Online Submission!

Open Journal Systems

TESSERACT ENCRYPTION ALGORITHM USING LATIN SQUARE OF ORDER 8 (TEA-O8)

Siti radhiah Megat, Sapiee Jamel, Muhammad Faheem Mushtaq, Shamsul Kamal Ahmad Khalid, Kamaruddin Malik Mohamad, Mustafa Mat Deris

Abstract


In this paper, we investigate the possibility of extending Latin Square of Order 4 in Hybrid Cube Encryption Algorithm (HiSea) and Three-Dimensional Hybrid Cubes Encryption (3D-HiSea) algorithm using Latin square of order 8. The objective of this research is to investigate the security improvement of key provided in current algorithm using Four-Dimensional (4D) concept. Entries of Latin square of order 8 are used as a method extended to form a 4D Hybrid Cubes or Tesseract (TEA-08). The existence of 108 quintillion LS of order 8 (LS8) open up new possibilities for increasing possible key space for 3D-HiSea. New tesseract structure based on 8 3D-Hybrid Cube has been successfully implemented using LS order 8. Master Key generated from HiSea, 3D HiSea and Tesseract is used to study its security analysis using Entropy Test. Next, Frequency, Block Frequency and Run Test analysis is perform using NIST Testing Tool to investigate the security of ciphertext produced. The results show that entropy for TEA-08 master key is 0.9961 more closer to 1. Furthermore, ciphertext security analysis resultant the P-Value of Frequency is 0.328363, Block Frequency is 0.488475 and Run Test is 0.457713 which greater than 0.01 prove that algorithm proposed are random. Thus, based on the findings TEA-O8 it can be concluded that the key and ciphertext generated is random and can be evaluated further to include other security analysis testing tool and method which suitable for non-binary block cipher.


Keywords


Latin Square of Order 8; Tesseract; 3D-Hybrid Cubes; HiSea; KSA

Full Text:

PDF

References


V. K. Pachghare, Cryptography and Information Security. Delhi: PHI Learning Private Limited, 2015.

M. Rouse, “confidentiality, integrity, and availability (CIA triad).” 2014.[Online]. Available:https://whatis.techtarget.com/definition/Confidentiality-integrity-and-availability-CIA. [Accessed: 20-April-2018]

J. Callas, “An Introduction to Cryptography,” 5,214,703, 2008.

C. Paar and J. Pelzl, Understanding Cryptography, vol. 1. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010.

T. Baign, J. Stern, and S. Vaudenay, “Linear Cryptanalysis of Non Binary Ciphers ( With an Application to SAFER ),” Proc. 14th Int. Conf. Sel. areas Cryptogr., pp. 184–211, 2007.

S. Jamel, M. M. Deris, I. Tri, R. Yanto, and T. Herawan, “HiSea : A Non Binary Toy Cipher,” J. Comput., vol. 3, no. 6, pp. 20–27, 2011.

M. F. Mushtaq, S. Jamel, S. Radhiah, U. Akram, and M. Mat, “Key Schedule Algorithm using 3-Dimensional Hybrid Cubes for Block Cipher,” Int. J. Adv. Comput. Sci. Appl., vol. 10, no. 8, 2019.

S. K. A. Khalid, M. M. Deris, and K. M. Mohamad, “A Systematic Redudancy Approach in Watermarking Using Soduku,” in International Conference on IT Convergence and Security (ICITCS), 2014.

M. F. Mushtaq, S. Jamel, and M. M. Deris, “Triangular Coordinate Extraction (TCE) for hybrid cubes,” Journal of Engineering and Applied Sciences, vol. 12, no. 8. pp. 2164–2169, 2017.

M. F. Mushtaq, S. Jamel, K. M. Mohamad, S. K. A. Kamal, and M. M. Deris, “Key Generation Technique based on Triangular Coordinate Extraction for Hybrid Cubes,” J. Telecommun. Electron. Comput. Eng., vol. 9, no. 3–4, pp. 195–200, 2017.

Y. Ren, F. Liu, T. Guo, R. Feng, and D. Lin, “Cheating prevention visual cryptography scheme using Latin square,” IET Inf. Secur., vol. 11, no. 4, pp. 211-219(8), Jul. 2017.

S. Jamel, M. M. Deris, I. T. R. Yanto, and T. Herawan, “The Hybrid Cubes Encryption Algorithm (HiSea),” in Advances in Wireless, Mobile Networks and Applications, 2011, pp. 191–200.

P. R. Kumar, K. L. Sailaja, S. S. Dhenakaran, and P. SaiKishore, “Chakra: A new approach for symmetric key encryption,” in 2012 World Congress on Information and Communication Technologies, 2012, pp. 727–732.

J. Khurana, R. Chaudhary, A. Arora, S. Kapoor, and S. K. Pal, “Design of strong cryptographic schemes based on Latin Squares,” J. Discret. Math. Sci. Cryptogr., vol. 13, no. 3, pp. 233–256, 2013.

S. K. Pal, D. Bhardwaj, R. Kumar, and V. Bhatia, “A New Cryptographic Hash Function based on Latin Squares and Non-linear Transformations,” in 2009 IEEE International Advance Computing Conference, 2009, pp. 862–867.

Y. Wu, Y. Zhou, J. Noonan, and C. Chen, “A Novel Latin Square Image Cipher,” 2012.

G. Kolesova, C. W. . Lam, and L. Thiel, “On the number of 8×8 latin squares,” J. Comb. Theory, Ser. A, vol. 54, no. 1, pp. 143–148, May 1990.

M. Trenkler, “A Construction of Magic Cubes,” Math. Gaz., vol. 84, no. 499, pp. 36–41, 2000.

J. Constant, “The Fourth Dimension in Mathematics and Art,” in Proceedings of Bridges 2016: Mathematics, Music, Art, Architecture, Education, Culture, 2016, pp. 541–544.

F. Buekenhout and M. Parker, “The number of nets of the regular convex polytopes in dimension <= 4,” Discrete Math., vol. 186, pp. 69–94, 1998.

B. L. Chilton, “The Stellated Forms of the Sixteen-Cell,” Am. Math. Mon., vol. 74, no. 4, pp. 372–378, 1967.

J. Constant, “The Fourth Dimension in Mathematics and Art,” Proc. Bridg. 2016 Math. Music. Art, Archit. Educ. Cult., pp. 541–544, 2016.

K. Nayyeri and S. Gartner, “Latin Square Generator Tool,” 2012. [Online]. Available: https://github.com/keyvan/LatinSquaresGenerator.

A. M. Atteya and A. H. Madian, “A hybrid Chaos-AES encryption algorithm and its impelmention based on FPGA,” 2014 IEEE 12th Int. New Circuits Syst. Conf. NEWCAS 2014, pp. 217–220, 2014.

A. L. Rukhin et al., “A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications,” National Institute of Standards and Technology (NIST) Special Publication 800-22, Rev. 1a, 2010. [Online]. Available: https://www.nist.gov/publications/statistical-test-suite-random-and-pseudorandom-number-generators-cryptographic. [Accessed: 28-Sep-2019].




DOI: http://dx.doi.org/10.6084/ijact.v9i4.1155

Refbacks

  • There are currently no refbacks.




Copyright (c) 2020 COMPUSOFT: An International Journal of Advanced Computer Technology