SlideShare a Scribd company logo
1 of 5
Download to read offline
A.P. Hiwarekar Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 4, ( Part -5) April 2015, pp.102-106
www.ijera.com 102 | P a g e
Cryptography Using Laplace Transform
A.P. Hiwarekar
Department of Mathematics Vidya Pratishthan’s College of Engineering Baramati (University of Pune)
Vidyanagari, Bhigwan Road, Baramati, Dist.Pune, Maharashtra, India
Abstract
In this paper we present a new iterative method for cryptography, in which we apply Laplace transform of
suitable function for encrypting the plain text and we apply corresponding inverse Laplace transform for
decryption. Finally we developed the results in the generalized form. We also obtained the corresponding
encryption algorithm for this method.
Keywords: Cryptography, Data encryption, Applications to coding, coding theory and cryptography,
Algebraic coding theory; cryptography, Laplace Transforms.
I. INTRODUCTION
When we send a message to someone, we always
suspect that someone else will interpret it and read it
or modify it before re-sending. There is always a
desire to know about a secret message being sent or
received between two parties with or without any
personal, financial or political gains. It is no wonder
that to have the desire to send a message to someone
so that nobody else can interpret it. Thus information
security has become a very critical aspect of modern
computing system. Information security is mostly
achieved through the use of cryptography.
Various techniques for cryptography are found in
literature [1], [2], [3], [4], [12], [17], [18].
Mathematical technique using matrices for the same
are found in Overbey, Traves and Wojdylo, [14];
Saeednia, [16]. In Naga Lakshmi, Ravi Kumar and
Chandra Sekhar, [6]; Hiwarekar, [8], [9], [10] and
[11]; they encrypt a string by using series expansion
of ( )f t and its Laplace transform.
II. DEFINITIONS AND STANDARD
RESULTS
Definition 2.1.: Plain text signifies a message that
can be understood by the sender, the recipient and
also by anyone else who gets an access to that
message.
Definition 2.2.: When plain text message is codified
using any suitable scheme, the resulting message is
called as cipher text.
Definition 2.3.: Encryption transforms a plain text
message into cipher text, whereas decryption
transforms a cipher text message back into plain text.
Every encryption and decryption process has two
aspects: the algorithm and the key. The key is used
for encryption and decryption that makes the process
of cryptography secure. Here we require following
results.
2.1. The Laplace Transform: If ( )f t is a function
defined for all positive values of ,t then the Laplace
Transform of ( )f t is defined as
0
{ ( )} ( ) ( ) ,st
L f t F s e f t dt


   (2.1)
provided that the integral exists. Here the parameter
s is a real or complex number. The corresponding
inverse Laplace transform is
1
{ ( )} ( ),L F s f t

[5, 13, 15].
2.2. Theorem: Laplace transform is a linear
transform. That is, if
1 1 2 2{ ( )} ( ), { ( )} ( ), { ( )} ( ),n nL f t F s L f t F s L f t F s   (2.2)
then
     1 1 2 2 1 1 2 2{ ( ) ( ) ( )} ,n n n nL c f t c f t c f t c F s c F s c F s      
(2.3)
where 1 2, , , nc c c are constants, [5, 13, 15].
2.3. Some Standard Results of Laplace Transform:
In this paper we are assuming that all the considered
functions are such that their Laplace transform exists.
We are also assuming that N be the set of natural
numbers. Here we require following standard results
of Laplace transform
1. 1
2 2 2 2
{cosh } , { } cosh .
s s
L kt L kt
s k s k

 
 
(2.4)
2. 1
1 1
! !
{ } , { } , .n n
n n
n n
L t L t n N
s s

 
  
(2.5)
3.
       1
{ } , { } ,
n n
n nd d
L t f t F s L F s t f t
ds ds
    
    
   
(2.6)
[5, 13, 15].
RESEARCH ARTICLE OPEN ACCESS
A.P. Hiwarekar Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 4, ( Part -5) April 2015, pp.102-106
www.ijera.com 103 | P a g e
III. MAIN RESULTS
3.1 Encryption
We consider standard expansion
 
