Text Encryption Using Improving Key of Hi Sec Algorithm Using Rubik's Cube

Authors

  • Israa Shihab Ahmed  Informatics Institute for Postgraduate Studies, Iraqi Commission for Computers and Informatics, Baghdad Iraq

DOI:

https://doi.org/10.32628/IJSRSET2310222

Keywords:

Rubik's Cube, cryptography, key generation, Hi Sec algorithm, bitwise operations, binary representation

Abstract

Several techniques have been developed to generate keys using Rubik's Cube, which has been researched as a potential source of randomness for cryptography. This study suggests an innovative technique for creating a key for the Hi Sec algorithm using a Rubik's Cube image. The process entails creating a binary key for text encryption by leveraging the cube's color information. The Rubik's Cube principle, which includes choosing a subset of cube faces to generate the key, serves as the foundation for the key creation process. Experimental findings indicate that the proposed approach can produce safe keys that are resilient to a variety of assaults. The technique offers a fresh and effective way to generate keys for the Hi Sec algorithm, which may be used in several secure communication systems. The proposed method was programmed in VisualBaic.Net 2012.

References

  1. Prateek Rawat, Ritwik Mishra, and Aseem Upadhyay,” TEXT ENCRYPTION BY RUBIK’S CUBE USING SPATIAL STEGANOGRAPHY”, ISST Journal of Mathematics & Computing System, Vol. 7 No. 2, (July - December 2016), p.p. 53-59. ISSN No. 0976-9048 © Intellectuals Society for Socio-Techno Welfare
  2. Priyan, K. and Vishal, P,” Design and Implement Dynamic Key Generation to Enhance DES Algorithm”, International Journal for Research in Applied Science & Engineering Technology, Volume 4 Issue VII, July 2016, IC Value: 13.98, ISSN:2321-9653. https://www.ijraset.com/fileserve.php?FID=5278
  3. V. Magesh Babu, T. Shankar Ganesh, K. Ramraj,” A Comparative Analysis on Encryption and Decryption Algorithms”, Int J Sci Res Publ 4(12) (ISSN:2250-3153) (2018) http://www.ijsrp.org/research-paper-1214.php?rp=P36346.
  4. T. de Castella, "The people who are still addicted to the Rubik's Cube," BBC News Magazine. BBC. com. Retrieved, vol. 28, 2014.
  5. M. Helmy, E.-S. M. El-Rabaie, I. M. Eldokany, and F. E. A. El-Samie, "3-D Image Encryption Based on Rubik’s Cube and RC6 Algorithm," 3D Research, vol. 8, no. 4, p. 38, 2017. https://link.springer.com/article/10.1007/s13319-017-0145-8
  6. K. Loukhaoukha, J.-Y. Chouinard, and A. Berdai, "A secure image encryption algorithm based on Rubik's cube principle," Journal of Electrical and Computer Engineering, vol. 2012, p. 7, 2012. https://doi.org/10.1155/2012/173931
  7. K. Abitha and P. K. Bharathan, "Secure Communication Based on Rubik's Cube Algorithm and ChaoticBaker Map," Procedia Technology, vol. 24, pp. 782-789, 2016. https://doi.org/10.1016/j.protcy.2016.05.089.
  8. S. Kilaru, Y. Kanukuntla, A. Firdouse, and M. Bushra, "effective and key sensitive security algorithm for an image processing using robust Rubik encryption and decryption process," the University of Birmingham, ISSN (Print), vol. 2, pp. 2278-8948, 2013. http://www.irdindia.in/journal_ijaeee/pdf/vol2_iss5/17.pdf
  9. Zhu, H., Dai, L., Liu, Y., & Wu, L, “A three-dimensional bit-level image encryption algorithm with Rubik’s cube method’, Mathematics and Computers in Simulation, 185, 754-770. (2021). DOI: 10.1016/j.matcom.2021.02.009
  10. A. Bogdanov and K. Shibutani, "Generalized Feistel networks revisited," Designs, Codes and Cryptography, vol. 66, pp. 75–97 (2013). https://link.springer.com/article/10.1007/s10623-012-9660-z
  11. S. Panasenko and S. Smagin, "Lightweight Cryptography: Underlying Principles and Approaches," International Journal of Computer Theory and Engineering, vol. vol 3., 2011. DOI: 10.7763/IJCTE. 2011.V3.360
  12. Alyaa Ghanim Sulaiman1, Sufyan Salim Mahmood AlDabbagh2,” Modified 128-EEA2 Algorithm by Using HISEC Lightweight Block Cipher Algorithm with Improving the Security and Cost Factors”, Indonesian Journal of Electrical Engineering and Computer Science, Vol. 10, No. 1, April 2018, pp. 337~342, ISSN: 2502-4752, DOI: 10.11591/ideas.v10.i1.pp337-342.
  13. SufyanSalimMahmoodAldabbaghb, Mustafa Ali Abuzaraidac, AlyaaGhanimd Khalid Abdulkareem Al-Enezie,” Improving Highest Security Lightweight block cipher (HISEC) Algorithm Using Key Dependent S-box”, Turkish Journal of Computer and Mathematics Education Vol.12 No.3(2021), 3544-3549, https://doi.org/10.17762/turcomat.v12i3.1630.
  14. N. Sp- and N. Sp-, The NIST Statistical Test Suite, (2021) 1–6.
  15. M. Sýs and Z. ?íha, Faster randomness testing with the NIST statistical test suite, Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), 8804 (2014) 272–284. https://doi.org/10.1007/978-3-319- 12060-7_18
  16. E. Yavuz, R. Yaz?c?, M. C. Kasapba??, and E. Yamaç, A chaos-based image encryption algorithm with simple logical functions, Comput. Electr. Eng., 54 (2016) 471–483. https://doi.org/10.1016/j.compeleceng.2015.11.008
  17. Z. Hua, F. Jin, B. Xu, and H. Huang, 2D Logistic-Sine-coupling map for image encryption, Signal Processing, 149 (2018) 148–161. https://doi.org/10.1016/j.sigpro.2018.03.010

Downloads

Published

2023-04-30

Issue

Section

Research Articles

How to Cite

[1]
Israa Shihab Ahmed "Text Encryption Using Improving Key of Hi Sec Algorithm Using Rubik's Cube" International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 10, Issue 2, pp.218-226, March-April-2023. Available at doi : https://doi.org/10.32628/IJSRSET2310222