Javascript must be enabled to continue!
Text Encryption Using Improving Key of Hi Sec Algorithm Using Rubik's Cube
View through CrossRef
Several techniques have been developed to generate keys using Rubik's Cube, which has been researched as a potential source of randomness for cryptography. This study suggests an innovative technique for creating a key for the Hi Sec algorithm using a Rubik's Cube image. The process entails creating a binary key for text encryption by leveraging the cube's color information. The Rubik's Cube principle, which includes choosing a subset of cube faces to generate the key, serves as the foundation for the key creation process. Experimental findings indicate that the proposed approach can produce safe keys that are resilient to a variety of assaults. The technique offers a fresh and effective way to generate keys for the Hi Sec algorithm, which may be used in several secure communication systems. The proposed method was programmed in VisualBaic.Net 2012.
Title: Text Encryption Using Improving Key of Hi Sec Algorithm Using Rubik's Cube
Description:
Several techniques have been developed to generate keys using Rubik's Cube, which has been researched as a potential source of randomness for cryptography.
This study suggests an innovative technique for creating a key for the Hi Sec algorithm using a Rubik's Cube image.
The process entails creating a binary key for text encryption by leveraging the cube's color information.
The Rubik's Cube principle, which includes choosing a subset of cube faces to generate the key, serves as the foundation for the key creation process.
Experimental findings indicate that the proposed approach can produce safe keys that are resilient to a variety of assaults.
The technique offers a fresh and effective way to generate keys for the Hi Sec algorithm, which may be used in several secure communication systems.
The proposed method was programmed in VisualBaic.
Net 2012.
Related Results
Sleep Habits and Occurrence of Lowback Pain among Craftsmen
Sleep Habits and Occurrence of Lowback Pain among Craftsmen
<span style="color: #000000; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; ...
Sleep Habits and Occurrence of Lowback Pain among Craftsmen
Sleep Habits and Occurrence of Lowback Pain among Craftsmen
<span style="color: #000000; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; ...
THE ROLE OF ALGORITHMS IN SOLVING RUBIK’S CUBE
THE ROLE OF ALGORITHMS IN SOLVING RUBIK’S CUBE
The Rubik’s Cube, a widely recognized combinational puzzle which provides a rich mathematical structure that has become an important object of study in discrete mathematics. Algori...
Solving Rubiks Cube Using Open CV
Solving Rubiks Cube Using Open CV
Abstract: The Rubik’s cube is 3D combinatorial and mechanical puzzle invented in 1974. It challenged users to solve colourful puzzle in record time. We use OPEN CV to solve this Ru...
Bounds on the sum of broadcast domination number and strong metric dimension of graphs
Bounds on the sum of broadcast domination number and strong metric dimension of graphs
Let [Formula: see text] be a connected graph of order at least two with vertex set [Formula: see text]. For [Formula: see text], let [Formula: see text] denote the length of an [Fo...
RSA vs Quantum Encryption: Flexibility, Security, and Performance Analysis for Information Processing
RSA vs Quantum Encryption: Flexibility, Security, and Performance Analysis for Information Processing
Introduction: With the advent of quantum computing, traditional encryption methods face significant challenges in maintaining security. This study explores quantum information proc...
Symmetric Encryption Algorithm using ASCII Values
Symmetric Encryption Algorithm using ASCII Values
Cryptography at its very core is nothing but math - pure, simple, undiluted math. Math created algorithms that are basics for various encryption algorithm. Encryption is a method i...
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
The advent of distributed cloud systems has revolutionized data storage and access, providing flexibility and scalability across various industries. However, these benefits come wi...

