An implementation of Hill cipher and 3x3x3 rubik's cube to enhance communication security

Authors

  • Nana Nana Universitas Ahmad Dahlan, Yogyakarta
  • Puguh Wahyu Prasetyo Universitas Ahmad Dahlan, Yogyakarta

DOI:

https://doi.org/10.12928/bamme.v1i2.4252

Keywords:

Cryptography, Hill Cipher

Abstract

Message security is must be managed seriously. Therefore, to maintain the confidentiality of any message, cryptography is needed. Cryptography is a science that uses mathematics to encrypt and decrypt messages. Cryptography is used as a tool to protect messages, for example, national secrets and strategies.  The method of this research is qualitative research with a literature review. This research implements a hybrid cryptographic algorithm by combining Hill cipher and 3x3x3 Rubik's cube methods with Python software simulation.

Author Biography

Puguh Wahyu Prasetyo, Universitas Ahmad Dahlan, Yogyakarta

Department of Mathematics Education

References

Abitha, K. A., & Bharathan, P. K. (2016). Secure communication based on Rubik's cube algorithm and chaotic baker map. Procedia Technology, 24, 782-789. https://doi.org/10.1016/j.protcy.2016.05.089

Danandjaja, J. (2014). Metode Penelitian Kepustakaan. Antropologi Indonesia, 0(52) https://doi.org/10.7454/ai.v0i52.3318

Hraoui, S., Gmira, F., Abbou, M. F., Oulidi, A. J., & Jarjar, A. (2019). A New Cryptosystem of Color Image Using a Dinamic-Chaos Hill Cipher Algorithm. Procedia Computer Science, 148, 399–408.

Indrajit, R. E. (2011). Manajemen Keamanan Informasi dan Internet. Kementerian Komunikasi dan Informatika RI.

Kalaichelvi, V., Manimozhi, K., Meenakshi, P., Rajakumar, B., & Vimaladevi, P. (2017). A new variant of Hill cipher algorithm for data security. International Journal of Pure and Applied Mathematics, 117(15), 581-588.

Khuyen, D. (2016). 3x3x3 Rubik’s Cube Simulator and Group Theory. Centria University of Applied Sciences.

Mahmoud, A., & Chefranov, A. (2014). Hill cipher modification based on pseudo-random eigenvalues. Applied Mathematics & Information Sciences, 8(2), 505. https://doi.org/10.12785/amis/080208

Raymond, T. (2005). A Mathematical Approach to Solving Rubik’s Cube.

Schneier, B. (1996). Applied Cryptography. Electrical Engineering. https://doi.org/10.1.1.99.2838

Sinaga, M. C. (2017). Kriptografi dan Python.

Stinson, D. R. (2018). Cryptography: Theory and Practice (4th ed.). Chapman and Hall/CRC.

Downloads

Published

2021-12-10

Issue

Section

Articles