Jump to ContentJump to Main Navigation
Show Summary Details
More options …

Recreational Mathematics Magazine

2 Issues per year

Mathematical Citation Quotient (MCQ) 2016: 0.05

Open Access
See all formats and pricing
More options …

Quantum Distribution of a Sudoku Key

Sian K. Jones
Published Online: 2016-12-08 | DOI: https://doi.org/10.1515/rmm-2016-0009


Sudoku grids are often cited as being useful in cryptography as a key for some encryption process. Historically transporting keys over an alternate channel has been very difficult. This article describes how a Sudoku grid key can be secretly transported using quantum key distribution methods whereby partial grid (or puzzle) can be received and the full key can be recreated by solving the puzzle.

Keywords: sudoku; quantum key distribution methods


  • [1] C. Bennett, G. Brassard, S. Breidbart, and S. Wiesner.“Quantum cryptography, or unforgeable subway tokens”, in D. Chaum, R. Rivest, and A. Sherman, editors, Advances in Cryptology, 267-275, Springer US, 1983.Google Scholar

  • [2] C. H. Bennett and G. Brassard.“Quantum cryptography: Public key distribution and coin tossing”, IEEE International Conference on Computers, Systems, and Signal Processing, p. 175, Bangalore, 1984.Google Scholar

  • [3] C. Chang, Y. Chou, and T. D. Kieu.“An information hiding scheme using Sudoku”, ICICIC '08: Proceedings of the 2008 3rd International Conference on Innovative Computing Information and Control, p. 17, Washington, DC, USA, 2008.Google Scholar

  • [4] S. Gupta.“Some results on Su Doku”. http://theory.tifr.res.in/~sgupta/sudoku/theorems.pdf (March 2006)Google Scholar

  • [5] W. Hong, T. Chen, and C. Shiu.“Steganography using Sudoku revisited”, Intelligent Information Technology Application, 2008. IITA '08. Second International Symposium on Intelligent Information Technology Application (IITA'2008), 935-939, Shanghai, 2008.Google Scholar

  • [6] G. Royle.“Combinatorial concepts with Sudoku I: Symmetry”. http://people.csse.uwa.edu.au/gordon/sudoku/sudoku-symmetry.pdf (March 2006)Google Scholar

  • [7] M. H. Shirali-Shahreza and M. Shirali-Shahreza.“Steganography in SMS by Sudoku puzzle”, 6th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA 2008), 844-847, Doha, Qatar, March 31 - April 4, 2008.Google Scholar

  • [8] S. Singh. The Code Book: The Evolution of Secrecy from Mary, Queen of Scots, to Quantum Cryptography, Doubleday, New York, USA, 1st edition, 1999.Google Scholar

  • [9] J. Watrous.“Zero-knowledge against quantum attacks”, Proceedings of the 38th ACM Symposium on Theory of Computing, pages 296-305. ACM Press, New York, 2006.Google Scholar

  • [10] H. Wien, C. Tung-Shou, and S. Chih-Wei.“A minimal euclidean distance searching technique for sudoku steganography”, ISISE '08. International Symposium on Information Science and Engieering, pages 515-518, 2008.Google Scholar

  • [11] Y. Wu, J. Noonan, and S. Agaian. Binary data encryption using the sudoku block cipher, 3915 -3921, 2010. Google Scholar

About the article

Published Online: 2016-12-08

Published in Print: 2016-12-01

Citation Information: Recreational Mathematics Magazine, Volume 3, Issue 6, Pages 87–94, ISSN (Online) 2182-1976, DOI: https://doi.org/10.1515/rmm-2016-0009.

Export Citation

© 2016. This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. BY-NC-ND 4.0

Comments (0)

Please log in or register to comment.
Log in