Journal of Computer Sciences and Applications
ISSN (Print): 2328-7268 ISSN (Online): 2328-725X Website: https://www.sciepub.com/journal/jcsa Editor-in-chief: Minhua Ma, Patricia Goncalves
Open Access
Journal Browser
Go
Journal of Computer Sciences and Applications. 2024, 12(2), 31-37
DOI: 10.12691/jcsa-12-2-1
Open AccessArticle

Rubik’s Cube Enhanced Columnar Transposition Cipher

Joshua Dagadu1, Albert Armah1, , Emelia O. Aboagye2 and Sandra A. Mansuru1

1Akenten Appiah-Menka University of Skills Training and Entrepreneurial Development

2Kumasi Technical University

Pub. Date: December 24, 2024

Cite this paper:
Joshua Dagadu, Albert Armah, Emelia O. Aboagye and Sandra A. Mansuru. Rubik’s Cube Enhanced Columnar Transposition Cipher. Journal of Computer Sciences and Applications. 2024; 12(2):31-37. doi: 10.12691/jcsa-12-2-1

Abstract

This paper introduces an innovative encryption method that takes inspiration from the Rubik’s Cube. It combines a 3D cube representation with columnar transposition to enhance confusion and diffusion properties. The algorithm uses a sequence of “moves” similar to Rubik’s Cube operations, which are determined by a cryptographic key. These moves, such as face rotations and row swaps, are applied to the 3D representation of the plaintext to shuffle characters across multiple dimensions. The resulting scrambled configuration then undergoes further diffusion through a subsequent columnar transposition step. The key-governed sequence of moves achieves the confusion property, which obscures the relationship between the plaintext and the shuffled cube. The diffusion property is realised by the simultaneous rearrangement of multiple characters during each move, spreading the influence of individual plaintext characters across the ciphertext. This approach aims to provide robust cryptographic properties by combining the complexity of 3D permutations with traditional transposition techniques. The paper details the encryption and decryption processes, demonstrating the algorithm’s operation using a sample plaintext and key. The experimental results shows that the proposed algorithm demonstrates potential to resist various attacks.

Keywords:
Encryption Decryption Columnar Transposition Rubik’s Cube SHA-512

Creative CommonsThis work is licensed under a Creative Commons Attribution 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

References:

[1]  Ahmed, I. S. (2023) Text Encryption Using Improving Key of Hi Sec Algorithm Using Rubik's Cube. International Journal of Scientific Research in Science, Engineering and Technology.
 
[2]  Corli, S., Moro, L., Galli, D. E., & Prati, E. (2023, June). Casting Rubik’s Group into a Uni- tary Representation for Reinforcement Learn- ing. In Journal of Physics: Conference Series (Vol. 2533, No. 1, p. 012006). IOP Publishing.
 
[3]  Song, F. Y., Xu, G. B., Wang, H. K., & Jiang, H. (2024). A quantum image encryption al- gorithm based on chaotic system and Rubik’s cube principle. Quantum Information Process- ing, 23(8), 286.
 
[4]  Mushtaq, M. F., Jamel, S., Megat, S. R. B., Akram, U., & Deris, M. M. (2019). Key schedule algorithm using 3-dimensional hybrid cubes for block cipher. International Journal of Advanced Computer Science and Applications, 10(8).
 
[5]  Saadi, S. M. (2022). A Modern mechanism for Generating 3DES Algorithm Keys Based on Ru- bik’s Cube.
 
[6]  Kashif, M., Mehfuz, S., Shakeel, I., & Ahmad, S. (2023, May). Employing an ECC-Based Hybrid Data Encryption Method to Improve Multitenancy Security in Cloud Computing. In 2023 International Conference on Recent Advances in Electrical, Electronics & Digital Healthcare Technologies (REEDCON) (pp. 79-83). IEEE.
 
[7]  Mamia, S. B., Puteaux, P., Puech, W., & Boual- legue, K. (2023). From Diffusion to Confusion of RGB Pixels Using a New Chaotic System for Color Image Encryption. IEEE Access, 11, 49350-49366.
 
[8]  Adyapak, N. M., Vineetha, B., & Prasad, (2022). A Novel Way of Decrypting Sin- gle Columnar Transposition Ciphers. 2022 In- ternational Conference on Smart Generation Computing, Communica-tion and Networking (SMART GENCON).
 
[9]  Manoj Kumar, T., & Karthigaikumar, P. (2020). A novel method of improvement in advanced en- cryption standard algorithm with dynamic shift rows, sub byte and mixcolumn operations for the secure communication. International Journal of Information Technology, 12(3), 825-830.
 
[10]  Goumidi, D. E., & Hachouf, F. (2019). Hy- brid chaos-based image encryption approach us- ing block and stream ciphers. 8th International Workshop on Systems, Signal Processing and their Applications (WoSSPA).
 
[11]  Roshan, M. M., Rakesh, S., Guru, T. S. G., Rohith, B., & Hemalatha, J. (2024). Towards efficiently solving the rubik’s cube with deep reinforcement learning and recursion. In E3S Web of Conferences (Vol. 491, p. 01009). EDP Sciences.
 
[12]  Katos, V., & Doherty, B. S. (2007). Exploring confusion in product ciphers through regression analysis. Inf. Sci., 177, 1789-1795.
 
[13]  Ali-Pacha, H., Hadj-Said, N., Ali-Pacha, A., Mo- hamed, M. A., & Mamat, M. (2021). The six-dos transposition cipher based on the rubik s cube. International Journal of Advanced Technology and Engineering Exploration, 8(75), 258.
 
[14]  Baicheva, T. S., & Topalova, S. T. (2019). On the Diffusion Property of the Improved General- ized Feistel with Different Permutations for Each Round. Conference on Algebraic Informatics,
 
[15]  Rahman, M. M., Saha, T. K., & Islam, M. A. (2021). A Novel Encryption Scheme Using Ru- bik’s Cube Pattern and Dynamic Key Genera- tion. IEEE Access, 9, 38549-38562.