2
2 2 4 4 6 6 2 2
2 ! 2 !
0
cosh 1 ,
2! 4! 6!
i
i i
i i
i
rtr t r t r t r t
rt


           
(3.1)
where r N is a constant, and
2 4 4 6 6 8 2 2 2
2 2
2 !
2 2 2
2 !
0
2 2 2 2
cosh 2
2! 4! 6!
2
.
i i
i
i i
i
i
t t t t
t t t
t



       
 
  
(3.2)
We allocated 0 to A and 1 to B then Z will be 25.
Let given message called plain text be ‘FRUITS’, it is
equivalent to
5 17 20 8 19 18.
Let us assume that
0,0 1,0 2,0 3,0 4,0 5,0 ,05, 17, = 20, = 8, = 19, = 18, = 0 for n 6.nG G G G G G G  
Writing these numbers as a coefficients of
2
cosh 2 ,t t and assuming 2
( ) cosh 2 ,f t Gt t we
get
2 2 4 4 6 6 8 8 10 10
2
0,0 1,0 2,0 3,0 4,0 5,0
2 2 2 2 2
( ) [ ]
2! 4! 6! 8! 10!
t t t t t
f t t G G G G G G     
2 2 2 2 2 4 4 6 6 8 8 10 10 12
,0
2 !
0
2 2 2 2 2 2
5 17 20 8 19 18 .
0! 2! 4! 6! 8! 10!
i i
i
i
i
t G t t t t t t


      
(3.3)
Taking Laplace transform on both sides of (3.3), we
have
2
3 5 7 9 11 13
10 816 9600 28672 437760 2433024
{ ( )} { cosh 2 } + + + + .L f t L Gt t
s s s s s s
  
(3.4)
Adding 10p  to the resultant values
10 816 9600 28672 437760 2433024
and then adjusting it to mod 26 that is
20 20 mod 26, 826 20mod 26, 9610 16 mod 26,
28682 4 mod 26, 437770 8mod 26, 2433034 6 mod 26.
  
  
Sender sends the values
0 31 369 1103 16837 93578
as a key. Assuming
0,1 1,1 2,1 3,1 4,1 5,1
,1
G = 20, G = 20, = 16, = 4, = 8 = 6,
= 0 for n 6.n
G G G G
G 
The given plain text gets converted to cipher text
20 20 16 4 8 6.
Here message ‘FRUITS’ gets converted to
‘UUQEIG’. These results are included in the
following
Theorem 3.1: The given plain text in terms of
,0 , 1, 2,3, ,iG i   under Laplace transform of
2
cosh 2 ,Gt t (that is by writing them as a
coefficients of 2
cosh 2 ,t t and then taking the
Laplace transform) can be converted to cipher text
  2
,1 ,0
,1 ,1
(2 2 1 2 2 )mod 26
26 , 0,1,2,3, ,
i
i i
i i
G i i G p
q k for i
   
   
(3.5)
where,
  2 1
,1 ,02 2 1 2 2 , 0,1,2,3, , , 0 25,i
i iq i i G p i p N p
       
(3.6)
and a key
,1 ,1
,1 0,1, 2,3,
26
i i
i
q G
k for i

   .
(3.7)
Now we apply the same operation again on the
output of the resulting cipher text obtained in the
Theorem 3.1 and obtain its new form which is
included in the following theorem.
Theorem 3.2: The given plain text in terms of
,1, 1, 2,3, ,iG i   under Laplace
transform of 2
,1 cosh 2 ,iG t t (that is by writing
them as a coefficients of 2
cosh 2t t and then
taking the Laplace transform) can be converted to
cipher text
  2
,2 ,1 ,2 ,2( 2 2 1 2 2 )mod26 26 , 0,1,2,3, ,i
i i i iG G i i p q k i       
(3.8)
where,
  2
,2 ,1( 2 2 1 2 2 ), 0,1,2,3, , , 0 25,i
i iq G i i p i p N p       
(3.9)
and a key
,2 ,2
,2 , 0,1, 2, 3, ,
26
i i
i
q G
k i

