TESSERACT ENCRYPTION ALGORITHM USING LATIN SQUARE OF ORDER 8 (TEA-O8)
Abstract
In this paper, we investigate the possibility of extending Latin Square of Order 4 in Hybrid Cube Encryption Algorithm (HiSea) and Three-Dimensional Hybrid Cubes Encryption (3D-HiSea) algorithm using Latin square of order 8. The objective of this research is to investigate the security improvement of key provided in current algorithm using Four-Dimensional (4D) concept. Entries of Latin square of order 8 are used as a method extended to form a 4D Hybrid Cubes or Tesseract (TEA-08). The existence of 108 quintillion LS of order 8 (LS8) open up new possibilities for increasing possible key space for 3D-HiSea. New tesseract structure based on 8 3D-Hybrid Cube has been successfully implemented using LS order 8. Master Key generated from HiSea, 3D HiSea and Tesseract is used to study its security analysis using Entropy Test. Next, Frequency, Block Frequency and Run Test analysis is perform using NIST Testing Tool to investigate the security of ciphertext produced. The results show that entropy for TEA-08 master key is 0.9961 more closer to 1. Furthermore, ciphertext security analysis resultant the P-Value of Frequency is 0.328363, Block Frequency is 0.488475 and Run Test is 0.457713 which greater than 0.01 prove that algorithm proposed are random. Thus, based on the findings TEA-O8 it can be concluded that the key and ciphertext generated is random and can be evaluated further to include other security analysis testing tool and method which suitable for non-binary block cipher.
Downloads
References
V. K. Pachghare, Cryptography and Information Security. Delhi: PHI Learning Private Limited, 2015.
M. Rouse, “confidentiality, integrity, and availability (CIA triad).†2014.[Online]. Available:https://whatis.techtarget.com/definition/Confidentiality-integrity-and-availability-CIA. [Accessed: 20-April-2018]
J. Callas, “An Introduction to Cryptography,†5,214,703, 2008.
C. Paar and J. Pelzl, Understanding Cryptography, vol. 1. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010.
T. Baign, J. Stern, and S. Vaudenay, “Linear Cryptanalysis of Non Binary Ciphers ( With an Application to SAFER ),†Proc. 14th Int. Conf. Sel. areas Cryptogr., pp. 184–211, 2007.
S. Jamel, M. M. Deris, I. Tri, R. Yanto, and T. Herawan, “HiSea : A Non Binary Toy Cipher,†J. Comput., vol. 3, no. 6, pp. 20–27, 2011.
M. F. Mushtaq, S. Jamel, S. Radhiah, U. Akram, and M. Mat, “Key Schedule Algorithm using 3-Dimensional Hybrid Cubes for Block Cipher,†Int. J. Adv. Comput. Sci. Appl., vol. 10, no. 8, 2019.
S. K. A. Khalid, M. M. Deris, and K. M. Mohamad, “A Systematic Redudancy Approach in Watermarking Using Soduku,†in International Conference on IT Convergence and Security (ICITCS), 2014.
M. F. Mushtaq, S. Jamel, and M. M. Deris, “Triangular Coordinate Extraction (TCE) for hybrid cubes,†Journal of Engineering and Applied Sciences, vol. 12, no. 8. pp. 2164–2169, 2017.
M. F. Mushtaq, S. Jamel, K. M. Mohamad, S. K. A. Kamal, and M. M. Deris, “Key Generation Technique based on Triangular Coordinate Extraction for Hybrid Cubes,†J. Telecommun. Electron. Comput. Eng., vol. 9, no. 3–4, pp. 195–200, 2017.
Y. Ren, F. Liu, T. Guo, R. Feng, and D. Lin, “Cheating prevention visual cryptography scheme using Latin square,†IET Inf. Secur., vol. 11, no. 4, pp. 211-219(8), Jul. 2017.
S. Jamel, M. M. Deris, I. T. R. Yanto, and T. Herawan, “The Hybrid Cubes Encryption Algorithm (HiSea),†in Advances in Wireless, Mobile Networks and Applications, 2011, pp. 191–200.
P. R. Kumar, K. L. Sailaja, S. S. Dhenakaran, and P. SaiKishore, “Chakra: A new approach for symmetric key encryption,†in 2012 World Congress on Information and Communication Technologies, 2012, pp. 727–732.
J. Khurana, R. Chaudhary, A. Arora, S. Kapoor, and S. K. Pal, “Design of strong cryptographic schemes based on Latin Squares,†J. Discret. Math. Sci. Cryptogr., vol. 13, no. 3, pp. 233–256, 2013.
S. K. Pal, D. Bhardwaj, R. Kumar, and V. Bhatia, “A New Cryptographic Hash Function based on Latin Squares and Non-linear Transformations,†in 2009 IEEE International Advance Computing Conference, 2009, pp. 862–867.
Y. Wu, Y. Zhou, J. Noonan, and C. Chen, “A Novel Latin Square Image Cipher,†2012.
G. Kolesova, C. W. . Lam, and L. Thiel, “On the number of 8×8 latin squares,†J. Comb. Theory, Ser. A, vol. 54, no. 1, pp. 143–148, May 1990.
M. Trenkler, “A Construction of Magic Cubes,†Math. Gaz., vol. 84, no. 499, pp. 36–41, 2000.
J. Constant, “The Fourth Dimension in Mathematics and Art,†in Proceedings of Bridges 2016: Mathematics, Music, Art, Architecture, Education, Culture, 2016, pp. 541–544.
F. Buekenhout and M. Parker, “The number of nets of the regular convex polytopes in dimension <= 4,†Discrete Math., vol. 186, pp. 69–94, 1998.
B. L. Chilton, “The Stellated Forms of the Sixteen-Cell,†Am. Math. Mon., vol. 74, no. 4, pp. 372–378, 1967.
J. Constant, “The Fourth Dimension in Mathematics and Art,†Proc. Bridg. 2016 Math. Music. Art, Archit. Educ. Cult., pp. 541–544, 2016.
K. Nayyeri and S. Gartner, “Latin Square Generator Tool,†2012. [Online]. Available: https://github.com/keyvan/LatinSquaresGenerator.
A. M. Atteya and A. H. Madian, “A hybrid Chaos-AES encryption algorithm and its impelmention based on FPGA,†2014 IEEE 12th Int. New Circuits Syst. Conf. NEWCAS 2014, pp. 217–220, 2014.
A. L. Rukhin et al., “A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications,†National Institute of Standards and Technology (NIST) Special Publication 800-22, Rev. 1a, 2010. [Online]. Available: https://www.nist.gov/publications/statistical-test-suite-random-and-pseudorandom-number-generators-cryptographic. [Accessed: 28-Sep-2019].
The submitter hereby warrants that the Work (collectively, the “Materials”) is original and that he/she is the author of the Materials. To the extent the Materials incorporate text passages, figures, data or other material from the works of others, the undersigned has obtained any necessary permissions. Where necessary, the undersigned has obtained all third party permissions and consents to grant the license above and has all copies of such permissions and consents.
The submitter represents that he/she has the power and authority to make and execute this assignment. The submitter agrees to indemnify and hold harmless the COMPUSOFT from any damage or expense that may arise in the event of a breach of any of the warranties set forth above. For authenticity, validity and originality of the research paper the author/authors will be totally responsible.