Piecewise symmetric magic cube: application to text cryptography

被引:2
|
作者
Rani, Narbda [1 ]
Mishra, Vinod [1 ]
Singh, Birmohan [2 ]
机构
[1] St Longowal Inst Engn & Technol, Dept Math, Sangrur 148106, Punjab, India
[2] St Longowal Inst Engn & Technol, Dept Comp Sci & Engn, Sangrur 148106, Punjab, India
关键词
Magic cube; Magic constant; Arithmetic progression; Encryption; Decryption; Text message;
D O I
10.1007/s11042-022-14153-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article propounds a Piecewise Symmetric Magic Cube (PSMC), the properties of which have reinvigorated its application to text encryption. A method has been introduced for the construction of magic cubes of order m x 2(l), for all l,m (m even) is an element of N boolean OR{0}, m >= 4 by using the concept of compounding. The behavior of elements in PSMC is controlled by the starting variables (S-start and L-start). The formula for evaluation of the magic sum of these magic cubes have been derived, which ensures magic nature of PSMC. Additionally, PSMC are applied to the field of text cryptography. The proposed text encryption model is applicable for the encryption and decryption of any language that may include numeric digits, and special characters along with their different combinations. Also, the validation of this model has been checked by focusing on the analysis of bilingual data (English-German, English-Hindi, German-Hindi, French-Arabic, and Italian-Spanish). The performance evaluation metrices (brute-force analysis, avalanche effect, CPU time analysis, Shannon entropy, and known plain text analysis) have been carried to analyze the resisting efficiency of the proposed model against different types of attacks. An analysis of encryption/ decryption time shows that decryption is more time-efficient which protects the data from getting being corrupted by the intruders. The distinct entries of PSMC remove the problem of repetition in cipher text which raises the level of security to a higher extent.
引用
收藏
页码:19369 / 19391
页数:23
相关论文
共 50 条
  • [41] Deterministic analysis of balancedness in symmetric cryptography
    Hernandez-Goya, Candelaria
    Fuster-Sabater, Amparo
    COMPUTER AND INFORMATION SCIENCES - ISCIS 2006, PROCEEDINGS, 2006, 4263 : 1011 - 1020
  • [42] On the Use of Cellular Automata in Symmetric Cryptography
    A. Fúster-Sabater
    P. Caballero-Gil
    Acta Applicandae Mathematica, 2006, 93 : 215 - 236
  • [43] Quantum asymmetric cryptography with symmetric keys
    Fei Gao
    QiaoYan Wen
    SuJuan Qin
    FuChen Zhu
    Science in China Series G: Physics, Mechanics and Astronomy, 2009, 52 : 1925 - 1931
  • [44] Ambiguous Multi-Symmetric Cryptography
    Bassous, Richard
    Bassous, Roger
    Fu, Huirong
    Zhu, Ye
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 7394 - 7399
  • [45] Quantum asymmetric cryptography with symmetric keys
    Gao Fei
    Wen QiaoYan
    Qin SuJuan
    Zhu FuChen
    SCIENCE IN CHINA SERIES G-PHYSICS MECHANICS & ASTRONOMY, 2009, 52 (12): : 1925 - 1931
  • [46] On length-preserving symmetric cryptography
    Zheng, Jianwu
    Hui, Liu
    Liu, Mingsheng
    INNOVATIVE ALGORITHMS AND TECHNIQUES IN AUTOMATION, INDUSTRIAL ELECTRONICS AND TELECOMMUNICATIONS, 2007, : 187 - +
  • [47] The Application Of LSB Steganography For Secure Text and Hiding Confidential Information Using AES Cryptography
    Ahyuna, Ahyuna
    Syamsuddin, Sadly
    Hasriani, Hasriani
    Ardimansyah, Ardimansyah
    Irmawati, Irmawati
    Wahyuni, Sri
    3RD INTERNATIONAL CONFERENCE ON CYBERNETICS AND INTELLIGENT SYSTEMS (ICORIS 2021), 2021, : 356 - 362
  • [48] Structured encryption algorithm for text cryptography
    Al Etaiwi, Wael
    Hraiz, Safaa
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2018, 21 (7-8): : 1559 - 1572
  • [49] Centrally symmetric and magic rectangles
    Bier, T
    Kleinschmidt, A
    DISCRETE MATHEMATICS, 1997, 176 (1-3) : 29 - 42
  • [50] The magic square and symmetric compositions
    Elduque, A
    REVISTA MATEMATICA IBEROAMERICANA, 2004, 20 (02) : 475 - 491