  
. (3.10)
Now we apply such operations successively j
times on the given plain text and obtain its new form
as cipher text. This iterative method is included in the
following theorem.
Theorem 3.3: The given plain text in terms of
,0 , 1, 2,3, ,iG i   under Laplace transform
of 2
,0 cosh 2 ,iG t t successively j times (that is by
writing them as a coefficients of 2
cosh 2 ,t t
and then taking the Laplace transform successively)
can be converted to cipher text
  2 1
, , 1 , ,( 2 2 1 2 2 ) mod26 26 , , 0,1,2,3, ,i
i j i j i j i jG G i i p q k i j
       
(3.11)
where
  2
, , 1( 2 2 1 2 2 ), , 0,1,2,3, , , 0 25,i
i j i jq G i i p i j p N p       
(3.12)
and a key
, ,
, , , 0,1, 2,3, ,
26
i j i j
i j
q G
k i j

   (3.13)
A.P. Hiwarekar Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 4, ( Part -5) April 2015, pp.102-106
www.ijera.com 104 | P a g e
Remark 3.1: Theorem 3.1 is a special case of
Theorem 3.3 with 1j  and Theorem 3.2
with 2j  .
Remark 3.2: Results in [10], Hiwarekar A.P are
generalized here and are special cases of Theorem 3.3
with 1j  and with 0.p 
3.2. Generalization
The generalization of the results in section 3 can
be obtained by considering more general function
given by ( ) cosh , ,l .l
f t Gt rt r N  Using the
procedure discussed in section 3, we can convert the
given message ,0iG to ,1 ,iG
where
    2
,1 ,0( 2 1 2 2 2 ),
, 0,1,2, ,
i
i iq G r i i i l p
i l
    



(3.14)
with key
,1 ,1
,1 , 0,1,2,3, .
26
i i
i
q G
k i

   (3.15)
Hence we have following generalized theorem
Theorem 3.4: The given plain text in terms of
,0 , 1,2,3, ,iG i   under Laplace transform of
,0 cosh ,l
iG t rt (that is by writing them as a
coefficients of cosh ,l
t rt and then taking the
Laplace transform) can be converted to cipher text
  
 
2
,1 .0
,1 ,1
( 2 1 2 2
2 ) mod 26
26 , , 0,1, 2,3, ,
i
i i
i i
G G r i i
i l p
q k i l
  
 
  


(3.16)
with ,1iq and ,1ik are given by (3.14) and (3.15)
respectively.
Remark 4.1: Theorem 3.3 is a special case of theorem
3.4 with 2, 2.l r 
Now we apply above operations successively j
times on the output obtained in the last step on the
cipher text and obtain new cipher text this is included
in the following new theorem.
Theorem 3.5: The given plain text in terms of
,0 , 1,2,3, ,iG i   under Laplace transform of
,0 cosh ,l
iG t rt successively j times (that is by
writing them as a coefficients of cosh ,l
t rt and
then taking the Laplace transform successively) can
be converted to cipher text
    2
, , 1
, ,
( 2 1 2 2 2 )mod 26
26 , , , 0,1,2 ,,3,
i
i j i j
i j i j
G G r i i i l p
q k i j l
    
  


(3.17)
and
    2
, , 1( 2 1 2 2 2 ), , , 0,1,2,3, ,i
i j i jq G r i i i l p i j l      
(3.18)
and key
, ,
, , , 0,1,2,3, ,
26
i j i j
i j
q G
k i j

   . (3.19)
Remark 3.2: Theorem 3.4 is a special case of
Theorem 3.5 with 1.j  Hence all Theorems 3.1 to
3.4 follows from Theorem 3.5.
IV. DECRYPTION
For the decryption of the received cipher text we
proceed exactly in the reverse direction using inverse
Laplace transform. The method is as follows.
Suppose we have received message as ‘UUQEIG’
which is equivalent to
20 20 16 4 8 6.
Let us assume that
0,1 1,1 2,1 3,1 4,1 5,1
,1
G = 20, G = 20, = 16, = 4, = 8 = 6,
= 0 for n 6.n
G G G G
G 
Using given key ,0 , 0,1,2,3,ik i   as
0 31 369 1103 16837 93578
and 10,p  assuming
,1 ,1 ,126 , 0,1, 2,3, .i i iq G k p i     . (4.1)
We consider
 
