A Modern mechanism for Generating 3DES Algorithm Keys Based on Rubik's Cube

Authors

  • Saadi Mohammed Saadi  Ministry of Education, Bagdad-Iraq

DOI:

https://doi.org/10.32628/IJSRSET22966

Keywords:

Triple DES, Cryptography, Rubik's Cube, Decryption, and Encryption.

Abstract

Encryption makes a message incomprehensible to the reader and difficult for unauthorized individuals to access. One of the most serious issues we face is the key, which plays a crucial role in secure communication and is critical to the encryption process. To enhance the level of security, the key of any algorithm must be vital, and the secret key used must be a copy of it at both the sending and receiving ends. This type of encryption is known as symmetric encryption and must be secure. In this paper, the key of one of the symmetric encryption techniques, the 3DES Algorithm, will be reconfigured to make the algorithm more secure, faster, and more robust. The results obtained from this paper also have good resistance against brute force attacks, which makes the system more efficient by applying the improved algorithm where the message is encrypted and decrypted faster, making the attacker difficult to hack the encrypted message. The proposed method has been programmed in VisualBaic.Net 2015.

References

  1. Christy Atika Sari1, Eko Hari Rachmawanto2, Christanto Antonius Haryanto3, "Cryptography Triple Data Encryption Standard (3DES) for Digital Image Security", Scientific Journal of Informatics   , Vol. 5, No. 2, Nov 2018  p-ISSN 2407-7658 , e-ISSN 2460-0040Int. DOI: 10.15294/sji.v5i2.14844
  2. Muhammad Faheem Mushtaq1 , Sapiee Jamel2 , Siti Radhiah B. Megat3 , Urooj Akram4 , Mustafa Mat Deris5 , "Key Schedule Algorithm using 3-Dimensional Hybrid Cubes for Block Cipher", (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 10, No. 8, 2019, (DOI) : 10.14569/IJACSA.2019.0100857
  3. A. H. Disina, Z. A. Pindar, and S. Jamel, "Enhanced Caeser Cipher to Exclude Repetition and Withstand Frequency Cryptanalysis," J. Netw. Inf. Secur., 2015. Article can be accessed online at http://www.publishingindia.com
  4. M. F. Mushtaq, S. Jamel, A. H. Disina, Z. A. Pindar, N. S. A. Shakir, and M. M. Deris, "A Comprehensive Survey on the Cryptographic Encryption Algorithms," Int. J. Adv. Comput. Sci. Appl., vol. 8, no. 11, pp. 333–344, 2017,  DOI: 10.14569/IJACSA.2017.081141.
  5. M. F. Mushtaq, U. Akram, I. Khan, S. N. Khan, A. Shahzad, and A. Ullah, "Cloud Computing Environment and Security Challenges: A Review," Int. J. Adv. Comput. Sci. Appl., vol. 8, no. 10, pp. 183–195, 2017,  (DOI) : 10.14569/IJACSA.2017.081025
  6. A. H. Disina, S. Jamel, M. Aamir, Z. A. Pindar, M. M. Deris, and K. M. Mohamad, "A Key Scheduling Algorithm Based on Dynamic Quasigroup String Transformation and All-Or- Nothing Key Derivation Function," J. Telecommun. Electron. Comput. Eng., vol. 9, no. 3–5, pp. 1–6,  Special Issue on Software Engineering III 2017, link https://jtec.utem.edu.my/jtec/article/view/2954
  7. Faiqa Maqsood, Muhammad Ahmed, Muhammad Mumtaz Ali and Munam Ali Shah, " Cryptography: A Comparative Analysis for Modern Techniques," (IJACSA) International Journal of Advanced Computer Science and Applications,Vol. 8, No. 6, 2017, (DOI) : 10.14569/IJACSA.2017.080659.
  8. S. Farah, M. Y. Javed, A. Shamim, and T. Nawaz, "An experimental study on Performance Evaluation of Asymmetric Encryption Algorithms," Recent advaces Inf. Sci., vol. 8, pp. 121–124, 2012, link https://www.researchgate.net/publication/275338264
  9. Baha Eldin Hamouda Hassan Hamouda, " Comparative Study of Different Cryptographic Algorithms", Journal of Information Security, 2020, 11, 138-148 https://www.scirp.org/journal/jis ISSN Online: 2153-1242 ISSN Print: 2153-1234, DOI: 10.4236/jis.2020.113009.
  10. M. Mikhail, Y. Abouelseoud, and G. Elkobrosy, "Extension and Application of El-Gamal Encryption Scheme," 2014. DOI: 10.1109/WCCAIS.2014.6916627
  11. Nilesh, D., & Nagle, M, “The New Cryptography Algorithm with High Throughput”, In Computer Communication and Informatics (ICCCI), 2014 International Conference on (pp. 1-5). IEEE, DOI: 10.1109/ICCCI.2014.6921739
  12. Sangeeta and Er. Arpneek Kaur, “A Review on Symmetric Key Cryptography Algorithms”, International Journal of Advanced Research in Computer Science, Volume 8, No. 4, May 2017 (Special Issue), DOI:https://doi.org/10.26483/ijarcs.v8i4.3777
  13. Alaa A. Abdullatif, Firas A. Abdullatif , and  Sinan A. Naji , " An enhanced hybrid image encryption algorithm using Rubik’s cube and dynamic DNA encoding techniques," Periodicals of Engineering and Natural Sciences ISSN 2303-4521 Vol. 7, No. 4, December 2019, pp.1607-1617. DOI:http://dx.doi.org/10.21533/pen.v7i4.885.g429
  14. M. Helmy, E.-S. M. El-Rabaie, I. M. Eldokany, and F. E. A. El-Samie, "3-D Image Encryption Based on Rubik's Cube and RC6 Algorithm," 3D Research, vol. 8, no. 4, p. 38, 2017, DOI: 10.1007/s13319-017-0145-8
  15. K. Loukhaoukha, J.-Y. Chouinard, and A. Berdai, "A secure image encryption algorithm based on Rubik's cube principle," Journal of Electrical and Computer Engineering, vol. 2012, p. 7, 2012, DOI: 10.1155/2012/173931 .
  16. K. Abitha and P. K. Bharathan, "Secure Communication Based on Rubik's Cube Algorithm and Chaotic Baker Map," Procedia Technology, vol. 24, pp. 782-789, 2016, DOI: 10.1016/j.protcy.2016.05.089.
  17. S. Kilaru, Y. Kanukuntla, A. Firdouse, and M. Bushra, "effective and key sensitive security algorithm for an image processing using robust Rubik encryption and decryption process," University of Birmingham, ISSN (Print), vol. 2, pp. 2278-8948, 2013, link http://www.irdindia.in/journal_ijaeee/pdf/vol2_iss5/17.pdf
  18. Sheng Shou Puzzles. China Magic Cube. 2014. http://www.china-magic -cube.com/category/2.html.
  19. Da Xing Zeng, M. Li, Juan, Yu Hou,and et,“ Overview of Rubik’s Cube and Refections on Its Application in Mechanism”, Chinese Journal of Mechanical Engineering, Zeng et al. Chin. J. Mech. Eng. (2018) 31:77 https://doi.org/10.1186/s10033-018-0269-7 springer .

Downloads

Published

2022-12-30

Issue

Section

Research Articles

How to Cite

[1]
Saadi Mohammed Saadi "A Modern mechanism for Generating 3DES Algorithm Keys Based on Rubik's Cube" International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 9, Issue 6, pp.180-188, November-December-2022. Available at doi : https://doi.org/10.32628/IJSRSET22966