{"title":"基于魔方的六dos换位密码","authors":"M. A. Mohamed","doi":"10.19101/IJATEE.2020.762150","DOIUrl":null,"url":null,"abstract":"A transposition cipher is a method of encryption by which the positions held by units of plaintext are shifted according to a regular function so that the ciphertext constitutes a permutation of the plaintext. That is, the order of the units is changed (the plaintext is reordered). Mathematically a bijective function is used on the characters' positions to encrypt and an inverse function to decrypt. Knowing that the vertical and horizontal rings of the Hungarian cube can move left and skilfully in a circular manner, as well as any face of the cube. We have been inspired by this Hungarian cube (Rubik's cube) to realize our image encryption system that is a kind of diffusion cipher or a cipher transposition. We have baptized it: Six-Dos Transposition. The implementation is simple and we have improved the security of the encryption system by eliminating the linearity effect of the coefficient of the adjacent pixels. The length of the encryption key of the cryptosystem that uses Six-Dos Transposition is increased by 63 bits for proposal 1 which is a single Six-Dos transposition to encrypt the main image and, it increased by 129 bits for proposal 3 which uses two Six-Dos transpositions to encrypt the main image. We encrypt each sub-image with the same Six-Dos transposition, and at the end, we encrypt the main image with a special Six-Dos transposition.","PeriodicalId":14347,"journal":{"name":"International Journal of Scientific & Technology Research","volume":"3 1 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2020-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"The six-dos transposition cipher based on the rubik s cube\",\"authors\":\"M. A. Mohamed\",\"doi\":\"10.19101/IJATEE.2020.762150\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A transposition cipher is a method of encryption by which the positions held by units of plaintext are shifted according to a regular function so that the ciphertext constitutes a permutation of the plaintext. That is, the order of the units is changed (the plaintext is reordered). Mathematically a bijective function is used on the characters' positions to encrypt and an inverse function to decrypt. Knowing that the vertical and horizontal rings of the Hungarian cube can move left and skilfully in a circular manner, as well as any face of the cube. We have been inspired by this Hungarian cube (Rubik's cube) to realize our image encryption system that is a kind of diffusion cipher or a cipher transposition. We have baptized it: Six-Dos Transposition. The implementation is simple and we have improved the security of the encryption system by eliminating the linearity effect of the coefficient of the adjacent pixels. The length of the encryption key of the cryptosystem that uses Six-Dos Transposition is increased by 63 bits for proposal 1 which is a single Six-Dos transposition to encrypt the main image and, it increased by 129 bits for proposal 3 which uses two Six-Dos transpositions to encrypt the main image. We encrypt each sub-image with the same Six-Dos transposition, and at the end, we encrypt the main image with a special Six-Dos transposition.\",\"PeriodicalId\":14347,\"journal\":{\"name\":\"International Journal of Scientific & Technology Research\",\"volume\":\"3 1 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-06-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Scientific & Technology Research\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.19101/IJATEE.2020.762150\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Scientific & Technology Research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.19101/IJATEE.2020.762150","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The six-dos transposition cipher based on the rubik s cube
A transposition cipher is a method of encryption by which the positions held by units of plaintext are shifted according to a regular function so that the ciphertext constitutes a permutation of the plaintext. That is, the order of the units is changed (the plaintext is reordered). Mathematically a bijective function is used on the characters' positions to encrypt and an inverse function to decrypt. Knowing that the vertical and horizontal rings of the Hungarian cube can move left and skilfully in a circular manner, as well as any face of the cube. We have been inspired by this Hungarian cube (Rubik's cube) to realize our image encryption system that is a kind of diffusion cipher or a cipher transposition. We have baptized it: Six-Dos Transposition. The implementation is simple and we have improved the security of the encryption system by eliminating the linearity effect of the coefficient of the adjacent pixels. The length of the encryption key of the cryptosystem that uses Six-Dos Transposition is increased by 63 bits for proposal 1 which is a single Six-Dos transposition to encrypt the main image and, it increased by 129 bits for proposal 3 which uses two Six-Dos transpositions to encrypt the main image. We encrypt each sub-image with the same Six-Dos transposition, and at the end, we encrypt the main image with a special Six-Dos transposition.