<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>M. Singh, A. Kakkar, M. Singh, Image encryption scheme based on knight's tour problem, Pro-
cedia Computer Science</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.1016/j.procs.2015.10.081</article-id>
      <title-group>
        <article-title>Bad cipher design: Chessography and Cascaded Spin Shufle</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Martin Stanek</string-name>
          <email>martin.stanek@fmph.uniba.sk</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="editor">
          <string-name>Encryption, Symmetric ciphers, Cryptanalysis</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Computer Science, Faculty of Mathematics</institution>
          ,
          <addr-line>Physics and Informatics</addr-line>
          ,
          <institution>Comenius University</institution>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <volume>70</volume>
      <issue>2015</issue>
      <fpage>245</fpage>
      <lpage>250</lpage>
      <abstract>
        <p>This paper shows the weaknesses of two symmetric encryption schemes - Chessography and Cascaded Spin Shufle. The security claims made by their authors are unsubstantiated. Despite being featured in peer-reviewed publications, their flaws are readily apparent and do not require any sophisticated cryptanalysis. Consequently, the paper proposes a set of speculative “red flag” indicators aimed at identifying encryption proposals of potentially questionable quality.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>scheme, although with dubious security.
should be discouraged.</p>
      <p>Symmetric encryption schemes are important cryptographic constructions and are extensively used in
many applications to ensure confidentiality of data. Best practices and cybersecurity guidelines require
using standardized and approved encryption schemes for sensitive data. Those schemes are assumed to
be suficiently analyzed and their implementation and application scenarios understood from a security
perspective.</p>
      <p>Nevertheless, there is a constant stream of new symmetric encryption scheme proposals. These
proposals often lack clear motivation, as well as any meaningful security analysis. A partial explanation
for this phenomenon is that it is easy to design a bijective function with an additional parameter (key),
if you discard most of the modern cryptanalytic knowledge. Thus, one can obtain a correct encryption</p>
      <p>We believe the academic practice of proposing schemes without a proper motivation and analysis</p>
      <sec id="sec-1-1">
        <title>Our contribution.</title>
        <p>We discuss the security of two symmetric encryption schemes, Chessography
and Cascaded Spin Shufle. These schemes were chosen because of their poor design. We show that
both schemes are insecure, despite security claims of their authors. Moreover, the analysis is basic and
straightforward, not requiring any advanced cryptanalytic methods.</p>
        <p>We propose “red flag” indicators that can help identify problematic proposals. Whether these
indicators are suficient or if other indicators might be more useful remains an open question. Even so,
avoiding red flags can help improve proposals.</p>
      </sec>
      <sec id="sec-1-2">
        <title>Related work.</title>
        <p>
          Quality of cryptographic algorithms is an important part of security controls, where
best practice requires standardized and approved algorithms [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ]. Analysis and prevention of
cryptographic failures often focus on implementation and configuration problems, since these occur in practice
[
          <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
          ]. Weaknesses of obscure, low-profile algorithms might go unnoticed. We are not aware of a study
that addresses this type of algorithms specifically.
        </p>
        <p>This paper is organized into four sections. After the introduction, we discuss Chessography in Section</p>
        <sec id="sec-1-2-1">
          <title>2 and Cascaded Spin Shufle in Section</title>
        </sec>
        <sec id="sec-1-2-2">
          <title>3. Red flag indicators are presented in Section 4.</title>
          <p>CEUR
Workshop
ISSN1613-0073</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2. Chessography</title>
      <p>
        Chess is an interesting and complex game with a vast number of possible positions. This sometimes
leads to ideas for combining chess with cryptography [
        <xref ref-type="bibr" rid="ref4 ref5 ref6">4, 5, 6, 7</xref>
        ]. Chessography [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] is a symmetric
encryption scheme. The main idea of this scheme is to use a chess game to encrypt a plaintext block of
32 characters. Plaintext characters are placed on squares where white and black pieces are positioned at
the start of the game. These characters are then transformed using the first key (Key 1), and the game is
used to move them on the board. The second key is based on a particular chess game, forming so called
“paired key”. However, the details of its construction and use are irrelevant for our discussion. The
ciphertext consists of the final position of the pieces on the board, together with additional information
that allows to reconstruct the initial positions of the pieces, including those that were captured during
the game. The main objections to the quality and strength of the Chessography scheme are summarized
in the following section.
