We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

A Proposed Enhanced Transposition Cipher Algorithm based on Rubik’s Cube Transformations

by Frimpong Twum, J. B. Hayfron Acquah, Morgan-Darko William
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 182 - Number 35
Year of Publication: 2019
Authors: Frimpong Twum, J. B. Hayfron Acquah, Morgan-Darko William
10.5120/ijca2019918323

Frimpong Twum, J. B. Hayfron Acquah, Morgan-Darko William . A Proposed Enhanced Transposition Cipher Algorithm based on Rubik’s Cube Transformations. International Journal of Computer Applications. 182, 35 ( Jan 2019), 18-26. DOI=10.5120/ijca2019918323

@article{ 10.5120/ijca2019918323,
author = { Frimpong Twum, J. B. Hayfron Acquah, Morgan-Darko William },
title = { A Proposed Enhanced Transposition Cipher Algorithm based on Rubik’s Cube Transformations },
journal = { International Journal of Computer Applications },
issue_date = { Jan 2019 },
volume = { 182 },
number = { 35 },
month = { Jan },
year = { 2019 },
issn = { 0975-8887 },
pages = { 18-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume182/number35/30290-2019918323/ },
doi = { 10.5120/ijca2019918323 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:13:21.419731+05:30
%A Frimpong Twum
%A J. B. Hayfron Acquah
%A Morgan-Darko William
%T A Proposed Enhanced Transposition Cipher Algorithm based on Rubik’s Cube Transformations
%J International Journal of Computer Applications
%@ 0975-8887
%V 182
%N 35
%P 18-26
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

It is unlikely any system can completely prevent unauthorized interception to transmission signal hence a more practical method that is traditionally employed for achieving privacy is to alter the message so only an authorized receiver can understand it. The method used to do this is termed encryption and decryption of information. By encrypting the massage before it is transmitted the message is unintelligible to everyone that receives it except the rightful recipient. The encryption/decryption methods process a message using an algorithm and a key. Transposition Cipher which shuffles characters around instead of substituting them with other characters is one way achieving privacy of data thereby assuring data owners of their data confidentiality. In this paper the Rubik’s cube a modified Rubik’s cube puzzle is employed at levels higher than 3×3×3 as a transposition cipher to encrypt data. Although no system is hundred percent secured the proposed algorithm sufficiently encrypt data with sufficient rotations of the cube.

References
  1. Douglas W. Mitchell (1992) “RUBIK'S CUBE” AS A TRANSPOSITION DEVICE,Cryptologia, 16:3, 250-256, DOI: 10.1080/0161-119291866928 https://www.tandfonline.com/doi/abs/10.1080/0161-119291866928
  2. nrich (2018). Transposition Cipher: https://nrich.maths.org/7940
  3. UMich, (2018). Transposition Systems  http://www.umich.edu/~umich/fm-34-40-2/ch11.pdf
  4. Maiwald, E. (2003). Network Security: A Beginner’s Guide. (2nd edn). McGraw-Hill/Osborne. New York. ISBN: 0072229578
  5. Stallings, W. (2003). Network Security Essentials: Applications and Standards. (2nd International edn). Upper Saddle River, NJ: Pearson Education. Chapter 2. ISBN: 0131202715
  6. Stallings, W. (2011). Network Security Essentials: Applications and Standards. (4th edn). Pearson Education, Inc., Prentice Hall. Chapter 2. ISBN: 9780136108054
  7. Kessler, G. C. (2017). An overview of Cryptography. [Online]. Available from: http://www.garykessler.net/library/crypto.html [Accessed: 1st May, 2017]
  8. Tanenbaum, A. S. (2003). Computer Ntworks. (4th edn). Upper Saddle River, N.J.: Prentice Hall. Chapter 8, pgs. 724-750. ISBN: 0130384887.
  9. Forouzan, B. A. (2001). Data Communications and Networking. (2th edn). McGraw-Hill. ISBN: 0072822945
Index Terms

Computer Science
Information Sciences

Keywords

Encryption Decryption Transpostion Cipher Algorithm Rubik’s Cube Character Level Encrption.