Harnessing Rubik's Cube Algorithm for Counteracting Man-in-the-Middle Attacks

Authors

  • Syeda Wajiha Zahra Department of Computer Science, Alhamd Islamic University, Islamabad, Pakistan
  • Mudassar Ali Zaman Department of Computer Science, Alhamd Islamic University, Islamabad, Pakistan
  • Muhammad Nadeem Department of Computer Science and Technology, University of Science and Technology Beijing, Beijing, China https://orcid.org/0000-0003-3566-7078
  • Waqas Ahmed Department of Computer Science, Alhamd Islamic University, Islamabad, Pakistan
  • Ali Arshad Department of Computer Science, National University of Technology, Islamabad, Pakistan
  • Saman Riaz Department of Computer Science, National University of Technology, Islamabad, Pakistan

DOI:

https://doi.org/10.37256/rrcs.3120244605

Keywords:

cryptography, malware, man-in-the-middle, cyber security, Rubik, social network, application, attacks

Abstract

In today's world, businesses and individuals alike rely on cloud computing for storing and accessing data. However, with the growing number of cyber threats, it is crucial to prioritize cloud security. Despite various algorithms designed to prevent cyber-attacks, attackers have developed advanced tactics to bypass security measures. That's why it is essential to understand the three primary platforms of cloud computing and how they work together to create a seamless environment. Cloud cryptography is a highly effective method for encrypting data and enabling authorized users to access it securely. With the aid of an algorithm and a key, cryptography transforms plaintext into ciphertext, providing a defence mechanism against malicious third parties. The use of cryptographic methods ensures that only authorized entities can access the data exchange. Data encryption is a recognized and efficient security tool for safeguarding an organization's information. By converting data into a code that can only be accessed or interpreted by someone with the correct encryption key, data encryption provides a reliable defense against cyber threats. Cloud computing services, such as email, calendars, Skype, and WhatsApp, are becoming increasingly essential to our daily activities. These services allow us to store and manage data on the cloud infrastructure, enabling remote access to our data from anywhere at any time. Before cloud computing, accessing data relied on client-server computing. However, with cloud computing, we have access to a decentralized network of servers worldwide that work together to create a seamless environment. In conclusion, protecting data is crucial, and with the growing number of cyber threats, it is essential to prioritize cloud security. By implementing effective data encryption and cloud cryptography, individuals and organizations can safeguard their information and data from malicious attackers.

Downloads

Published

2024-06-20

How to Cite

Zahra, S. W., Zaman, M. A., Nadeem, M., Ahmed, W., Arshad, A., & Riaz, S. (2024). Harnessing Rubik’s Cube Algorithm for Counteracting Man-in-the-Middle Attacks. Research Reports on Computer Science, 3(1), 29–45. https://doi.org/10.37256/rrcs.3120244605