Skip to main content

A Cryptographic Algorithm Based on Hybrid Cubes

  • Conference paper
Computational Science and Its Applications – ICCSA 2010 (ICCSA 2010)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 6019))

Included in the following conference series:

Abstract

Cryptographic algorithms are important to ensure the security of data during transmission or storage. Many algorithms have been proposed based on various transformation and manipulation of data. One of which is using magic cube. However, the existing approaches are based on a transformation of magic cube’s face values. In this paper, we propose a new cryptographic algorithm based on combinations of hybrid magic cubes which are generated from a magic square and two orthogonal Latin squares. Using two random functions, i.e., random selection of thirteen magic cubes and random key selection from layers of hybrid, the generated chipertexts are free from any predicted pattern which might be used by cryptanalyst to decipher the original message.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Schneier, B.: Keynote Speaker. In: Hack in the Box Security Conference (HITBC), Kuala Lumpur, Malaysia (2006)

    Google Scholar 

  2. National Institute of Standards(NIST): FIPS Pub 197: Advanced Encryption Standard AES (2001), http://csrc.nist.gov/

  3. Daemen, J., Rijmen, V.: The Design of Rijndael: AES – The Advanced Encryption Standard. Springer, Heidelberg (2002)

    MATH  Google Scholar 

  4. Schneier, B., Kelsey, J., Whiting, D., Wagner, D., Hall, C., Ferguson, N.: The Twofish Encryption Algorithm. John Wiley and Sons, New York (1999)

    Google Scholar 

  5. Vaudenay, S.: On the Need for Multipermutations: Cryptanalysis of MD4 and SAFER. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 286–297. Springer, Heidelberg (1995)

    Google Scholar 

  6. Wu, S., Zhang, Y., Jing, X.: A Novel Encryption Algorithm based on Shifting and Exchanging Rule of Bi-Column Bi-row Circular Queue. In: International Conference on Computer Science and Software Engineerin. IEEE, Los Alamitos (2005)

    Google Scholar 

  7. Wikipedia Web Site, http://en.wikipedia.org/wiki/Magic_cube

  8. Trenkler, M.: Magic Cubes. The Mathematical Gazeete 82, 56–61 (1998)

    Article  Google Scholar 

  9. Trenkler, M.: A Construction of Magic Cubes. The Mathematical Gazeete, 36–41 (2000)

    Google Scholar 

  10. Trenkler, M.: An Algorithm for making Magic Cubes. The ПME Journal 12(2), 105–106 (2005)

    Google Scholar 

  11. Shen, J., Jin, X., Zhou, C.: A Color Image Encryption Algorithm Based on Magic Cube Transformation and Modular Arithmetic Operation. In: Ho, Y.-S., Kim, H.-J. (eds.) PCM 2005. LNCS, vol. 3768, pp. 270–280. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  12. Zhang, L., Shiming, J., Xie, Y., Yuan, Q., Wan, Y., Bao, G.: Principle of Image Encrypting Algorithm Based on Magic Cube Transformation. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-m., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), vol. 3802, pp. 977–982. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  13. Heinz H.: Magic Squares. Magic Stars & Other Patterns, http://www.geocities.com/~harveyh/

  14. Snasel, Abraham, A., Dvorsky, J., Kromer, P., Platos, J.: Hash Functions Based on Large Quasigroups. In: Allen, G., Nabrzyski, J., Seidel, E., van Albada, G.D., Dongarra, J., Sloot, P.M.A. (eds.) ICCS 2009. LNCS, vol. 5544, pp. 521–529. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jamel, S., Herawan, T., Deris, M.M. (2010). A Cryptographic Algorithm Based on Hybrid Cubes. In: Taniar, D., Gervasi, O., Murgante, B., Pardede, E., Apduhan, B.O. (eds) Computational Science and Its Applications – ICCSA 2010. ICCSA 2010. Lecture Notes in Computer Science, vol 6019. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12189-0_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-12189-0_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-12188-3

  • Online ISBN: 978-3-642-12189-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics