Text security by using a combination of the vigenere cipher and the rubik's cube method of size 4×4×4
Abstract
Background: In the current era of technology, information security is increasingly important. The growth of technology leads to a higher level of threat to the security of data and information dissemination, and cryptography is a valuable protective tool.
Aim: The primary objective of this research is to enhance text security through the fusion of the Vigenere cipher and the Rubik's cube algorithm. By leveraging this novel approach, we aim to fortify the confidentiality of textual data against potential eavesdroppers and adversaries. To demonstrate the practicality of this method, we perform a simulation using the Python programming language within the Google Colab environment.
Method: This study employs a qualitative research methodology supplemented by empirical simulation. The combination of the Vigenere Cipher and the Rubik's Cube algorithm in a 4×4×4 configuration is implemented to encrypt and decrypt text. The simulation is executed using the Google Colab platform, enabling a practical illustration of the encryption process.
Result: The results of our research indicate the feasibility of generating ciphertext through the amalgamation of the Vigenere Cipher and the Rubik's Cube algorithm in the specified 4×4×4 configuration. The simulation conducted in Google Colab serves as concrete evidence of the effectiveness and practicality of this combined encryption method.
Conclusion: In conclusion, this research offers a compelling approach to bolstering text security in the modern era of information technology. By combining the Vigenere Cipher with the Rubik's Cube algorithm in a 4×4×4 configuration, we have demonstrated the potential to significantly enhance the confidentiality of sensitive textual data. The empirical simulation conducted in Google Colab reaffirms the practicality and viability of this innovative encryption technique, highlighting its potential as a valuable tool in the realm of information security.
Keywords
Full Text:
PDFReferences
Ahamed, B. B., & Krishnamoorthy, M. (2020). SMS Encryption and Decryption Using Modified Vigenere Cipher Algorithm, Journal of the Operations Research Society of China, 10, 835-848.
Aissaoui, R., Deneuville, J.C., Guerber, C., & Pirovano, A.(2023). A survey on cryptographic methods to secure communications for UAV traffic management, Vehicular Communications, 44: 100661.
Al-Meer, A., & Al-Kuwari, S. (2023). Physical Unclonable Functions (PUF) for IoT Devices. ACM Computing Surveys 55(14), 314:1-31.
Amrulloh, A., & Ujianto, E. I. H. (2019). Kriptografi Simetris Menggunakan Algoritma Vigenere Cipher. CoreIT, 5(2), 71–77.
Arifin, S., Muktyas, I. B., & Prasetyo, P. W. (2021). Unimodular matrix and bernoulli map on text encryption algorithm using python. Al-Jabar: Jurnal Pendidikan Matematika, 12(2), 447–455.
Aulia, R., Zakir, A., & Zulhafiz, M. (2019). Penerapan Algoritma One Time Pad & Linear Congruential Generator Untuk Keamanan Pesan Teks. Jurnal Nasional Informatika Dan Ilmu Komputer, 4(1), 37-41.
Baldoni, M. W., Ciliberto, C., & Cattaneo G. M. P (2008). Elementary Number Theory, Cryptography and Codes. Springer.
Bingo ̈l, S. (2022). The changes in Ottoman diplomatic cryptography and its methods during the 19th century (1811–1877), Cryptologia, https://doi.org/10.1080/01611194.2022.2092916.
Boussif, M., Aloui, N., & Cherif, A. (2020). Securing DICOM images by a new encryption algorithm using Arnold transform and Vigenère cipher, IET Image Processing, 14(6), 1209-1216
Budiman, A., & Paradise. (2019). Modification of Vigenere Algorithm and One Time Pad Using Rivest Code 6 (RC6) Key Expansion. Compiler, 8(2), 149-155.
Buser, M., Dowsley, R., Esgin, M., Gritti, C., Kermanshahi, S. K., Kuchta, V., Legrov, J., Liu, J., Phan, R., Sakzad, A., Steinfeld, R., & Yu, J. (2023). A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions. ACM Computing Surveys, 55 (12), 251:1-32.
Chiu, R., Castan ̃eda, C. E., Orozco-Lopez, O., & Mancilla, L. (2023). Images cipher based on convolution with chaotic maps and retrieving using, Optics and Laser Technology, 167, 109680.
Delfs, H., & Knebl, H. (2007). Introduction to Cryptography: Principles and Applications (Information Security and Cryptography (Second Edition). Springer.
Dey, J., & Dutta, R. (2023). Progress inMultivariate Cryptography: Systematic Review, Challenges, and Research Directions, ACM Computing Surveys, 55(12), 246:1-34.
Fatonah, S., Yulandari, A., & Ariyus, D. (2016). Analisis Penerapan Modifikasi Algoritma Vigenere Cipher, Caesar Cipher, Vernam Cipher dan Hill Cipher Untuk Penyisipan Pesan Dalam Gambar. Voice of Informatic, 8(2), 19–30.
Gros ̌ek, O., Antal, E., & Fabs ̌ic ̌, T. (2019). Remarks on breaking the Vigenère autokey cipher, Cryptologia, 43(6), 486-496
Huang, B., Gao, J., & Li, X. 2023. Efficient lattice‑based revocable attribute‑based encryption against decryption key exposure for cloud file sharing, Journal of Cloud Computing, 12:37.
Irawan, M. D. (2017). Implementasi Kriptografi Vigenere Cipher Dengan PHP. Jurnal Teknologi Informasi 1(1), 11–21.
Jaithunbi, A. K., Sabena, S., & Sairamesh, L. (2022). Preservation of Data Integrity in Public Cloud Using Enhanced Vigenere Cipher Based Obfuscation, Wireless Personal Communications, 129, 271-284.