2
2 2
3 5 7 9 11 13
,1
2 3
0
2
10 816 9600 28672 437760 2433024
+ + + +
.
n
i
i
i
d s
G
ds s
s s s s s s
q
s 

 
 
 
 
 
(4.2)
Taking inverse Laplace transform we get
2
2 2 2
,0
2 !
0
2 2 4 4 6 6 8 8 10 10 12
( ) cosh 2
2
2 2 2 2 2
5 17 20 8 19 18 .
0! 2! 4! 6! 8! 10!
i i
i
i
i
f t Gt t
t G
t t t t t t




     

2 2 4 4 6 6
2
0,0 1,0 2,0 3,0
8 8 10 10
4,0 5,0
2 2 2
[
2! 4! 6!
2 2
]
8! 10!
t t t
t G G G G
t t
G G
   
 
(4.3)
Here we have
0,0 1,0 2,0 3,0 4,0 5,0
,0
5, 17, = 20, = 8, = 19, = 18,
= 0 for n 6.n
G G G G G G
G
 

A.P. Hiwarekar Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 4, ( Part -5) April 2015, pp.102-106
www.ijera.com 105 | P a g e
Here message
5 17 20 8 19 18. is
equivalent to ‘FRUITS’. Thus ‘UUQEIG’ under
inverse Laplace transform gets converted to
‘FRUITS’. Hence we have following decryption
theorem
Theorem 4.1: The given cipher text in terms of
,1, 1,2,3, ,iG i   with a given key
,0 , 0,1,2,3,ik i   can be converted to plain text
,0iG under the inverse Laplace transform of
 
2
,0
2 32 2
0
,
2
n
i
i
i
qd s
G
ds ss


 
  
 
 (4.4)
where
  
,0 ,1
,0 2
26
, 0,1,2,3, , , 0 25,
2 2 1 2 2
i i
i i
k G p
G i p N p
i i
 
    
 

(4.5)
and ,0 ,0 ,126 , 0,1, 2,3, .i i iq k G i    (4.6)
The generalized iterative theorem can be obtained on
the similar way which is included in the following
Theorem 4.2: The given cipher text in terms of
, , , 1,2,3 ,i jG i j   with a given key
, 1, , 1,2,3 ,i jk i j  
can be converted to plain text , 1i jG  under the
inverse Laplace transform of
 
2
, 1
2 32 2
0
,
2
n
i j
i
i
qd s
G
ds ss



 
  
 
 (4.7)
where
  
, 1 ,
, 1 2
26
, , 1,2,3, , , 0 25,
2 2 1 2 2
i j i j
i j i
k G p
G i j p N p
i i


 
    
 

