Abstract
Cryptographic algorithms are important to ensure the security of data during transmission or storage. Many algorithms have been proposed based on various transformation and manipulation of data. One of which is using magic cube. However, the existing approaches are based on a transformation of magic cube’s face values. In this paper, we propose a new cryptographic algorithm based on combinations of hybrid magic cubes which are generated from a magic square and two orthogonal Latin squares. Using two random functions, i.e., random selection of thirteen magic cubes and random key selection from layers of hybrid, the generated chipertexts are free from any predicted pattern which might be used by cryptanalyst to decipher the original message.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Schneier, B.: Keynote Speaker. In: Hack in the Box Security Conference (HITBC), Kuala Lumpur, Malaysia (2006)
National Institute of Standards(NIST): FIPS Pub 197: Advanced Encryption Standard AES (2001), http://csrc.nist.gov/
Daemen, J., Rijmen, V.: The Design of Rijndael: AES – The Advanced Encryption Standard. Springer, Heidelberg (2002)
Schneier, B., Kelsey, J., Whiting, D., Wagner, D., Hall, C., Ferguson, N.: The Twofish Encryption Algorithm. John Wiley and Sons, New York (1999)
Vaudenay, S.: On the Need for Multipermutations: Cryptanalysis of MD4 and SAFER. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 286–297. Springer, Heidelberg (1995)
Wu, S., Zhang, Y., Jing, X.: A Novel Encryption Algorithm based on Shifting and Exchanging Rule of Bi-Column Bi-row Circular Queue. In: International Conference on Computer Science and Software Engineerin. IEEE, Los Alamitos (2005)
Wikipedia Web Site, http://en.wikipedia.org/wiki/Magic_cube
Trenkler, M.: Magic Cubes. The Mathematical Gazeete 82, 56–61 (1998)
Trenkler, M.: A Construction of Magic Cubes. The Mathematical Gazeete, 36–41 (2000)
Trenkler, M.: An Algorithm for making Magic Cubes. The ПME Journal 12(2), 105–106 (2005)
Shen, J., Jin, X., Zhou, C.: A Color Image Encryption Algorithm Based on Magic Cube Transformation and Modular Arithmetic Operation. In: Ho, Y.-S., Kim, H.-J. (eds.) PCM 2005. LNCS, vol. 3768, pp. 270–280. Springer, Heidelberg (2005)
Zhang, L., Shiming, J., Xie, Y., Yuan, Q., Wan, Y., Bao, G.: Principle of Image Encrypting Algorithm Based on Magic Cube Transformation. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-m., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), vol. 3802, pp. 977–982. Springer, Heidelberg (2005)
Heinz H.: Magic Squares. Magic Stars & Other Patterns, http://www.geocities.com/~harveyh/
Snasel, Abraham, A., Dvorsky, J., Kromer, P., Platos, J.: Hash Functions Based on Large Quasigroups. In: Allen, G., Nabrzyski, J., Seidel, E., van Albada, G.D., Dongarra, J., Sloot, P.M.A. (eds.) ICCS 2009. LNCS, vol. 5544, pp. 521–529. Springer, Heidelberg (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jamel, S., Herawan, T., Deris, M.M. (2010). A Cryptographic Algorithm Based on Hybrid Cubes. In: Taniar, D., Gervasi, O., Murgante, B., Pardede, E., Apduhan, B.O. (eds) Computational Science and Its Applications – ICCSA 2010. ICCSA 2010. Lecture Notes in Computer Science, vol 6019. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12189-0_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-12189-0_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-12188-3
Online ISBN: 978-3-642-12189-0
eBook Packages: Computer ScienceComputer Science (R0)