An implementation of Hill cipher and 3x3x3 rubik's cube to enhance communication security
DOI:
https://doi.org/10.12928/bamme.v1i2.4252Keywords:
Cryptography, Hill CipherAbstract
Message security is must be managed seriously. Therefore, to maintain the confidentiality of any message, cryptography is needed. Cryptography is a science that uses mathematics to encrypt and decrypt messages. Cryptography is used as a tool to protect messages, for example, national secrets and strategies. The method of this research is qualitative research with a literature review. This research implements a hybrid cryptographic algorithm by combining Hill cipher and 3x3x3 Rubik's cube methods with Python software simulation.
References
Abitha, K. A., & Bharathan, P. K. (2016). Secure communication based on Rubik's cube algorithm and chaotic baker map. Procedia Technology, 24, 782-789. https://doi.org/10.1016/j.protcy.2016.05.089
Danandjaja, J. (2014). Metode Penelitian Kepustakaan. Antropologi Indonesia, 0(52) https://doi.org/10.7454/ai.v0i52.3318
Hraoui, S., Gmira, F., Abbou, M. F., Oulidi, A. J., & Jarjar, A. (2019). A New Cryptosystem of Color Image Using a Dinamic-Chaos Hill Cipher Algorithm. Procedia Computer Science, 148, 399–408.
Indrajit, R. E. (2011). Manajemen Keamanan Informasi dan Internet. Kementerian Komunikasi dan Informatika RI.
Kalaichelvi, V., Manimozhi, K., Meenakshi, P., Rajakumar, B., & Vimaladevi, P. (2017). A new variant of Hill cipher algorithm for data security. International Journal of Pure and Applied Mathematics, 117(15), 581-588.
Khuyen, D. (2016). 3x3x3 Rubik’s Cube Simulator and Group Theory. Centria University of Applied Sciences.
Mahmoud, A., & Chefranov, A. (2014). Hill cipher modification based on pseudo-random eigenvalues. Applied Mathematics & Information Sciences, 8(2), 505. https://doi.org/10.12785/amis/080208
Raymond, T. (2005). A Mathematical Approach to Solving Rubik’s Cube.
Schneier, B. (1996). Applied Cryptography. Electrical Engineering. https://doi.org/10.1.1.99.2838
Sinaga, M. C. (2017). Kriptografi dan Python.
Stinson, D. R. (2018). Cryptography: Theory and Practice (4th ed.). Chapman and Hall/CRC.
Downloads
Published
Issue
Section
License
Copyright (c) 2021 Nana Nana, Puguh Wahyu Prasetyo
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).