Al-Jabar (Dec 2023)
Text security by using a combination of the vigenere cipher and the rubik's cube method of size 4×4×4
Abstract
Background: In the current era of technology, information security is increasingly important. The growth of technology leads to a higher level of threat to the security of data and information dissemination, and cryptography is a valuable protective tool. Aim: The primary objective of this research is to enhance text security through the fusion of the Vigenere cipher and the Rubik's cube algorithm. By leveraging this novel approach, we aim to fortify the confidentiality of textual data against potential eavesdroppers and adversaries. To demonstrate the practicality of this method, we perform a simulation using the Python programming language within the Google Colab environment. Method: This study employs a qualitative research methodology supplemented by empirical simulation. The combination of the Vigenere Cipher and the Rubik's Cube algorithm in a 4×4×4 configuration is implemented to encrypt and decrypt text. The simulation is executed using the Google Colab platform, enabling a practical illustration of the encryption process. Result: The results of our research indicate the feasibility of generating ciphertext through the amalgamation of the Vigenere Cipher and the Rubik's Cube algorithm in the specified 4×4×4 configuration. The simulation conducted in Google Colab serves as concrete evidence of the effectiveness and practicality of this combined encryption method. Conclusion: In conclusion, this research offers a compelling approach to bolstering text security in the modern era of information technology. By combining the Vigenere Cipher with the Rubik's Cube algorithm in a 4×4×4 configuration, we have demonstrated the potential to significantly enhance the confidentiality of sensitive textual data. The empirical simulation conducted in Google Colab reaffirms the practicality and viability of this innovative encryption technique, highlighting its potential as a valuable tool in the realm of information security.
Keywords