Liwandouw, V. B., & Wowor, A. D. (2016). Kombinasi Algoritma Rubik, CPSRNG, Chaos, dan S-Box Fungsi Linier Dalam Perancangan Kriptografi Cipher Blok. Prosiding Seminar Nasional Sistem Informasi Indonesia, 2-3 November 2015, 207-214.
Luengo, E. A., Olivares, B. A., Villalba, L. V. G., & Hernandez-Castro, J. (2023). Further analysis of the statistical independence of the NIST SP statistical independence of the NIST SP, Applied Mathematics and Computation, 459: 128222.
Ma’rifah, S. H. (2022). Implementasi Algoritma Rubik’s Cube dan Algoritma Rivest-Shamir-Adleman (RSA) pada Pengamanan Citra DIgital Iris Mata (Undergraduate Theses). Universitas Islam Negeri Maulana Malik Ibrahim
Minarni, M., & Redha, R. (2020). Implementasi Least Significant Bit (LSB) dan Algoritma Vigenere Cipher Pada Audio Steganografi. Jurnal Sains dan Teknologi, 20(2), 168-174.
Moosa, H., Ali, M., Alaswad, H., Elmedany, W., & Balakrishna, C. (2023). A combined Blockchain and zero-knowledge model for healthcare B2B and B2C data sharing, Arab Journal of Basic and Applied Sciences, 30(1), 179-196.
Nana, & Prasetyo, P. W. (2021). An implementation of Hill Cipher and 3× 3 × 3 rubik ’ s cube to enhance communication security. Bulletin of Applied Mathematics and Mathematics Education, 1(2), 75–92.
Padhye, S., Sahu., R. A., & Saraswat, V. (2018). Introduction to Cryptography. CRC Press
Park, S., Kim, J., Cho, K., & Yum D. H. (2020). Finding the key length of a Vigenère cipher: How to improve the twist algorithm, Cryptologia, 44(3), 197-204
Permanasari, Y. (2017). Kriptografi Klasik Monoalphabetic. Jurnal Teori dan Terapan Matematika, 16(1), 7–10.
Pirandola, S., Andersen, U.L., Banchi, L., Berta, M., Bunanda, D., Colbeck, R., Englund, D., Gehring. T., Lupo, C., Attaviani, C., Pereira, J.L., Razavi, M., Shaari. S., Tommamichel. M., Usenko, V. C., Vallone, G., Villoresi, P., & Walden, P. (2020). Advances in quantum cryptography, Advances in Optics and Photonics, 12(4), 1012-1236.
Pocher, N., Zichici, M., Merizzi, F., Shafiq. M. Z., & Ferretti, S. (2023). Detecting anomalous cryptocurrency transactions: An AML/CFT application of machine learning‑based forensics, Electronic Markets, 33: 37.
Rehman, M. U., Shafique, A., & Usman, A. B. (2023). Securing Medical Information Transmission Between IoT Devices: An Innovative Hybrid Encryption Scheme Based on Quantum Walk, DNA Encoding, and Chaos, Internet of Things, 100891.
Rupa, C., Greshmant., Shah, M. S. (2023). Novel secure data protection scheme using Martino homomorphic encryption, Journal of Cloud Computing, 12: 47.
Schwiderowski, J., Pedersen, A. B., Jensen, J. K., & Beck, R. (2023). Value creation and capture in decentralized finance markets: Non‑fungible tokens as a class of digital assets, Electronic Markets, 33:45.
Sumandri. (2017). Studi Model Algoritma Kriptografi Klasik dan Modern. Prosiding Seminar Matematika Dan Pendidikan Matematika UNY 2017, 265–272.
Syahib, M. I., Riadi, I., & Umar, R. (2017). Analisis Forensik Digital Aplikasi Beetalk Untuk Penanganan. Cybercrime Menggunakan Metode NIST. Prosiding Semnasif 2017, 1(1), 134–139.
Tampubolon, A. (2021). Implementasi Kombinasi Algoritma RSA dan Algoritma DES Pada Aplikasi Pengaman Pesan Teks. Jurnal SAINTIKOM (Jurnal Sains Manajemen Informatika Dan Komputer), 20(1), 38-43.
Teranishi, K., & Kogiso, K. (2023). Optimal security parameter for encrypted control systems against eavesdropper and malicious server. SICE Journal of Control, Measurement, and System Integration, 16(1), 203-214.
Trisno, Indra Budi (2016) Belajar Pemrograman Sulit? Coba Python. In: Buku Ajar. Ubahara Manajemen Press Surabaya.
Uniyal, N., Dobhal, G., Rawat, A., & Sikander. (2021). A Novel Encryption Approach Based on Vigenère Cipher for Secure Data Communication, Wireless Personal Communications, 119, 1577–1587
Ye, C. Q., Li, J., Chen, X. B., Hou, Y., & Wang, Z. (2023). Security and application of semi-quantum key distribution protocol for users with different quantum capabilities, EPJ Quantum Technology, 10:21.
Younus, Z. S., & Hussain, M. K. (2022). Image steganography using exploiting modification direction for compressed encrypted data, Journal of King Saud University-Computer and Information Sciences, 34, 2951–2963.
Yudanto, Y. S., & Suartana, I. M. (2022). Analisis Kekuatan Enkripsi Data Pada Citra Digital Menggunakan Metode Rubiks Cube, Journal of Informatics and Computer Science (JINACS), 3(4), 557–563.
DOI: http://dx.doi.org/10.24042/ajpm.v14i2.14276
Refbacks
- There are currently no refbacks.
Indexed by:
Al-Jabar : Jurnal Pendidikan Matematika is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.