New Technique using Fibonacci Matrices with Play-Fair System in Cryptography
Main Article Content
Abstract
In this paper we introduce a new Technique, this technique depends on the Fibonacci sequence and Fibonacci Matrices with a Play- Fair which is one of the cryptography systems. This method is applied in two steps, in the first step we generate the Fibonacci matrices with key matrix by particularity Fibonacci sequence to obtain first cipher and the second step we apply the Play-Fair method to obtain the 2nd cipher (final cipher).
Article Details

This work is licensed under a Creative Commons Attribution 4.0 International License.
Tikrit Journal of Pure Science is licensed under the Creative Commons Attribution 4.0 International License, which allows users to copy, create extracts, abstracts, and new works from the article, alter and revise the article, and make commercial use of the article (including reuse and/or resale of the article by commercial entities), provided the user gives appropriate credit (with a link to the formal publication through the relevant DOI), provides a link to the license, indicates if changes were made, and the licensor is not represented as endorsing the use made of the work. The authors hold the copyright for their published work on the Tikrit J. Pure Sci. website, while Tikrit J. Pure Sci. is responsible for appreciate citation of their work, which is released under CC-BY-4.0, enabling the unrestricted use, distribution, and reproduction of an article in any medium, provided that the original work is properly cited.
References
[1] Kalika Prasad, Hrishikesh Mahato, (2020), (Cryptography using generalized Fibonacci matrices with Affine-Hill cipher), arXiv:.11936v1 [cs.CR] 25.
[2] Mohd Vasim Ahamad, Misbah Urrahman Siddiqui, Maria Masroor, Urooj Fatima, (2018) , (An Improved Playfair Encryption Technique Using Fibonacci Series Generated Secret Key). International Journal of Engineering & Technology, 7 (4.5) 347-351.
[3] Dr. Ing. Edward Opoku-Mensah, Abilimi A. Christopher, Francis Ohene Boateng, (2013), (Comparative Analysis of Efficiency of Fibonacci Random Number Generator Algorithm and Gaussian Random Number Generator Algorithm in a Cryptographic System), Computer Engineering and Intelligent Systems ,ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online), Vol.4, No.10,.
[4] A. Joseph Raphael, Dr. V. Sundaram, (2012), (Secured Communication through Fibonacci Numbers and Unicode Symbols), International Journal of Scientific & Engineering Research, Volume 3, Issue 4, , ISSN 2229-5518. 1-5,
[5] Özvatan, M., & Pashaev, O. K. (2017). Generalized Fibonacci Sequences and Binet-Fibonacci Curves. arXiv preprint arXiv:1707.09151.
[6] D. Saba .N.M, (Foundations of Mathematics), College of Ibn Al Haitham Of Science, University of Baghdad, Lectures Notes in Fund, 2010.
[7] Grimaldi, R. (2012). Fibonacci and Catalan Numbers: an introduction. John Wiley & Sons
[8] Johnson, R. C. (2009). Fibonacci numbers and matrices. Durham University.
[9] Ghosh, N. (2018). Fibonacci numbers in real life applications. Mugberia Gangadhar Mahavidyalaya, 1, 62-69.