(4.8)
and , , ,26 , , 1,2,3, ,i j i j i jq k G i j    (4.9)
Remark 4.1: Results in [6], G.Naga Lakshmi, B.
Ravi Kumar and A. Chandra Sekhar are obtained by
considering Laplace transform
t
te and are
generalized in Hiwarekar A.P. [8], [9].
The method developed in this paper can be used
in the form of following algorithm.
V. ENCRYPTION ALGORITHM
1) Treat every letter in the plain text message as a
number so that 0; 1; 2; , 25.A B C Z   
2) The plain text message ,0iG is organized as a
finite sequence of numbers, based on the above
conversion. Only consider ,0iG till the length of input
string, i.e. 1i  to 1.n 
3) Consider suitable function ( )f t as in Theorem
3.5, choose suitable values of , , , .l r j p Take
successive Laplace transform of ( )f t and get
formula (3.17) for encryption. Hence each character
in the input string converts to new position , j.iG
4) Key values ,jiK for every character can be
obtained by equation (3.19) using (3.18).
5) Send ,j 1iG  and ,jiK as well as , , ,l r j p to the
receiver.
On similar way we can also obtain decryption
algorithm.
5.1. Illustrative Examples
Using results obtained in Theorem 3.3, if we
have original message ‘FRUITS’, then it gets
converted to
1. ‘WCUMUW’ for
2, 3, 4, 10,l r j p   
2. ‘LRNVLV’ for
2, 2, 3, 7,l r j p   
3. ‘GQCIIG’ for 3, 4, 5, 6,l r j p   
4. ‘WUYIME’ for
3, 5, 6, 4,l r j p   
5. ‘AUOKKE’ for
3, 5, 2, 4.l r j p   
5.2 Implementation Strategies
The main advantage of this algorithm is for same
input alphabets we can get different output alphabets.
We just need to change values of l or r or j or p or
all of them (in theorem 3.3). Algorithm may prevent
different attacks on the symmetric encryption such as
cipher text only, known plaintext, chosen plaintext,
chosen cipher text, chosen text. Moreover we can
divide the document into blocks of four to six
alphabets. Apply Encryption on these blocks in
parallel and generate cipher text as well as the keys
respectively. If we consider encryption of one
complete document then we can choose different
values of ‘r’ (in Theorem 3.5) for different blocks.
For each block chose different value of r so that by
any way attacker cracked one block he will not be
able to crack other blocks. We can also apply iterative
method in some cases. This will resist all types of
attacks mentioned earlier. For Brute Force attack
large amount of calculations will be needed as
attacker doesn’t know the algorithm as well as we are
adding extra layer of security by using variable values
of l or r or j or p or all of them at a time (in
Theorem 3.5). Other aspect of algorithm is key length
it can be considered as advantage in some
applications or disadvantage in case of data length
limited applications.
A.P. Hiwarekar Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 4, ( Part -5) April 2015, pp.102-106
www.ijera.com 106 | P a g e
VI. DISCUSSION AND CONCLUDING
REMARKS
1. Many sectors such as banking and other financial
institutions are adopting e-services and
improving their internet services. However, the
e-service requirements are also opening up new
opportunity to commit financial fraud. Internet
banking fraud is one of the most serious
electronic crimes and mostly committed by
unauthorized users. The new method of key
generation scheme developed in this paper may
be used for a fraud prevention mechanism.
2. In the proposed work we develop a new
cryptographic scheme using Laplace transforms
and the key is the number of multiples of mod n.
Therefore it is very difficult for an eyedropper to
trace the key by any attack. The results in section
3 provide as many transformations as per the
requirements which is the most useful factor for
changing key.
3. The similar results can be obtained by using
Laplace transform of other suitable function.
Hence extension of this work is possible.
Moreover the entire document can be encrypted
by considering block ciphers of small sizes.
4. For computer network security random
number generation is a prime important task and
also it is very essential in constructing keys for
cryptographic algorithm. Method used in this
paper can be useful for random number
generation.
5. To reduce the crypt-analysis attack risk, a
dynamic key theory plays important role, the
method presented in this paper is useful in such
situations.
ACKNOWLEDGEMENTS
Author is thankful to Principal Dr. S. B.
Deosarkar and Vidya Pratishthan's College of
Engineering, Baramati, Dist. Pune, Maharashtra,
India, for the support to this work.
REFERENCES
[1] Alexander Stanoyevitch, Introduction to
cyrptography with mathematical foundations
and computer implementations, CRC Press,
(2002).
[2] Barr T.H., Invitation to Cryptography,
Prentice Hall, (2002).
[3] Blakley G.R., Twenty years of Cryptography
in the open literature, Security and Privacy
1999, Proceedings of the IEEE Symposium,
9-12, (May1999).
[4] Eric C., Ronald K., James W.C., Netwark
SecurityBible Second edn.,Wiley India
pub.(2009).
[5] Erwin Kreyszing, Advanced Engineering
Mathematics, John Wiley and Sons
Inc.(1999).
[6] G.Naga Lakshmi, B.Ravi Kumar and
A.Chandra Sekhar, A cryptographic scheme
of Laplace transforms, International Journal
of Mathematical Archive-2, 2515-2519,
(2011).
[7] Grewal B.S., Higher Engineering
Mathematics, Khanna Pub., Delhi, (2005).
[8] Hiwarekar A.P., A new method of
cryptography using Laplace transform,
International Journal of Mathematical
Archive, 3(3), 1193-1197, (2012).
[9] Hiwarekar A.P., A new method of
cryptography using Laplace transform of
hyperbolic functions, International Journal
of Mathematical Archive, 4(2), 208-213,
(2013).
[10] Hiwarekar A.P., Application of Laplace
Transform for Cryptographic Scheme,
proceeding of World Congress on
Engineering Vol.II, LNCS, 95-100, (2013).
[11] Hiwarekar A.P., New Mathematical
Modeling for Cryptography, Journal of
Information Assurance and Security, MIR
Lab USA, Vol. 9, 027-033, (2014).
[12] Johannes A. Buchmann, Introduction to
Cryptography, Fourth Edn., Indian Reprint,
Springer, (2009).
[13] Lokenath Debnath, Dambaru Bhatta, Integrl
Transforms and Their Applications,
Chapman and Hall/CRC, First Indian edn.
(2010).
[14] Overbey J., Traves W.and Wojdylo J., On
the Keyspace of the Hill Cipher,
Cryptologia, 29, 59-72, (January 2005).
[15] Ramana B.V., Higher Engineering
Mathematics, Tata McGraw-Hills, (2007).
[16] Saeednia S., How to Make the Hill Cipher
Secure,Cryptologia, 24, 353-360, (October
2000).
[17] Stallings W., Cryptography and network
security, 4th edition, Prentice Hall, (2005).
[18] Stallings W., Network security essentials:
Applications and standards, first edition,
Pearson Education, Asia, (2001).

