Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

SudoKrypt:A Novel Sudoku based Symmetric Encryption Scheme


Affiliations
1 Software Development, Pune, Maharashtra, India
2 Carnegie Mellon University, Computer Science Dept., Pittsburgh, United States
3 Visvesvaraya NIT, Computer Science Dept., Nagpur, Maharashtra, India
     

   Subscribe/Renew Journal


In this paper a novel symmetric encryption scheme, SudoKrypt, with a block size of 128 bits has been presented using a Latin square Sudoku as the key. For SudoKrypt, the key used is Hexadoku and the key size is 1024 bits. The proposed algorithm gives good diffusion due to high degree of randomness because of multiple options for encrypting the same value. In addition, the proposed approach overcomes the drawback of DES of having weak keys after parity drop operation. AES is computation bound. Proposed algorithm requires less CPU cycles as it is not computation bound and hence is found to have comparable speed to that of AES in terms of encryption and decryption time. Also, the algorithm is very simple to understand, implement and use. The algorithm can typically be used for offline communication where pdf and word documents are encrypted and sent to the receiver via email or other media. The key exchange between transmitter and receiver can take place through a standard key transmission algorithm like RSA.


Keywords

Symmetric Key Encryption, Sudoku, Hexadoku.
Subscription Login to verify subscription
User
Notifications
Font Size


  • Bertram, F., & Jarvis, F. (2006). Mathematics of Sudoku I. Mathematical Spectrum, 39(1), 15-22.
  • McGuire, G., Tugemann, B., & Civario, G. (2014). There is no 16-clue Sudoku: Solving the Sudoku minimum number of clues problem via hitting set enumeration. Experimental Mathematics, 23(2), 190-217.
  • Daemen, J., & Rijmen, V. (1999). AES proposal. Rijndael Block Cipher.
  • Forouzan, B. A., & Mukhopadhyay, D. (2011). Cryptography and Network Security (SIE). McGrawHill Education.
  • Stallings, W. (2006). Cryptography and Network Security, 4/E. Pearson Education India.
  • Daemen, J., & Rijmen, V. (2013). The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media.
  • Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and publickey crypto-systems. Communications of the ACM, 21(2), 120-126.
  • http://dx.doi.org/10.6028/NIST.SP.800-57pt1r4 9. https://github.com/B-Con/crypto-algorithms 10. https://github.com/kinghajj/hexadoku/blob/master/ src/hexadoku/RandomBoard.java

Abstract Views: 435

PDF Views: 1




  • SudoKrypt:A Novel Sudoku based Symmetric Encryption Scheme

Abstract Views: 435  |  PDF Views: 1

Authors

Anjali Deshmukh
Software Development, Pune, Maharashtra, India
Alin Nagraj
Carnegie Mellon University, Computer Science Dept., Pittsburgh, United States
Mansi A. Radke
Visvesvaraya NIT, Computer Science Dept., Nagpur, Maharashtra, India

Abstract


In this paper a novel symmetric encryption scheme, SudoKrypt, with a block size of 128 bits has been presented using a Latin square Sudoku as the key. For SudoKrypt, the key used is Hexadoku and the key size is 1024 bits. The proposed algorithm gives good diffusion due to high degree of randomness because of multiple options for encrypting the same value. In addition, the proposed approach overcomes the drawback of DES of having weak keys after parity drop operation. AES is computation bound. Proposed algorithm requires less CPU cycles as it is not computation bound and hence is found to have comparable speed to that of AES in terms of encryption and decryption time. Also, the algorithm is very simple to understand, implement and use. The algorithm can typically be used for offline communication where pdf and word documents are encrypted and sent to the receiver via email or other media. The key exchange between transmitter and receiver can take place through a standard key transmission algorithm like RSA.


Keywords


Symmetric Key Encryption, Sudoku, Hexadoku.

References