1. bookVolume 3 (2016): Issue 6 (December 2016)
Journal Details
License
Format
Journal
eISSN
2182-1976
First Published
16 Apr 2016
Publication timeframe
2 times per year
Languages
English
access type Open Access

Quantum Distribution of a Sudoku Key

Published Online: 08 Dec 2016
Volume & Issue: Volume 3 (2016) - Issue 6 (December 2016)
Page range: 87 - 94
Journal Details
License
Format
Journal
eISSN
2182-1976
First Published
16 Apr 2016
Publication timeframe
2 times per year
Languages
English
Abstract

Sudoku grids are often cited as being useful in cryptography as a key for some encryption process. Historically transporting keys over an alternate channel has been very difficult. This article describes how a Sudoku grid key can be secretly transported using quantum key distribution methods whereby partial grid (or puzzle) can be received and the full key can be recreated by solving the puzzle.

Keywords

[1] C. Bennett, G. Brassard, S. Breidbart, and S. Wiesner.“Quantum cryptography, or unforgeable subway tokens”, in D. Chaum, R. Rivest, and A. Sherman, editors, Advances in Cryptology, 267-275, Springer US, 1983.10.1007/978-1-4757-0602-4_26Search in Google Scholar

[2] C. H. Bennett and G. Brassard.“Quantum cryptography: Public key distribution and coin tossing”, IEEE International Conference on Computers, Systems, and Signal Processing, p. 175, Bangalore, 1984.Search in Google Scholar

[3] C. Chang, Y. Chou, and T. D. Kieu.“An information hiding scheme using Sudoku”, ICICIC '08: Proceedings of the 2008 3rd International Conference on Innovative Computing Information and Control, p. 17, Washington, DC, USA, 2008.10.1109/ICICIC.2008.149Search in Google Scholar

[4] S. Gupta.“Some results on Su Doku”. http://theory.tifr.res.in/~sgupta/sudoku/theorems.pdf (March 2006)Search in Google Scholar

[5] W. Hong, T. Chen, and C. Shiu.“Steganography using Sudoku revisited”, Intelligent Information Technology Application, 2008. IITA '08. Second International Symposium on Intelligent Information Technology Application (IITA'2008), 935-939, Shanghai, 2008.10.1109/IITA.2008.445Search in Google Scholar

[6] G. Royle.“Combinatorial concepts with Sudoku I: Symmetry”. http://people.csse.uwa.edu.au/gordon/sudoku/sudoku-symmetry.pdf (March 2006)Search in Google Scholar

[7] M. H. Shirali-Shahreza and M. Shirali-Shahreza.“Steganography in SMS by Sudoku puzzle”, 6th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA 2008), 844-847, Doha, Qatar, March 31 - April 4, 2008.10.1109/AICCSA.2008.4493626Search in Google Scholar

[8] S. Singh. The Code Book: The Evolution of Secrecy from Mary, Queen of Scots, to Quantum Cryptography, Doubleday, New York, USA, 1st edition, 1999.Search in Google Scholar

[9] J. Watrous.“Zero-knowledge against quantum attacks”, Proceedings of the 38th ACM Symposium on Theory of Computing, pages 296-305. ACM Press, New York, 2006.10.1145/1132516.1132560Search in Google Scholar

[10] H. Wien, C. Tung-Shou, and S. Chih-Wei.“A minimal euclidean distance searching technique for sudoku steganography”, ISISE '08. International Symposium on Information Science and Engieering, pages 515-518, 2008.Search in Google Scholar

[11] Y. Wu, J. Noonan, and S. Agaian. Binary data encryption using the sudoku block cipher, 3915 -3921, 2010. 10.1117/12.853197Search in Google Scholar

Recommended articles from Trend MD

Plan your remote conference with Sciendo