New Method of Cryptography With Python Code Using Elzaki Transform and Linear Combination of Function
DOI:
https://doi.org/10.26713/cma.v14i3.2458Keywords:
Cryptography, Elzaki transform, Information security, Encryption, DecryptionAbstract
In today’s digital world, cybercrime has become biggest challenge to face in order to keep the confidential information secure from intruders. The security mechanisms used to curb the cyber-attacks, need to be improvised on constant basis with the help of advanced mathematical techniques. This paper deals with new cryptography based iterative method by using successive Elzaki transform of linear combination of functions for encryption and corresponding inverse Elzaki transform for decryption. Starting with a detailed procedure, we presented our work in the form of result. Further, it is generalized and then we applied the iterative method for making our algorithm more secure. We also implemented this method programmatically using PYTHON language which fits current needs. Finally, we illustrate our results with suitable examples.
Downloads
References
E. Adeyefa, L. Akinola and O. Agbolade, Application of laplace transform to cryptography using linear combination of functions, TWMS Journal of Applied and Engineering Mathematics 11(4) (2021), 1050 – 1060.
L. Debnath and D. Bhatta, Integral Transforms and Their Applications, 3rd edition, CRC Press, Boca Raton (2015).
B. A. Forouzan, Introduction to Cryptography and Network Security, 2nd edition, McGraw-Hill Higher Education, Boston (2010).
A. P. Hiwarekar, Encryption-decryption using laplace transforms, Asian Journal of Mathematics and Computers 12 (2016), 201 – 209.
A. E. Idowu, A. Saheed, O. R. Adekola and F. E. Omofa, An application of integral transform based method in cryptograph, Asian Journal of Pure and Applied Mathematics 3 (2021), 13 – 18.
S. S. Jadhav and A. P. Hiwarekar, New method for cryptography using Laplace-Elzaki transform, Psychology and Education 58(1) (2021), 1 – 6.
A. Kahate, Cryptography and Network Security, 3rd edition, Tata McGraw-Hill, India, (2008).
G. N. Lakshmi, B. R. Kumar and A. C. Shekhar, A cryptographic scheme of Laplace transforms, International Journal of Mathematical Archive 2(12) (2011), 2515 – 2519.
B. Ni, R. Qazi, S. U. Rehman and G. Farid, Some graph-based encryption schemes, Journal of Mathematics 2021 (2021), Article ID 6614172, 8 pages, DOI: 10.1155/2021/6614172.
B. S. S. Raj and V. Sridhar, Identity based cryptography using matrices, Wireless Personal Communications 120 (2021), 1637 – 1657, DOI: 10.1007/s11277-021-08526-9.
D. R. Stinson, Cryptography: Theory and Practice, 3rd edition, Chapman and Hall/CRC, New York, 616 pages (2005), DOI: 10.1201/9781420057133.
L. Vinothkumar and V. Balaji, Encryption and decryption technique using matrix theory, Journal of Computational Mathematica 3(2) (2019), 1 – 7, DOI: 10.26524/cm49.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a CCAL that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.