DOI QR코드

DOI QR Code

A New Cryptographic Algorithm for Safe Route Transversal of Data in Smart Cities using Rubik Cube

  • Chhabra, Arpit (Shobhit Institute of Engineering and Technology (Deemed University), Chaudhary Charan Singh University) ;
  • Singhal, Niraj (Shobhit Institute of Engineering and Technology (Deemed University), Chaudhary Charan Singh University) ;
  • Bansal, Manav (Shobhit Institute of Engineering and Technology (Deemed University), Chaudhary Charan Singh University) ;
  • Rizvi, Syed Vilayat (Shobhit Institute of Engineering and Technology (Deemed University), Chaudhary Charan Singh University)
  • 투고 : 2022.08.05
  • 발행 : 2022.08.30

초록

At the point when it is check out ourselves, it might track down various information in each turn or part of our lives. Truth be told, information is the new main thrust of our advanced civilization and in this every day, "information-driven" world, security is the significant angle to consider to guarantee dependability and accessibility of our organization frameworks. This paper includes a new cryptographic algorithm for safe route traversal for data of smart cities which is a contemporary, non-hash, non-straight, 3D encryption execution intended for having information securely scrambled in the interim having a subsequent theoretical layer of safety over it. Encryption generally takes an information string and creates encryption keys, which is the way to unscramble as well. In the interim in another strategy, on the off chance that one can sort out the encryption key, there are opportunities to unravel the information scrambled inside the information string. Be that as it may, in this encryption framework, the work over an encryption key (which is created naturally, henceforth no pre-assurance or uncertainty) just as the calculation produces a "state" in a way where characters are directed into the Rubik block design to disregard the information organization.

키워드

참고문헌

  1. Dixit, P., Gupta, A. K., Trivedi, M. C., & Yadav, V. K. (2018). Traditional and hybrid encryption techniques: a survey. In Networking communication and data knowledge engineering (pp. 239-248). Springer, Singapore.
  2. Belal, A. A., & Abdel-Gawad, M. A. (2001, March). 2D-encryption mode. In Second NIST Modes of Operation Workshop.
  3. Varshney, N., & Qadeer, M. A. (2012). Non-Uniform Steps Model: New Layer to Traditional Security Encryption Algorithms (Next-Generation Data Security Layer). International Journal of Engineering and Technology, 4(6), 808. https://doi.org/10.7763/IJET.2012.V4.489
  4. Zeng, D. X., Li, M., Wang, J. J., Hou, Y. L., Lu, W. J., & Huang, Z. (2018). Overview of Rubik's cube and reflections on its application in the mechanism. Chinese Journal of Mechanical Engineering, 31(1), 1-12. https://doi.org/10.1186/s10033-018-0219-4
  5. M. Bellare, A. Desai, E. Jokipii, P. Rogaway, "A Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation", Proceedings of the 38th Symposium on Foundations of Computer Science, IEEE, 1997.
  6. Elghandour, A., Salah, A., & Karawia, A. (2021). A new cryptographic algorithm via a two-dimensional chaotic map. Ain Shams Engineering Journal.
  7. Chhabra, A., and Singhal, N, "Indicator-Based Cyber Threats Detection for Data of Smart Cities Using Bio-Inspired Artificial Algae Algorithm", IJARET, Vol. 11, Issue. 11, pp. 1530-1536, (2020).
  8. Adedeji Kazeem, B., & Akinlolu, P. (2014). A new hybrid data encryption and decryption technique to enhance data security in communication networks: algorithm development. International Journal of Scientific & Engineering Research, 5(10).
  9. Dodge M, Kitchin R. The challenges of cybersecurity for smart cities. InCreating Smart Cities 2019 (pp. 205-216). Routledge.
  10. Adedeji Kazeem B, Akinlolu P. A new hybrid data encryption and decryption technique to enhance data security in communication networks: algorithm development. International Journal of Scientific & Engineering Research. 2014 Oct;5(10).
  11. Butt, Talal Ashraf, and Muhammad Afzaal. "Security and privacy in smart cities: issues and current solutions." In Smart technologies and innovation for a sustainable future, pp. 317-323. Springer, Cham, 2019.
  12. Eckhoff David and Wanger Isabel, "Privacy in Smart Cities-Applications, Technologies, Challenges and Solutions", IEEE Communications Surveys and Tutorials, Vol. 20, Issue. 1, pp. 489-516, (2017). https://doi.org/10.1109/COMST.2017.2748998
  13. Elmaghraby, A. S., andLosavio, M. M., "Cyber Security Challenges in Smart Cities: Safety, security, and privacy", Journal of advanced research, Vol.5, Issue. 4,pp. 491-497, (2014). https://doi.org/10.1016/j.jare.2014.02.006
  14. Theodorakopoulos, G. and Baras, J. S., "Game-theoretic modeling, of malicious users in collaborative networks", IEEE Journal on selected areas in communications, Vol.26, Issue. 7,pp. 1317-1327, (2008).67. https://doi.org/10.1109/JSAC.2008.080928