A Comparison between odd magic squares use in cryptographic algorithms.

  • ibrahim alattar Department of Computer Science, University of Technology, Baghdad, Iraq
  • Abdul Monem S. Rahma
Keywords: Odd Magic Square, Cryptography, linear equation system, finite field, GF(28).

Abstract

This paper has been developed to compare encryption algorithms based on individual magic squares and discuss the advantages and disadvantages of each algorithm or method. Where some positions of the magic square are assigned to the key and the remaining positions are assigned to the message, then the rows, columns and diagonals are summed and these results are as ciphertext and in the process of decryption the equations are arranged and solved by Gauss elimination metod. All algorithms were applied to encrypte the text and images, as well as using both GF(P) and GF(28), and the speed and complexity were calculated. The speed of MS9 by using GF(P) is 15.09085 Millie Second, while by using GF(28) it will be 18.94268 Millie Second, and the complexity is the value of the ASCII code raised to the exponent of the number of message locations multiplied by the value of the prime number raised to the exponent of the number of key locations.

Downloads

Download data is not yet available.

References

[1] S. M. Kareem and A. S. Rahma , " A Modified On Twofish Algorithm Based On Cyclic Group And Irreducible Polynomial In Gf (28) , Al-Qadisiyah Journal Of Pure Science (QJPS) , Vol. 25, No. 1, pp Comp. 1 –9, 2020.
[2] D. A. Jabbar and A. S. Rahma , " Development cryptography protocol based on Magic Square and Linear Algebra System" , Vol.11 No.1 2019.
[3] ] I. M. Alattar and A. S. Rahma , " New Cryptography Algorithm Based On Magic Square Order Five for GF(p) and GF(28) Data" , IOP publishing , Journal of Physics: Conference Series (under publishing).
[4] I. M. Alattar and A. S. Rahma , " A block cipher algorithm developed using Magic Square in the seventh order", 2nd international virtual conference on pure science IOP publishing , Journal of Physics : Conference Series (under publishing).
[5] D. A. Jabbar and A. S. Rahma ," Proposed Cryptography Protocol based on Magic Square, Linear Algebra System and Finite Field ", Jour of Adv Research in Dynamical & Control Systems, Vol. 10, No. 10 , 2018.
[6] Stallings, William, “Cryptography and network security: principles and practice 6 Edition,” Person Education Inc. 2014.
[7] G. Ganapathy, and K. Mani, " Add-On Security Model for Public-Key Cryptosystem Based on Magic Square Implementation " , Proceedings of the World Congress on Engineering and Computer Science 2009 Vol I ,WCECS 2009, San Francisco, USA,2009.
[8] A. Dharini, R. M. Devi, and I. Chandrasekar, “Data Security for Cloud Computing Using RSA with Magic Square Algorithm”, International Journal of Innovation and Scientific Research Vol. 11 No. 2 Nov. 2014, pp. 439-444 2014.
[9] Z. Duan, J. Liu, J. Li and C. Tian , " Improved even order magic square construction algorithms and their applications in multi-user shared electronic accounts" , Theoretical Computer Science – Elsevier , 2015.
[10] Shahla Uthman Umar , " An Improved RSA based on Double Even Magic Square of order 32", Kirkuk University Journal /Scientific Studies (KUJSS), Volume 12, Issue 4, 2017.
[11] R. H. AL-Hashemy and S. A. Mehdi ," A New Algorithm Based on Magic Square and a Novel Chaotic System for Image Encryption ", J. Intell. Syst. 29(1): 1202–1215, 2019.
[12] S. D. Mohammed and T. M. Hasan , " Cryptosystems using an improving hiding technique based on latin square and magic square ", Indonesian Journal of Electrical Engineering and Computer Science, Vol. 20, No. 1, pp. 510~520, 2020.
[13] O. A. Dawood , A. S. Rahma and A. J. Abdul Hossen," Generalized Method for Constructing Magic Cube by Folded Magic Squares ", I.J. Intelligent Systems and Applications, 2016.
[14] S. Cichacz and T. Hincbc , " A magic rectangle set on Abelian groups and its application" , Discrete Applied Mathematics , Volume 288, Pages 201-210 , 2021.
[15] A. Zadeh, S. Benoit and L. Morency , "StarNet: Gradient-free Training of Deep Generative Models using Determined System of Linear Equations" , arXiv Preprint. Ongoing research at CMU , arXiv:2101.00574v1 [cs.LG] ,2021.
[16] V. Nandalal and V. Anand Kumar , " Design and Analysis of (5, 10) Regular LDPC Encoder Using MRP Technique" , Wireless Personal Communications volume 118, pages1295–1311 , 2021.
Published
2022-01-11
How to Cite
alattar, ibrahim, & Abdul Monem S. Rahma. (2022). A Comparison between odd magic squares use in cryptographic algorithms. Al-Qadisiyah Journal of Pure Science, 26(4), 559-572. https://doi.org/10.29350/qjps.2021.26.4.1399
Section
Special Issue (Silver Jubilee)