2.1. Failures of Chessography
      </p>
      <sec id="sec-2-1">
        <title>Imprecise description of the scheme</title>
        <p>The description of the encryption and decryption algorithms is rather vague. It lacks mathematical
formulas, reference implementation, or pseudocode. It is unclear whether distinct chess games are used
for subsequent plaintext blocks or if a single game is used for all blocks. The provided example also
leaves numerous questions unanswered, for example, what is the exact procedure to produce the final
ciphertext, since the text description does not correspond to the ciphertext presented in figures.</p>
      </sec>
      <sec id="sec-2-2">
        <title>The scheme is incorrect</title>
        <p>The scheme uses an alphabet with 71 characters, which are encoded as numbers ranging from 1 to 71.
Figure 1 illustrates the initial four steps of the encryption algorithm. There are two notable issues with
step 4. A minor issue is that after a modulo 71 operation, the range changes to 0, … , 70.</p>
        <p>A major issue is that XOR-ing with randomly chosen “Key 1”, whose values can be quite large1,
and performing modulo 71 operation is not reversible. For instance, consider the plaintext characters
encoded as numbers 9 and 64, and the key value 62 for both numbers:</p>
        <p>(9 XOR 62) mod 71 = 55 mod 71 = 55;
(64 XOR 62) mod 71 = 126 mod 71 = 55.</p>
        <p>
          It is impossible to tell what the original plaintext number was just from the result 55 and the key
value 62. Hence, the step 4 is not reversible. It does not matter what the next transformations are, the
decryption is unable to distinguish the correct plaintext.
1An example for Key 1 in the original paper contains values as low as 29 and as high as 943 [5, Figure 9].
Chess-related permutation is (sometimes) irrelevant
Let’s assume that the “XOR-mod” step is correct, e.g., the scheme uses an alphabet with 64 characters,
numbered from 0 to 63, and values in Key 1 are 6-bit integers. If only a single block is encrypted, this
part of the encryption algorithm functions as a one-time pad cipher, achieving perfect secrecy. Any
chess-related steps thereafter are irrelevant. If new Key 1 is chosen for each plaintext block separately,
and the paper [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ] can be interpreted both ways (yes and no), this observation extends to the entire
ciphertext. The key is long, the first part of the encryption algorithm is a one-time pad, and other
transformations are redundant for secrecy.
        </p>
        <p>If Key 1 is the same for each block, which is likely the intended construction, a known plaintext
attack becomes a problem. It is possible to reconstruct values of Key 1, at least for characters presented
in the final position on the chess board, and depending on details of the encryption algorithm even for
the entire block.</p>
      </sec>
      <sec id="sec-2-3">
        <title>Chess part of the scheme is incomplete</title>
        <p>The scheme encodes moves by creating pairs of squares where a piece was and where it moved to,
respectively. There is no mention whether this encoding is able to correctly handle moves like castling,
en passant, and pawn promotion.</p>
        <p>
          Remark. As a curiosity, the example game used in [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ] is the following one (annotation symbols were
added by Stockfish):
The game is rather illogical, full of blunders, and white overlooks multiple mate in 1 opportunities, the
ifrst one in move 20.
        </p>
      </sec>
      <sec id="sec-2-4">
        <title>Weak chess games</title>
        <p>
          Some chess games are only a few moves long, fore example, Scholar’s Mate, Fool’s Mate, and Legal’s
Mate. These and other games leave many pieces on their original squares, thus weakening the resulting
permutation. The proposal [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ] does not address the possibility of weak chess games for the Chessography,
nor does it explain how to select suitable chess games for encryption.
        </p>
      </sec>
      <sec id="sec-2-5">
        <title>Chess game permutation is weak</title>
        <p>Let’s assume the chess game is generated by a chess engine to be human-like, or selected from a huge
pool games played by humans. The final composition and placement of pieces is far from statistically
random, let alone cryptographically strong. A simple analysis presented in Section 2.2 demonstrates
this convincingly. Using the final position of a chess game and intermediate moves as a permutation
component in a cipher is a bad idea.</p>
        <p>
          The claim “The strength of this algorithm is based upon the complexity of the chess game.” [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ] by
the author of Chessography, and then using the estimate for the number of possible chess games to
argue the scheme’s security, is simply deceiving: “…any intruder wishes to orderly break the cipher
text, through the knowledge of chess game …will take a long time with an estimate as given 1050 board
positions and 10123 sequences available to try out.” [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ].
