer Applications (0975-8887) Volume 104 - No 15, (October 2014)."},{"key":"e_1_3_2_1_7_1","volume-title":"International Journal of Computer Applications (0975-8887)","author":"Subramaniyam C. S.","year":"2016","unstructured":"Subramaniyam , C. S. 2016. Playfair using DES algorithm, 7 by 9 matrix and colour substitution . International Journal of Computer Applications (0975-8887) Volume 150 -- No .6, September 2016 . Subramaniyam, C. S. 2016. Playfair using DES algorithm, 7 by 9 matrix and colour substitution. International Journal of Computer Applications (0975-8887) Volume 150 -- No.6, September 2016."},{"key":"e_1_3_2_1_8_1","volume-title":"Veena","author":"Khare","year":"2017","unstructured":"Khare , Nitya, and Dhari , S . Veena . 2017 . A survey on Playfair cipher encryption technique. International Journal for Scientific Research & Development| Vol. 5 , Issue 10, 2017. Khare, Nitya, and Dhari, S. Veena. 2017. A survey on Playfair cipher encryption technique. International Journal for Scientific Research & Development| Vol. 5, Issue 10, 2017."},{"key":"e_1_3_2_1_9_1","volume-title":"International Journal of Engineering and Computer Science ISSN:2319-7242","author":"Shrivastava","year":"2013","unstructured":"Shrivastava , Gaurav, Manoj Chouhan , and Manoj Dhawan. 2013. A modified version of extended Playfair cipher (8x8) . International Journal of Engineering and Computer Science ISSN:2319-7242 Volume 2 Issue 4 April , 2013 Page No. 956--961 Shrivastava, Gaurav, Manoj Chouhan, and Manoj Dhawan. 2013. A modified version of extended Playfair cipher (8x8). International Journal of Engineering and Computer Science ISSN:2319-7242 Volume 2 Issue 4 April, 2013 Page No. 956--961"},{"key":"e_1_3_2_1_10_1","volume-title":"Engineering & Technology","volume":"2","author":"Zakariyau B.","year":"2015","unstructured":"Zakariyau , Yahaya B. 2015 . Securing message transactions through modified Playfair cipher technique. International Journal of Innovative Science , Engineering & Technology , Vol. 2 Issue 12, December 2015. Zakariyau, Yahaya B. 2015. Securing message transactions through modified Playfair cipher technique. International Journal of Innovative Science, Engineering & Technology, Vol. 2 Issue 12, December 2015."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5120\/7363-0192"},{"volume-title":"International Journal of Computer Applications (0975-8887)","author":"Iqbal","key":"e_1_3_2_1_12_1","unstructured":"Iqbal , Zubair, Bhumika Gupta , and Prachi Gupta. 2014. Enhanced the security of Playfair technique using excess 3 code (XS3) and Ceasar cipher . International Journal of Computer Applications (0975-8887) Volume 103 -- No 13, (October 2014). Iqbal, Zubair, Bhumika Gupta, and Prachi Gupta. 2014. Enhanced the security of Playfair technique using excess 3 code (XS3) and Ceasar cipher. International Journal of Computer Applications (0975-8887) Volume 103 -- No 13, (October 2014)."},{"key":"e_1_3_2_1_13_1","volume-title":"Harinandan and Soumen Mukherjee","author":"Tunga","year":"2012","unstructured":"Tunga , Harinandan and Soumen Mukherjee . 2012 . A new modified Playfair algorithm based on frequency analysis. International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, Volume 2 , Issue 1, January 2012). Tunga, Harinandan and Soumen Mukherjee. 2012. A new modified Playfair algorithm based on frequency analysis. International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, Volume 2, Issue 1, January 2012)."},{"key":"e_1_3_2_1_14_1","article-title":"A modified encryption technique using Playfair cipher 10 by 9 matrix with six iteration steps","volume":"3","author":"Bhattacharyya S.","year":"2014","unstructured":"Bhattacharyya , S. , Chand , N. , & Chakraborty , S. 2014 . A modified encryption technique using Playfair cipher 10 by 9 matrix with six iteration steps . International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 3 , Issue 2, (February 2014). Bhattacharyya, S., Chand, N., & Chakraborty, S. 2014. A modified encryption technique using Playfair cipher 10 by 9 matrix with six iteration steps. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 3, Issue 2, (February 2014).","journal-title":"International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)"},{"issue":"3","key":"e_1_3_2_1_15_1","article-title":"Enhancing the security of communication using encryption algorithm based on ASCII values of data","volume":"11","author":"Qazi F.","year":"2017","unstructured":"Qazi , F. , Khan , F. H. , Kiani , K. N. , Ahmed , S. & Khan , S. A. 2017 . Enhancing the security of communication using encryption algorithm based on ASCII values of data , International Journal of Security and Its Application Vol. 11 , No. 3 (2017). Qazi, F., Khan, F. H., Kiani, K. N., Ahmed, S. & Khan, S. A. 2017. Enhancing the security of communication using encryption algorithm based on ASCII values of data, International Journal of Security and Its Application Vol. 11, No. 3 (2017).","journal-title":"International Journal of Security and Its Application"},{"key":"e_1_3_2_1_16_1","unstructured":"Mathur S. & Srivastava S. 2018. Extended 16x16 Playfair algorithm for secure key exchange using RSA algorithm. International Journal on Future Revolution in Computer Science & Communication Engineering. ISSN: 2454--4248 Volume: 4 Issue: 2 496--502  Mathur S. & Srivastava S. 2018. Extended 16x16 Playfair algorithm for secure key exchange using RSA algorithm. International Journal on Future Revolution in Computer Science & Communication Engineering. ISSN: 2454--4248 Volume: 4 Issue: 2 496--502"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the 2002 ASEE Gulf-Southwest Annual Conference, The University of Louisiana at Lafayette","author":"Kota C. M.","year":"1999","unstructured":"Kota , C. M. , & Aissi , C. 1999 . Implementation of the RSA algorithm and its cryptanalysis . In Proceedings of the 2002 ASEE Gulf-Southwest Annual Conference, The University of Louisiana at Lafayette , March 20-22, 2002.Copyright \u00a9 2002, American Society for Engineering Education. DOI= http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.130.6258&rep=rep1&type=pdf. Kota, C. M., & Aissi, C. 1999. Implementation of the RSA algorithm and its cryptanalysis. In Proceedings of the 2002 ASEE Gulf-Southwest Annual Conference, The University of Louisiana at Lafayette, March 20-22, 2002.Copyright \u00a9 2002, American Society for Engineering Education. DOI= http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.130.6258&rep=rep1&type=pdf."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/978\/1\/012068"},{"key":"e_1_3_2_1_19_1","first-page":"5","article-title":"Cryptography and Computer Security Department of Computer Science & Engineering University of Nebraska---Lincoln","volume":"68588","author":"Bourke","year":"2015","unstructured":"Bourke , 2015 Cryptography and Computer Security Department of Computer Science & Engineering University of Nebraska---Lincoln , NE 68588 , 2015, pp 5 -- 138 . Bourke, 2015 Cryptography and Computer Security Department of Computer Science & Engineering University of Nebraska---Lincoln, NE 68588, 2015, pp 5--138.","journal-title":"NE"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIACT.2018.8350759"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/998669.998915"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.22214\/ijraset.2018.4240"}],"event":{"name":"ICSCA '19: 2019 8th International Conference on Software and Computer Applications","sponsor":["University of New Brunswick University of New Brunswick"],"location":"Penang Malaysia","acronym":"ICSCA '19"},"container-title":["Proceedings of the 2019 8th International Conference on Software and Computer Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3316615.3316689","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3316615.3316689","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:12Z","timestamp":1750208532000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3316615.3316689"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,19]]},"references-count":22,"alternative-id":["10.1145\/3316615.3316689","10.1145\/3316615"],"URL":"https:\/\/doi.org\/10.1145\/3316615.3316689","relation":{},"subject":[],"published":{"date-parts":[[2019,2,19]]},"assertion":[{"value":"2019-02-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}