More Related Content

What's hot

Basics in algorithms and data structure
Basics in algorithms and data structure Basics in algorithms and data structure
Basics in algorithms and data structure Eman magdy
 
Crack Wep Wifi Under100seconds
Crack Wep Wifi Under100secondsCrack Wep Wifi Under100seconds
Crack Wep Wifi Under100secondsmvde3000
 
Improving the initial values of VFactor suitable for balanced modulus
Improving the initial values of VFactor suitable for  balanced modulus Improving the initial values of VFactor suitable for  balanced modulus
Improving the initial values of VFactor suitable for balanced modulus IJECEIAES
 
Some Continued Mock Theta Functions from Ramanujan’s Lost Notebook (IV)
Some Continued Mock Theta Functions from Ramanujan’s Lost Notebook (IV)Some Continued Mock Theta Functions from Ramanujan’s Lost Notebook (IV)
Some Continued Mock Theta Functions from Ramanujan’s Lost Notebook (IV)paperpublications3
 
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersMultiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersIJNSA Journal
 
Skiena algorithm 2007 lecture15 backtracing
Skiena algorithm 2007 lecture15 backtracingSkiena algorithm 2007 lecture15 backtracing
Skiena algorithm 2007 lecture15 backtracingzukun
 
A critical reassessment of
A critical reassessment ofA critical reassessment of
A critical reassessment ofijcisjournal
 
A Novel Design For Generating Dynamic Length Message Digest To Ensure Integri...
A Novel Design For Generating Dynamic Length Message Digest To Ensure Integri...A Novel Design For Generating Dynamic Length Message Digest To Ensure Integri...
A Novel Design For Generating Dynamic Length Message Digest To Ensure Integri...IRJET Journal
 
Design And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption AlgorithmDesign And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption AlgorithmIJERA Editor
 
Narrow bicliques cryptanalysisoffullidea
Narrow bicliques cryptanalysisoffullideaNarrow bicliques cryptanalysisoffullidea
Narrow bicliques cryptanalysisoffullideaRifad Mohamed
 
Common fixed point of weakly compatible
Common fixed point of weakly compatibleCommon fixed point of weakly compatible
Common fixed point of weakly compatibleAlexander Decker
 
Research on 4-dimensional Systems without Equilibria with Application
Research on 4-dimensional Systems without Equilibria with ApplicationResearch on 4-dimensional Systems without Equilibria with Application
Research on 4-dimensional Systems without Equilibria with ApplicationTELKOMNIKA JOURNAL
 