2.2. Analysis of chess games final positions
The dataset consists of 100,000 games played on the Lichess server by users with an average rating of
2558. It is a subset of games played in October 2024 [8]. The dataset contains mostly blitz and rapid
games and excludes bullet time controls. White win rate is 47%, black win rate is 42%, and only 11% of
the games are draws. The average length of the game is 43 moves (86 plies).
        </p>
        <p>Figures 3 and 4 in Appendix A show heatmaps for the location of diferent pieces on the chess board
for the final position of the game. The heatmaps illustrate the limited randomness of the final positions
and subsequently weak (partial) permutations that chess games provide. Colors are scaled individually
for each heatmap, therefore the same shade can represents diferent percentage in distinct heatmaps.
Table 1 summarizes the maximal percentages and placement on the board for each piece type. In
conclusion, the rules of chess limit the range of possible moves, and the placement of pieces in final
positions is not suficiently random for cryptographic applications.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Cascaded Spin Shufle</title>
      <p>Cascaded Spin Shufle (CSS) is a transposition cipher proposed in [ 9]. The cipher uses a very simple
permutation – it arranges plaintext in a  ×  grid (representing a torus) in a circular, spiral motion. The
starting position and the spiral direction is determined by a key. The ciphertext is formed by reading
permuted characters row by row from the grid. An example for 7 × 7 grid with the initial position in
the first row and fourth column, and the spiral motion starting left and clockwise (see also Figure 2):
The corresponding output permutation starts with 28, 11, 2 …and ends with 5, 18, 39.
3.1. Failures of CSS</p>
      <sec id="sec-3-1">
        <title>Small key space</title>
        <p>The CSS scales the grid size according to the plaintext length. It doubles  until the whole plaintext fits
into the grid. The plaintext is padded with random characters to fill the grid. Therefore, the plaintext
length is proportional to  2 regardless of padding length.</p>
        <p>A
Y
H
E
C
D
N</p>
        <p>E
D
P
L
A
I
S</p>
        <p>A
R
A
F
S
G
D</p>
        <p>B
E
R
F
C
N
C</p>
        <p>P
H
G
U
A
C
I</p>
        <p>S
S
O
H
D
H
E</p>
        <p>P
I
N
S
E
D
S
Plaintext: BADCIPHERDESIGNCHESSOGRAPHYANDCASCADEDSPINSHUFFLE</p>
        <p>Ciphertext: AEABPSPYDREHSIHPARGONELFFUHSCASCADEDIGNCHDNSDCIES</p>
        <p>The CSS uses an unnecessarily complicated procedure to derive the key. At the end, the key contains
a starting position in the grid and initial directions for the spiral movement: {up, down, left , right} ×
{clockwise, anticlockwise}, i.e., overall 8 2 keys. Hence, the brute-force attack has linear complexity
with respect to the plaintext length, assuming the wrong keys can be recognized and discarded with
only a few initial characters decrypted. If the attacker decrypts the entire ciphertext with all possible
keys, there is only polynomial (quadratic) overhead in this approach.</p>
        <p>It is straightforward to conclude that the key space size is insuficient.</p>
      </sec>
      <sec id="sec-3-2">
        <title>Weak permutation</title>
        <p>The resulting permutation will always contain significant parts of consecutive characters. In the
previous example with a 7 × 7 grid the sequence of 31, 32, …, 37 will appear in the output. Similarly,
the row above contains similar consecutive sequence, 43, …49, just reversed. Nontrivial substrings of
plaintext appearing in the ciphertext indicate a vulnerability of the scheme. This problem becomes
worse with increasing grid size.</p>
        <p>Moreover, the attacker can use these substrings to narrow the starting position of the spin, since
these appear in approximately /2 distance from the starting position. Similarly, the spin direction
(clockwise or anticlockwise) can be derived from the correct continuation of such substring in the grid.</p>
      </sec>
      <sec id="sec-3-3">
        <title>Unsubstantiated security claims</title>
        <p>The original paper contains some ideas for strengthening the CSS. Unfortunately, none of them really
work and address the small key space and weak permutation suficiently. For example, using multi-byte
plaintext characters does not make the scheme more secure. It might make cryptanalysis easier, since
multi-byte characters introduce additional redundancy that can be exploited in cryptanalysis.</p>
        <p>Another dubious idea is to expand the key by dividing a long key and encrypting one part of the key
with another part, possibly multiple times with other parts of the key. Obviously, this does not solve
any problems mentioned in the previous subsections.</p>
        <p>The authors claim: “The proposed algorithms systematically used complicated text scrambling
to secure the message against guessing and brute force.” [9]. This statement and similar security
statements in the original paper are obviously false.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Red flags</title>
      <p>The red flags are a set of indicators for fast detection of questionable symmetric ciphers proposals. Even
thougth some of them are subjective, the goal is to find indicators with the following qualities:
• Easy to evaluate – it must be straightforward to decide whether the indicator is true or false, and
in some cases to what degree. No thorough cryptanalytic assessment is expected.
