Playfair Cipher

Definition - What does Playfair Cipher mean?

The Playfair cipher is a written code or symmetric encryption technique that was the first substitution cipher used for the encryption of data. Introduced in 1854, it involved the use of keys that arrange alphabetical letters in geometric patterns in order to encode messages.

The Playfair cipher is also known as the Playfair square.

Techopedia explains Playfair Cipher

Created by Sir Charles Wheatstone, the Playfair cipher is named for Lord Playfair, who promoted its use. It was later used by the British and Australians during World War I and World War II.

The Playfair cipher's essential method involves creating key tables that arrange the letters of the alphabet into a square grid. With these key tables, the user separates the text of a message into two-letter bits. To encode the message, each two-letter bit is transposed on the key table. Thus, to decode the message, the receiver requires the key table itself.

As an example of the Playfair cipher, begin with the following message text: HELLO WORLD. After splitting this message into two-letter bits, a user starts with the letters HE and LL. If the letter H is in the top left corner and the letter E is in the bottom right corner of the key table, the encoded two-letter bit, which consists of the letters in the top right corner and bottom left corner, is transposed on the key table. This "mirror" technique enables effective text encoding without any equipment or infrastructure, except for printed text on paper.

These types of ciphers constituted the most advanced encryption for the time period before modern computing emerged. By contrast, the most advanced encryption techniques of the digital era involve computer algorithms, rather than this type of labor-intensive manual encryption.

Share this:

Connect with us

Email Newsletter

Join thousands of others with our weekly newsletter

The 4th Era of IT Infrastructure: Superconverged Systems
The 4th Era of IT Infrastructure: Superconverged Systems:
Learn the benefits and limitations of the 3 generations of IT infrastructure – siloed, converged and hyperconverged – and discover how the 4th...
Approaches and Benefits of Network Virtualization
Approaches and Benefits of Network Virtualization:
Businesses today aspire to achieve a software-defined datacenter (SDDC) to enhance business agility and reduce operational complexity. However, the...
Free E-Book: Public Cloud Guide
Free E-Book: Public Cloud Guide:
This white paper is for leaders of Operations, Engineering, or Infrastructure teams who are creating or executing an IT roadmap.
Free Tool: Virtual Health Monitor
Free Tool: Virtual Health Monitor:
Virtual Health Monitor is a free virtualization monitoring and reporting tool for VMware, Hyper-V, RHEV, and XenServer environments.
Free 30 Day Trial – Turbonomic
Free 30 Day Trial – Turbonomic:
Turbonomic delivers an autonomic platform where virtual and cloud environments self-manage in real-time to assure application performance.