Text Encryption Using Improving Key of Hi Sec Algorithm Using Rubik's Cube
DOI:
https://doi.org/10.32628/IJSRSET2310222Keywords:
Rubik's Cube, cryptography, key generation, Hi Sec algorithm, bitwise operations, binary representationAbstract
Several techniques have been developed to generate keys using Rubik's Cube, which has been researched as a potential source of randomness for cryptography. This study suggests an innovative technique for creating a key for the Hi Sec algorithm using a Rubik's Cube image. The process entails creating a binary key for text encryption by leveraging the cube's color information. The Rubik's Cube principle, which includes choosing a subset of cube faces to generate the key, serves as the foundation for the key creation process. Experimental findings indicate that the proposed approach can produce safe keys that are resilient to a variety of assaults. The technique offers a fresh and effective way to generate keys for the Hi Sec algorithm, which may be used in several secure communication systems. The proposed method was programmed in VisualBaic.Net 2012.
References
- Prateek Rawat, Ritwik Mishra, and Aseem Upadhyay,” TEXT ENCRYPTION BY RUBIK’S CUBE USING SPATIAL STEGANOGRAPHY”, ISST Journal of Mathematics & Computing System, Vol. 7 No. 2, (July - December 2016), p.p. 53-59. ISSN No. 0976-9048 © Intellectuals Society for Socio-Techno Welfare
- Priyan, K. and Vishal, P,” Design and Implement Dynamic Key Generation to Enhance DES Algorithm”, International Journal for Research in Applied Science & Engineering Technology, Volume 4 Issue VII, July 2016, IC Value: 13.98, ISSN:2321-9653. https://www.ijraset.com/fileserve.php?FID=5278
- V. Magesh Babu, T. Shankar Ganesh, K. Ramraj,” A Comparative Analysis on Encryption and Decryption Algorithms”, Int J Sci Res Publ 4(12) (ISSN:2250-3153) (2018) http://www.ijsrp.org/research-paper-1214.php?rp=P36346.
- T. de Castella, "The people who are still addicted to the Rubik's Cube," BBC News Magazine. BBC. com. Retrieved, vol. 28, 2014.
- M. Helmy, E.-S. M. El-Rabaie, I. M. Eldokany, and F. E. A. El-Samie, "3-D Image Encryption Based on Rubik’s Cube and RC6 Algorithm," 3D Research, vol. 8, no. 4, p. 38, 2017. https://link.springer.com/article/10.1007/s13319-017-0145-8
- K. Loukhaoukha, J.-Y. Chouinard, and A. Berdai, "A secure image encryption algorithm based on Rubik's cube principle," Journal of Electrical and Computer Engineering, vol. 2012, p. 7, 2012. https://doi.org/10.1155/2012/173931
- K. Abitha and P. K. Bharathan, "Secure Communication Based on Rubik's Cube Algorithm and ChaoticBaker Map," Procedia Technology, vol. 24, pp. 782-789, 2016. https://doi.org/10.1016/j.protcy.2016.05.089.
- S. Kilaru, Y. Kanukuntla, A. Firdouse, and M. Bushra, "effective and key sensitive security algorithm for an image processing using robust Rubik encryption and decryption process," the University of Birmingham, ISSN (Print), vol. 2, pp. 2278-8948, 2013. http://www.irdindia.in/journal_ijaeee/pdf/vol2_iss5/17.pdf
- Zhu, H., Dai, L., Liu, Y., & Wu, L, “A three-dimensional bit-level image encryption algorithm with Rubik’s cube method’, Mathematics and Computers in Simulation, 185, 754-770. (2021). DOI: 10.1016/j.matcom.2021.02.009
- A. Bogdanov and K. Shibutani, "Generalized Feistel networks revisited," Designs, Codes and Cryptography, vol. 66, pp. 75–97 (2013). https://link.springer.com/article/10.1007/s10623-012-9660-z
- S. Panasenko and S. Smagin, "Lightweight Cryptography: Underlying Principles and Approaches," International Journal of Computer Theory and Engineering, vol. vol 3., 2011. DOI: 10.7763/IJCTE. 2011.V3.360
- Alyaa Ghanim Sulaiman1, Sufyan Salim Mahmood AlDabbagh2,” Modified 128-EEA2 Algorithm by Using HISEC Lightweight Block Cipher Algorithm with Improving the Security and Cost Factors”, Indonesian Journal of Electrical Engineering and Computer Science, Vol. 10, No. 1, April 2018, pp. 337~342, ISSN: 2502-4752, DOI: 10.11591/ideas.v10.i1.pp337-342.
- SufyanSalimMahmoodAldabbaghb, Mustafa Ali Abuzaraidac, AlyaaGhanimd Khalid Abdulkareem Al-Enezie,” Improving Highest Security Lightweight block cipher (HISEC) Algorithm Using Key Dependent S-box”, Turkish Journal of Computer and Mathematics Education Vol.12 No.3(2021), 3544-3549, https://doi.org/10.17762/turcomat.v12i3.1630.
- N. Sp- and N. Sp-, The NIST Statistical Test Suite, (2021) 1–6.
- M. Sýs and Z. ?íha, Faster randomness testing with the NIST statistical test suite, Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), 8804 (2014) 272–284. https://doi.org/10.1007/978-3-319- 12060-7_18
- E. Yavuz, R. Yaz?c?, M. C. Kasapba??, and E. Yamaç, A chaos-based image encryption algorithm with simple logical functions, Comput. Electr. Eng., 54 (2016) 471–483. https://doi.org/10.1016/j.compeleceng.2015.11.008
- Z. Hua, F. Jin, B. Xu, and H. Huang, 2D Logistic-Sine-coupling map for image encryption, Signal Processing, 149 (2018) 148–161. https://doi.org/10.1016/j.sigpro.2018.03.010
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.