• Related to the quality of the proposal – an indicator must directly show a deficiency or omission
in the proposal.</p>
      <p>Obviously, the red flags cannot replace a detailed and focused analysis, but they help to highlight
potential negligence of proposals’ authors. Whether they are a reliable tool for detection of dubious
schemes remains an open question for future research. In the rest of the section some indicators are
proposed and illustrated on Chessography and the CSS. A summary is provided in Table 2.</p>
      <sec id="sec-4-1">
        <title>Missing reference implementation</title>
        <p>Reference implementation clarifies the cipher’s inner workings and helps resolve ambiguities in the
proposal. It also facilitates easier experimentation with the cipher and its analysis.</p>
        <p>There is no implementation provided for Chessography. It is more of an idea than an actual algorithm.
The CSS is accompanied by a preliminary implementation, which is provided on GitHub2 in the form
of an IPython notebook.</p>
      </sec>
      <sec id="sec-4-2">
        <title>Unrelated concepts discussed in the proposal</title>
        <p>If the goal of a proposal is to introduce a novel symmetric encryption scheme, there is no need to
discuss other types of cryptographic schemes in any significant detail. For example, details of public-key
cryptography do not meaningfully contribute to the new scheme.</p>
        <p>The Chessography proposal introduces only the necessary concepts, encryption and the game of
chess. On the other hand, the CSS presents unrelated facts, such as details of the RSA scheme, key
lengths of RC2, DES, Blowfish, and RC6 ciphers, inner operations of AES, etc.</p>
      </sec>
      <sec id="sec-4-3">
        <title>Superfluous bibliography</title>
        <p>
          An extensive bibliography is often correlated with the previous indicator when unrelated concepts
are referenced. On the other hand, a context, similar schemes, and cryptanalytic assessments require
appropriate bibliographic records. In the case of our two schemes Chessography [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ] has 7 references,
and the CSS [9] has 34 references.
        </p>
        <p>Dubious arguments of cryptographic strength
It should raise a reader’s suspicion if the proposal makes security claims without argument or with
lfawed reasoning. A usual problem is to select a particular feature of the cipher and use it as a token
of cryptographic strength. In case of Chessography, it is the chess game tree complexity (the number
of possible chess games) that have almost nothing to do with the cryptographic strength of resulting
permutations, as we discussed in Section 2. The authors of the CSS use various statistical tests to
argue the strength of their proposal. They also informally discuss brute-force resistance, concluding
(incorrectly) that large grid size and key size make such an attack inefective. Surprisingly, both
proposals omit an explicit statement of bit-security of the ciphers.</p>
        <p>Missing or informal only discussion of modern cryptanalytic attacks
This can be viewed as a continuation of the previous indicator. Any new proposal should contain a
justified complexity estimates for state of the art attacks. For stream ciphers, we expect an analysis
of algebraic attacks, correlation attacks etc. For block ciphers, variants of diferential, linear, integral
and other attacks should be considered. In case of iterated ciphers, showing the best attacks on
round-reduced versions of the cipher is a plus.</p>
        <p>The Chessography proposal lacks any discussion in this regard. The CSS proposal informally and
vaguely addresses algebraic attacks and linear cryptanalysis resistance. However, no supporting
evidence is provided.
