Papers by Subhajit Bhattacharyya
A Novel Approach for Encryption of Text Messages Using PLAYFAIR Cipher 6 by 6 Matrix with Four Iteration Steps
478 Abstract— Play fair Cipher algorithm has demonstrated its success for encryption of text mess... more 478 Abstract— Play fair Cipher algorithm has demonstrated its success for encryption of text messages over the years. This algorithm uses normally 5 by 5 matrices.[5] The main disadvantages of this matrix is we cannot use numeric and also have to compromise between I and J. Here we use this concept but extend the matrix dimension 6 by 6, so that we can include numeric as well as I and J. To make the algorithm stronger here we use four iteration steps instead of one. Finally we have implemented this concept with the help of MATLAB.
A Modified Encryption Technique using Playfair Cipher 10 by 9 Matrix with Six Iteration Steps
One of the well-known digraph substitution cipher is the Playfair Cipher. It secures information ... more One of the well-known digraph substitution cipher is the Playfair Cipher. It secures information mathematically by mangling message with key. The privacy of intended sender and receiver information is protected from eavesdropper. However the original 5 x 5 Playfair Cipher can support only 25 uppercase alphabets. Here we have implemented a new technique which includes a rectangular matrix having 10 columns and 9 rows and six iteration steps for encryption as well as decryption purpose. This 10 x 9 rectangular matrix includes all alphanumeric characters and some special characters. Cryptanalysis is done to show that the modified cipher is a strong one. Finally we have implemented this concept with the help of MATLAB.

Optimal Path Planning with Smart Energy Management Techniques Using Dijkstra’s Algorithm
Smart innovation, systems and technologies, Nov 29, 2022
The classical Dijkstra’s algorithm is a well-known popular algorithm for finding shortest path in... more The classical Dijkstra’s algorithm is a well-known popular algorithm for finding shortest path in any research area. But in many situations, it was observed that though Dijkstra’s algorithm provides the shortest path from source to destination, the path produced huge energy consumption because of road condition and different route parameters. In such cases, there is a need of consideration of some parameters like road condition, traffic congestion, and route parameters with Dijkstra’s algorithm for finding shortest path with minimum energy consumption. In this context, authors proposed an optimal path planning with smart energy management techniques using Dijkstra’s algorithm. In this paper, proposed method provides shortest path with minimum energy consumption considering all route parameters. The proposed technique not only improves the efficiency of the vehicles but also provides the optimal utilization of available resource.

A Novel Encryption Technique to Protect Patient Health Information Electronically Using Playfair Cipher 15 by 14 Matrix
Springer, Lecture Notes in Bioengineering, 2021
Healthcare data such as patient name, DOB, address, phone number, fax number, E-mail address, etc... more Healthcare data such as patient name, DOB, address, phone number, fax number, E-mail address, etc., need to be kept private to protect patient privacy. It has been found that unauthorized person always try to get this information. With the help of proper encryption technique, we can protect the information. Play fair cipher is a very much well-known encryption technique for text messages. It is an example of a digraph substitution cipher. In this technique, pair of alphabets (digraphs) was encrypted instead of a single alphabet. That is why, it becomes so strong and not easy to break by conventional method. Play fair is fairly fast to apply and calls for no unique tools. It converts a plain text to cipher text message mathematically with the help of a secret key. Likewise, while restoring the original message from encrypted message, the same secret key has been used. However, the traditional play fair cipher supports only 25 uppercase alphabets. Here, in our work, we use 210 characters instead of 25 characters earlier, which make the cipher text stronger. These 210 characters include all the alphanumeric characters as well as 148 special characters supported by MATLAB. Here, we carried out cryptanalysis and found that the cipher is a strong one also it is thus almost impossible to be broken by any cryptanalytic attack. Finally, we have represented the final result with the help of MATLAB with two iteration steps.
International Journal of Advance Research in Computer Science & Software Engineering, Jan 2014
Eigenface or Principal Components Analysis (PCA) methods have demonstrated their success in face ... more Eigenface or Principal Components Analysis (PCA) methods have demonstrated their success in face recognition, detection and tracking. In this paper we have used this concept to reconstruct or represent a face as a linear combination of a set of basis images. The basis images are nothing but the eigenfaces. The idea is similar to represent a signal in the form of a linear combination of complex sinusoids called the Fourier Series. The main advantage is that the number of eigenfaces required is less than the number of face images in the database. Selection of number of eigefaces is important here. Here we investigate what is the number of minimum eigenface that is required for faithful production of a face image.
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Feb 2014
One of the well-known digraph substitution
cipher is the Playfair Cipher. It secures information... more One of the well-known digraph substitution
cipher is the Playfair Cipher. It secures information
mathematically by mangling message with key. The privacy of
intended sender and receiver information is protected from
eavesdropper. However the original 5 x 5 Playfair Cipher can
support only 25 uppercase alphabets. Here we have
implemented a new technique which includes a rectangular
matrix having 10 columns and 9 rows and six iteration steps for
encryption as well as decryption purpose. This 10 x 9
rectangular matrix includes all alphanumeric characters and
some special characters. Cryptanalysis is done to show that the
modified cipher is a strong one. Finally we have implemented
this concept with the help of MATLAB.
Uploads
Papers by Subhajit Bhattacharyya
cipher is the Playfair Cipher. It secures information
mathematically by mangling message with key. The privacy of
intended sender and receiver information is protected from
eavesdropper. However the original 5 x 5 Playfair Cipher can
support only 25 uppercase alphabets. Here we have
implemented a new technique which includes a rectangular
matrix having 10 columns and 9 rows and six iteration steps for
encryption as well as decryption purpose. This 10 x 9
rectangular matrix includes all alphanumeric characters and
some special characters. Cryptanalysis is done to show that the
modified cipher is a strong one. Finally we have implemented
this concept with the help of MATLAB.
cipher is the Playfair Cipher. It secures information
mathematically by mangling message with key. The privacy of
intended sender and receiver information is protected from
eavesdropper. However the original 5 x 5 Playfair Cipher can
support only 25 uppercase alphabets. Here we have
implemented a new technique which includes a rectangular
matrix having 10 columns and 9 rows and six iteration steps for
encryption as well as decryption purpose. This 10 x 9
rectangular matrix includes all alphanumeric characters and
some special characters. Cryptanalysis is done to show that the
modified cipher is a strong one. Finally we have implemented
this concept with the help of MATLAB.