A Modern mechanism for Generating 3DES Algorithm Keys Based on Rubik's Cube
DOI:
https://doi.org/10.32628/IJSRSET22966Keywords:
Triple DES, Cryptography, Rubik's Cube, Decryption, and Encryption.Abstract
Encryption makes a message incomprehensible to the reader and difficult for unauthorized individuals to access. One of the most serious issues we face is the key, which plays a crucial role in secure communication and is critical to the encryption process. To enhance the level of security, the key of any algorithm must be vital, and the secret key used must be a copy of it at both the sending and receiving ends. This type of encryption is known as symmetric encryption and must be secure. In this paper, the key of one of the symmetric encryption techniques, the 3DES Algorithm, will be reconfigured to make the algorithm more secure, faster, and more robust. The results obtained from this paper also have good resistance against brute force attacks, which makes the system more efficient by applying the improved algorithm where the message is encrypted and decrypted faster, making the attacker difficult to hack the encrypted message. The proposed method has been programmed in VisualBaic.Net 2015.
References
- Christy Atika Sari1, Eko Hari Rachmawanto2, Christanto Antonius Haryanto3, "Cryptography Triple Data Encryption Standard (3DES) for Digital Image Security", Scientific Journal of Informatics , Vol. 5, No. 2, Nov 2018 p-ISSN 2407-7658 , e-ISSN 2460-0040Int. DOI: 10.15294/sji.v5i2.14844
- Muhammad Faheem Mushtaq1 , Sapiee Jamel2 , Siti Radhiah B. Megat3 , Urooj Akram4 , Mustafa Mat Deris5 , "Key Schedule Algorithm using 3-Dimensional Hybrid Cubes for Block Cipher", (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 10, No. 8, 2019, (DOI) : 10.14569/IJACSA.2019.0100857
- A. H. Disina, Z. A. Pindar, and S. Jamel, "Enhanced Caeser Cipher to Exclude Repetition and Withstand Frequency Cryptanalysis," J. Netw. Inf. Secur., 2015. Article can be accessed online at http://www.publishingindia.com
- M. F. Mushtaq, S. Jamel, A. H. Disina, Z. A. Pindar, N. S. A. Shakir, and M. M. Deris, "A Comprehensive Survey on the Cryptographic Encryption Algorithms," Int. J. Adv. Comput. Sci. Appl., vol. 8, no. 11, pp. 333–344, 2017, DOI: 10.14569/IJACSA.2017.081141.
- M. F. Mushtaq, U. Akram, I. Khan, S. N. Khan, A. Shahzad, and A. Ullah, "Cloud Computing Environment and Security Challenges: A Review," Int. J. Adv. Comput. Sci. Appl., vol. 8, no. 10, pp. 183–195, 2017, (DOI) : 10.14569/IJACSA.2017.081025
- A. H. Disina, S. Jamel, M. Aamir, Z. A. Pindar, M. M. Deris, and K. M. Mohamad, "A Key Scheduling Algorithm Based on Dynamic Quasigroup String Transformation and All-Or- Nothing Key Derivation Function," J. Telecommun. Electron. Comput. Eng., vol. 9, no. 3–5, pp. 1–6, Special Issue on Software Engineering III 2017, link https://jtec.utem.edu.my/jtec/article/view/2954
- Faiqa Maqsood, Muhammad Ahmed, Muhammad Mumtaz Ali and Munam Ali Shah, " Cryptography: A Comparative Analysis for Modern Techniques," (IJACSA) International Journal of Advanced Computer Science and Applications,Vol. 8, No. 6, 2017, (DOI) : 10.14569/IJACSA.2017.080659.
- S. Farah, M. Y. Javed, A. Shamim, and T. Nawaz, "An experimental study on Performance Evaluation of Asymmetric Encryption Algorithms," Recent advaces Inf. Sci., vol. 8, pp. 121–124, 2012, link https://www.researchgate.net/publication/275338264
- Baha Eldin Hamouda Hassan Hamouda, " Comparative Study of Different Cryptographic Algorithms", Journal of Information Security, 2020, 11, 138-148 https://www.scirp.org/journal/jis ISSN Online: 2153-1242 ISSN Print: 2153-1234, DOI: 10.4236/jis.2020.113009.
- M. Mikhail, Y. Abouelseoud, and G. Elkobrosy, "Extension and Application of El-Gamal Encryption Scheme," 2014. DOI: 10.1109/WCCAIS.2014.6916627
- Nilesh, D., & Nagle, M, “The New Cryptography Algorithm with High Throughput”, In Computer Communication and Informatics (ICCCI), 2014 International Conference on (pp. 1-5). IEEE, DOI: 10.1109/ICCCI.2014.6921739
- Sangeeta and Er. Arpneek Kaur, “A Review on Symmetric Key Cryptography Algorithms”, International Journal of Advanced Research in Computer Science, Volume 8, No. 4, May 2017 (Special Issue), DOI:https://doi.org/10.26483/ijarcs.v8i4.3777
- Alaa A. Abdullatif, Firas A. Abdullatif , and Sinan A. Naji , " An enhanced hybrid image encryption algorithm using Rubik’s cube and dynamic DNA encoding techniques," Periodicals of Engineering and Natural Sciences ISSN 2303-4521 Vol. 7, No. 4, December 2019, pp.1607-1617. DOI:http://dx.doi.org/10.21533/pen.v7i4.885.g429
- M. Helmy, E.-S. M. El-Rabaie, I. M. Eldokany, and F. E. A. El-Samie, "3-D Image Encryption Based on Rubik's Cube and RC6 Algorithm," 3D Research, vol. 8, no. 4, p. 38, 2017, DOI: 10.1007/s13319-017-0145-8
- K. Loukhaoukha, J.-Y. Chouinard, and A. Berdai, "A secure image encryption algorithm based on Rubik's cube principle," Journal of Electrical and Computer Engineering, vol. 2012, p. 7, 2012, DOI: 10.1155/2012/173931 .
- K. Abitha and P. K. Bharathan, "Secure Communication Based on Rubik's Cube Algorithm and Chaotic Baker Map," Procedia Technology, vol. 24, pp. 782-789, 2016, DOI: 10.1016/j.protcy.2016.05.089.
- S. Kilaru, Y. Kanukuntla, A. Firdouse, and M. Bushra, "effective and key sensitive security algorithm for an image processing using robust Rubik encryption and decryption process," University of Birmingham, ISSN (Print), vol. 2, pp. 2278-8948, 2013, link http://www.irdindia.in/journal_ijaeee/pdf/vol2_iss5/17.pdf
- Sheng Shou Puzzles. China Magic Cube. 2014. http://www.china-magic -cube.com/category/2.html.
- Da Xing Zeng, M. Li, Juan, Yu Hou,and et,“ Overview of Rubik’s Cube and Refections on Its Application in Mechanism”, Chinese Journal of Mechanical Engineering, Zeng et al. Chin. J. Mech. Eng. (2018) 31:77 https://doi.org/10.1186/s10033-018-0269-7 springer .
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.