0% found this document useful (0 votes)
57 views4 pages

"Instruments" 'In' 'ST' 'Ru' 'Me' 'NT' 'SZ'

The Playfair Cipher Encryption Algorithm consists of two steps: 1. Generate a 5x5 key square grid with unique alphabets (omitting J) based on the encryption key. 2. Encrypt plaintext by splitting it into pairs of letters called digraphs. The letters in each digraph are then replaced with the letters located in the corresponding positional rules in the key square grid.

Uploaded by

Bhasutkar Mahesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views4 pages

"Instruments" 'In' 'ST' 'Ru' 'Me' 'NT' 'SZ'

The Playfair Cipher Encryption Algorithm consists of two steps: 1. Generate a 5x5 key square grid with unique alphabets (omitting J) based on the encryption key. 2. Encrypt plaintext by splitting it into pairs of letters called digraphs. The letters in each digraph are then replaced with the letters located in the corresponding positional rules in the key square grid.

Uploaded by

Bhasutkar Mahesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

The Playfair Cipher Encryption Algorithm: 

The Algorithm consists of 2 steps: 


 
1. Generate the key Square(5×5): 
 The key square is a 5×5 grid of alphabets that acts as the key for encrypting the
plaintext. Each of the 25 alphabets must be unique and one letter of the alphabet
(usually J) is omitted from the table (as the table can hold only 25 alphabets). If the
plaintext contains J, then it is replaced by I. 
 
 The initial alphabets in the key square are the unique alphabets of the key in the order in
which they appear followed by the remaining letters of the alphabet in order. 
 
2. Algorithm to encrypt the plain text: The plaintext is split into pairs of two letters
(digraphs). If there is an odd number of letters, a Z is added to the last letter. 
For example: 
 
PlainText: "instruments"
After Split: 'in' 'st' 'ru' 'me' 'nt' 'sz'
1. Pair cannot be made with same letter. Break the letter in single and add a bogus letter to the
previous letter.
Plain Text: “hello”
After Split: ‘he’ ‘lx’ ‘lo’
Here ‘x’ is the bogus letter.
2. If the letter is standing alone in the process of pairing, then add an extra bogus letter with
the alone letter
Plain Text: “helloe”
AfterSplit: ‘he’ ‘lx’ ‘lo’ ‘ez’
Here ‘z’  is the bogus letter.
Rules for Encryption: 
 
 If both the letters are in the same column: Take the letter below each one (going back to
the top if at the bottom).
For example: 
 
Diagraph: "me"
Encrypted Text: cl
Encryption:
m -> c
e -> l
  
  
 If both the letters are in the same row: Take the letter to the right of each one (going back
to the leftmost if at the rightmost position).
For example: 
 
Diagraph: "st"
Encrypted Text: tl
Encryption:
s -> t
t -> l
  

  
 If neither of the above rules is true: Form a rectangle with the two letters and take the
letters on the horizontal opposite corner of the rectangle.
For example: 
 
Diagraph: "nt"
Encrypted Text: rq
Encryption:
n -> r
t -> q
  

  
For example: 
 
Plain Text: "instrumentsz"
Encrypted Text: gatlmzclrqtx
Encryption:
i -> g
n -> a
s -> t
t -> l
r -> m
u -> z
m -> c
e -> l
n -> r
t -> q
s -> t
z -> x
 

You might also like