IRO Journals

Journal of Soft Computing Paradigm

An Accurate Bitcoin Price Prediction using logistic regression with LSTM Machine Learning model
Volume-3 | Issue-3

Design of Distribution Transformer Health Management System using IoT Sensors
Volume-3 | Issue-3

Energy Management System in the Vehicles using Three Level Neuro Fuzzy Logic
Volume-3 | Issue-3

Cloud Load Estimation with Deep Logarithmic Network for Workload and Time Series Optimization
Volume-3 | Issue-3

Design of a Food Recommendation System using ADNet algorithm on a Hybrid Data Mining Process
Volume-3 | Issue-4

Review on Data Securing Techniques for Internet of Medical Things
Volume-3 | Issue-3

Automatic Diagnosis of Alzheimer’s disease using Hybrid Model and CNN
Volume-3 | Issue-4

Population Based Meta Heuristics Algorithm for Performance Improvement of Feed Forward Neural Network
Volume-2 | Issue-1

Comparative Analysis of an Efficient Image Denoising Method for Wireless Multimedia Sensor Network Images in Transform Domain
Volume-3 | Issue-3

A Comprehensive Review on Power Efficient Fault Tolerance Models in High Performance Computation Systems
Volume-3 | Issue-3

An Integrated Approach for Crop Production Analysis from Geographic Information System Data using SqueezeNet
Volume-3 | Issue-4

An Accurate Bitcoin Price Prediction using logistic regression with LSTM Machine Learning model
Volume-3 | Issue-3

Design of Distribution Transformer Health Management System using IoT Sensors
Volume-3 | Issue-3

Design of a Food Recommendation System using ADNet algorithm on a Hybrid Data Mining Process
Volume-3 | Issue-4

Automatic Diagnosis of Alzheimer’s disease using Hybrid Model and CNN
Volume-3 | Issue-4

Effective Prediction of Online Reviews for Improvement of Customer Recommendation Services by Hybrid Classification Approach
Volume-3 | Issue-4

Acoustic Features Based Emotional Speech Signal Categorization by Advanced Linear Discriminator Analysis
Volume-3 | Issue-4

Analysis of Statistical Trends of Future Air Pollutants for Accurate Prediction
Volume-3 | Issue-4

Identification of Electricity Threat and Performance Analysis using LSTM and RUSBoost Methodology
Volume-3 | Issue-4

Review on Data Securing Techniques for Internet of Medical Things
Volume-3 | Issue-3

Home / Archives / Volume-4 / Issue-4 / Article-7

Volume - 4 | Issue - 4 | december 2022

Analysis and Implementation of 3-D Transpositional Cipher Algorithm Based on Rubik’s Cube Mechanism
V. Vilasini  , V. Vasudevan, S. Manuj Nanthan, K. Lakshmi Kalpana Roy
Pages: 283-295
Cite this article
Vilasini, V., Vasudevan, V., Nanthan, S. M. & Roy, K. L. K. (2022). Analysis and Implementation of 3-D Transpositional Cipher Algorithm Based on Rubik’s Cube Mechanism. Journal of Soft Computing Paradigm, 4(4), 283-295. doi:10.36548/jscp.2022.4.007
Published
30 January, 2023
Abstract

The algorithms that are used for encrypting the text information for security purpose are referred as encryption algorithms. They are widely employed for the application on data transmission over networks. This is seen as a necessary part of data transmission since confidentiality and data privacy are important factors. Different encryption algorithms have different complexities, speeds of execution, and degrees of security. The Advanced Encryption Standard (AES) is one of the algorithms acknowledged by the U.S. government and other major organizations. The AES algorithm guarantees high security since there is no known public attack that can crack it. The Blowfish algorithm on the other hand is very fast but less secure. The encryption algorithms in the average zone of these two algorithms are highly useful for the transmission of general information among people. Such an algorithm also guarantees a good amount of speed as well as more security. Non-conventional algorithms such as transpositional cipher based on Rubik’s Cube mechanism can be seen as a viable option to use in common applications. These algorithms can be further deepened with the help of more complex key generation parts that can be done to enhance the security of the data. This paper focuses on analytically evaluating if this algorithm can be treated as a viable replacement in an application compared to other algorithms. Moreover, this research covers some pros and cons noted while evaluating.

Keywords

AES DES Rubik Cube Algorithm FCM

Full Article PDF Download Article PDF 
×

Currently, subscription is the only source of revenue. The subscription resource covers the operating expenses such as web presence, online version, pre-press preparations, and staff wages.

To access the full PDF, please complete the payment process.

Subscription Details

Category Fee
Article Access Charge
For single article (Indian)
1,200 INR
Article Access Charge
For single article (non-Indian)
15 USD
Open Access Fee (Indian) 5,000 INR
Open Access Fee (non-Indian) 80 USD
Annual Subscription Fee
For 1 Journal (Indian)
15,000 INR
Annual Subscription Fee
For 1 Journal (non-Indian)
200 USD
secure PAY INR / USD
Subscription form: click here