2https://github.com/AhmadAbu-Shareha/CSS-Transposition-Cipher
There are many proposals targeted at IoT, sensors, and similar applications. Constrained environments
lead to lightweight schemes. There is nothing wrong with comparing new ciphers to “full” ciphers
like AES to see the performance or resource consumption diference. However, it is unfair to not
acknowledge the trade-of between security and performance that was made.</p>
        <p>Since there is no Chessography implementation, no performance comparison was done. The CSS is
extensively compared with “modern encryption algorithms, such as AES”, see [9, Table 9]. Unsurprisingly,
results are very favorable for the CSS.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion</title>
      <p>This paper shows that Chessography and Cascaded Spin Shufle are not good proposals, and they seems
insecure beyond repair. We hypothesize that these and similar encryption schemes can be recognized
by simple indicators (red flags). Certainly, these indicators cannot replace a real cryptanalysis and
security assessment, but they raise a bar for acceptable proposals. In future work we would like to
apply our indicators to a broader set of symmetric encryption scheme proposals.</p>
    </sec>
    <sec id="sec-6">
      <title>Declaration on Generative AI</title>
      <p>The author has not employed any Generative AI tools.
whiteking
8
7
6
5
4
3
2
1 A B C D E F G H
whitebishop
whitequeen
8
7
6
5
4
3
2
1 A B C D E F G H
whiteknight
blackking
8
7
6
5
4
3
2
1 A B C D E F G H
blackbishop
blackqueen
8
7
6
5
4
3
2
1 A B C D E F G H
blackknight
whiterook
8
7
6
5
4
3
2
1 A B C D E F G H</p>
      <p>whitepawn</p>
      <p>blackrook
8
7
6
5
4
3
2
1 A B C D E F G H</p>
      <p>blackpawn</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <article-title>[1] National Institute of Standards and Technology</article-title>
          ,
          <source>NIST SP 800-53, Revision 5: Security and Privacy Controls for Information Systems and Organizations</source>
          ,
          <year>2020</year>
          . URL: https://csrc.nist.gov/pubs/sp/800/ 53/r5/final.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>OWASP</given-names>
            <surname>Foundation</surname>
          </string-name>
          ,
          <source>OWASP Top 10:</source>
          <year>2025</year>
          ,
          <year>2025</year>
          . URL: https://owasp.org/www-project
          <string-name>
            <surname>-</surname>
          </string-name>
          top-ten/, accessed:
          <year>August 2025</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>S.</given-names>
            <surname>Garfinkel</surname>
          </string-name>
          , A Field Guide to Spotting Bad Cryptography,
          <string-name>
            <surname>CSO</surname>
          </string-name>
          ,
          <year>2005</year>
          . URL: https: //www.csoonline.com/article/516768/data-protection
          <article-title>-a-field-guide-to-spotting-badcryptography</article-title>
          .html.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>A.</given-names>
            <surname>Manimaran</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. M.</given-names>
            <surname>Chandrasekaran</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Gupta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Porwal</surname>
          </string-name>
          ,
          <article-title>Encryption and decryption using algebraic chess notations</article-title>
          ,
          <source>International Journal of Pharmacy and Technology</source>
          <volume>8</volume>
          (
          <year>2016</year>
          )
          <fpage>22098</fpage>
          -
          <lpage>22105</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>V. K.</given-names>
            <surname>Kamat</surname>
          </string-name>
          ,
          <article-title>Chessography: A cryptosystem based on the game of chess</article-title>
          , in: H. S. Behera,
          <string-name>
            <surname>D. P.</surname>
          </string-name>
          Mohapatra (Eds.),
          <source>Computational Intelligence in Data Mining</source>
          , Springer Singapore, Singapore,
          <year>2017</year>
          , pp.
          <fpage>309</fpage>
          -
          <lpage>324</lpage>
          . doi:
          <volume>10</volume>
          .1007/
          <fpage>978</fpage>
          -981-10-3874-7_
          <fpage>29</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>M. S.</given-names>
            <surname>Ahmed</surname>
          </string-name>
          , P. MaryAnkitha, P. Anitha,
          <string-name>
            <given-names>M. R.</given-names>
            <surname>Raju</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. P.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <article-title>Chess games as a method for file encryption and storage (</article-title>
          <year>2024</year>
          ). doi:
          <volume>10</volume>
          .21203/rs.3.rs-
          <volume>5088828</volume>
          /v1.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>