Joint Workshop KO2PI and The 1st International Conference on Advance & Scientific Innovation

Research Article

Implementation of Super Playfair in Messaging

Download886 downloads
  • @INPROCEEDINGS{10.4108/eai.23-4-2018.2277591,
        author={Andysah Putera Utama Siahaan and Mesran Mesran and Imam Solihin},
        title={Implementation of Super Playfair in Messaging},
        proceedings={Joint Workshop KO2PI and The 1st International Conference on Advance \& Scientific Innovation},
        publisher={EAI},
        proceedings_a={ICASI},
        year={2018},
        month={7},
        keywords={cryptography super playfair two square symmetric key},
        doi={10.4108/eai.23-4-2018.2277591}
    }
    
  • Andysah Putera Utama Siahaan
    Mesran Mesran
    Imam Solihin
    Year: 2018
    Implementation of Super Playfair in Messaging
    ICASI
    EAI
    DOI: 10.4108/eai.23-4-2018.2277591
Andysah Putera Utama Siahaan1,*, Mesran Mesran2, Imam Solihin2
  • 1: Faculty of Science and Technology, Universitas Pembangunan Panca Budi, Medan, Indonesia; School of Computer and Communication Engineering, Universiti Malaysia Perlis, Perlis, Malaysia
  • 2: Department of Computer Informatics, STMIK Budi Darma, Indonesia
*Contact email: andiesiahaan@gmail.com

Abstract

Data is the essential thing in the world of communication. Text messaging is a way of communicating that is sent in digital form. This message is very widely used in electronic media such as short message service. This message was sent through the service provider. Messages sent are unsafe and can be intercepted at the time of submission. Message delivery needs to apply cryptographic algorithms to text messages sent using encryption and decryption techniques. Super Playfair cipher and two square cipher algorithms are a development of Playfair cipher method. This method is a quite complicated way of solving it than other classical methods. These methods belong to classical cryptographic algorithms that use substitution encoding techniques and character transitions that use a symmetric key in the process of encryption and decryption.