(Publisher of Peer Reviewed Open Access Journals)

International Journal of Advanced Technology and Engineering Exploration (IJATEE)

ISSN (Print):2394-5443    ISSN (Online):2394-7454
Volume-8 Issue-75 February-2021
Full-Text PDF
Paper Title : The six-dos transposition cipher based on the rubik s cube
Author Name : Hana Ali- Pacha, Naima Hadj- Said, Adda Ali- Pacha, Mohamad Afendee Mohamed and Mustafa Mamat
Abstract :

A transposition cipher is a method of encryption by which the positions held by units of plaintext are shifted according to a regular function so that the ciphertext constitutes a permutation of the plaintext. That is, the order of the units is changed (the plaintext is reordered). Mathematically a bijective function is used on the characters' positions to encrypt and an inverse function to decrypt. Knowing that the vertical and horizontal rings of the Hungarian cube can move left and skilfully in a circular manner, as well as any face of the cube. We have been inspired by this Hungarian cube (Rubik's cube) to realize our image encryption system that is a kind of diffusion cipher or a cipher transposition. We have baptized it: Six-Dos Transposition. The implementation is simple and we have improved the security of the encryption system by eliminating the linearity effect of the coefficient of the adjacent pixels. The length of the encryption key of the cryptosystem that uses Six-Dos Transposition is increased by 63 bits for proposal 1 which is a single Six-Dos transposition to encrypt the main image and, it increased by 129 bits for proposal 3 which uses two Six-Dos transpositions to encrypt the main image. We encrypt each sub-image with the same Six-Dos transposition, and at the end, we encrypt the main image with a special Six-Dos transposition.

Keywords : Cryptography, Rubik s cube, Permutation, Diffusion, Transposition.
Cite this article : Pacha HA, Said NH, Pacha AA, Mohamed MA, Mamat M. The six-dos transposition cipher based on the rubik s cube. International Journal of Advanced Technology and Engineering Exploration. 2021; 8(75):258-273. DOI:10.19101/IJATEE.2020.762150.
References :
[1]B. Schneier. Applied cryptography. In Protocols, Algorithms and Source Code in C, John Wiley & Sons, Inc, New York, Second Edition, 1996.
[2]Nimbhorkar SU, Malik LG. A survey on elliptic curve cryptography (ECC). International Journal of Advanced Studies in Computers, Science and Engineering. 2012; 1(1):1-5.
[Google Scholar]
[3]Ali-Pacha H, Hadj-Said N, Ali-Pacha A, Mamat M, Mohamed MA. An efficient schema of a special permutation inside of each pixel of an image for its encryption. Indonesian Journal of Electrical Engineering and Computer Science (IJEECS). 2018; 11(2):496-503.
[Crossref] [Google Scholar]
[4]Sambas A, Vaidyanathan S, Mamat M, Mohamed MA, Sanjaya WM. A new chaotic system with a pear-shaped equilibrium and its circuit simulation. International Journal of Electrical and Computer Engineering. 2018; 8(6):4951-8.
[Crossref] [Google Scholar]
[5]Wulandari GS, Rismawan W, Saadah S. Differential evolution for the cryptanalysis of transposition cipher. In 3rd international conference on information and communication technology (ICoICT) 2015 (pp. 45-8). IEEE.
[Crossref] [Google Scholar]
[6]Toemeh R, Arumugam S. Breaking transposition cipher with genetic algorithm. Elektronika ir Elektrotechnika. 2007; 79(7):75-8.
[Google Scholar]
[7]Lee RB, Shi ZJ, Yin YL, Rivest RL, Robshaw MJ. On permutation operations in cipher design. In international conference on information technology: coding and computing, 2004. Proceedings. ITCC 2004(pp. 569-77). IEEE.
[Crossref] [Google Scholar]
[8]Yousif IA. Proposed a permutation and substitution methods of serpent block cipher. Ibn AL-Haitham Journal For Pure and Applied Science. 2019; 32(2):131-44.
[Crossref] [Google Scholar]
[9]Khan M, Rasheed A. Permutation-based special linear transforms with application in quantum image encryption algorithm. Quantum Information Processing. 2019; 18(10):1-21.
[Crossref] [Google Scholar]
[10]Wang X, Zhao H. Fast image encryption algorithm based on parallel permutation-and-diffusion strategy. Multimedia Tools and Applications. 2020:1-20.
[Crossref] [Google Scholar]
[11]Janardhanan SV, Sanjeeva P. Bogdanov map-based permuted double image encryption. Anais Da Academia Brasileira de Ciências. 2020; 92(2):1-14.
[Crossref] [Google Scholar]
[12]Davies JW, Morris AO. The schur multiplier of the generalized symmetric group. Journal of the London Mathematical Society. 1974; 2(4):615-20.
[Crossref] [Google Scholar]
[13]Chen G, Mao Y, Chui CK. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons & Fractals. 2004; 21(3):749-61.
[Crossref] [Google Scholar]
[14]Vaidyanathan S, Sambas A, Mohamed MA, Mamat M, Sanjaya WM. A new hyperchaotic hyperjerk system with three nonlinear terms, its synchronization and circuit simulation. International Journal of Engineering and Technology. 2018; 7(3):1585-92.
[Google Scholar]
[15]Joyner D. Adventures in group theory: Rubik s Cube, Merlin s machine, and other mathematical toys. JHU Press; 2008.
[Google Scholar]