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDEDFACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDEDZac Darcy
 
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution MethodNovel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution MethodIDES Editor
 
NEW NON-COPRIME CONJUGATE-PAIR BINARY TO RNS MULTI-MODULI FOR RESIDUE NUMBER ...
NEW NON-COPRIME CONJUGATE-PAIR BINARY TO RNS MULTI-MODULI FOR RESIDUE NUMBER ...NEW NON-COPRIME CONJUGATE-PAIR BINARY TO RNS MULTI-MODULI FOR RESIDUE NUMBER ...
NEW NON-COPRIME CONJUGATE-PAIR BINARY TO RNS MULTI-MODULI FOR RESIDUE NUMBER ...csandit
 
Analysis and improvement of pairing free certificate-less two-party authentic...
Analysis and improvement of pairing free certificate-less two-party authentic...Analysis and improvement of pairing free certificate-less two-party authentic...
Analysis and improvement of pairing free certificate-less two-party authentic...ijsptm
 

What's hot (19)

Basics in algorithms and data structure
Basics in algorithms and data structure Basics in algorithms and data structure
Basics in algorithms and data structure
 
Crack Wep Wifi Under100seconds
Crack Wep Wifi Under100secondsCrack Wep Wifi Under100seconds
Crack Wep Wifi Under100seconds
 
Improving the initial values of VFactor suitable for balanced modulus
Improving the initial values of VFactor suitable for  balanced modulus Improving the initial values of VFactor suitable for  balanced modulus
Improving the initial values of VFactor suitable for balanced modulus
 
Some Continued Mock Theta Functions from Ramanujan’s Lost Notebook (IV)
Some Continued Mock Theta Functions from Ramanujan’s Lost Notebook (IV)Some Continued Mock Theta Functions from Ramanujan’s Lost Notebook (IV)
Some Continued Mock Theta Functions from Ramanujan’s Lost Notebook (IV)
 
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersMultiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
 
Skiena algorithm 2007 lecture15 backtracing
Skiena algorithm 2007 lecture15 backtracingSkiena algorithm 2007 lecture15 backtracing
Skiena algorithm 2007 lecture15 backtracing
 
A critical reassessment of
A critical reassessment ofA critical reassessment of
A critical reassessment of
 
A Novel Design For Generating Dynamic Length Message Digest To Ensure Integri...
A Novel Design For Generating Dynamic Length Message Digest To Ensure Integri...A Novel Design For Generating Dynamic Length Message Digest To Ensure Integri...
A Novel Design For Generating Dynamic Length Message Digest To Ensure Integri...
 
Design And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption AlgorithmDesign And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption Algorithm
 
Js2517181724
Js2517181724Js2517181724
Js2517181724
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Narrow bicliques cryptanalysisoffullidea
Narrow bicliques cryptanalysisoffullideaNarrow bicliques cryptanalysisoffullidea
Narrow bicliques cryptanalysisoffullidea
 
Common fixed point of weakly compatible
Common fixed point of weakly compatibleCommon fixed point of weakly compatible
Common fixed point of weakly compatible
 
Research on 4-dimensional Systems without Equilibria with Application
Research on 4-dimensional Systems without Equilibria with ApplicationResearch on 4-dimensional Systems without Equilibria with Application
Research on 4-dimensional Systems without Equilibria with Application
 
Algorithms Question bank
Algorithms Question bankAlgorithms Question bank
Algorithms Question bank
 
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDEDFACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED
 
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution MethodNovel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
 
NEW NON-COPRIME CONJUGATE-PAIR BINARY TO RNS MULTI-MODULI FOR RESIDUE NUMBER ...
NEW NON-COPRIME CONJUGATE-PAIR BINARY TO RNS MULTI-MODULI FOR RESIDUE NUMBER ...NEW NON-COPRIME CONJUGATE-PAIR BINARY TO RNS MULTI-MODULI FOR RESIDUE NUMBER ...
NEW NON-COPRIME CONJUGATE-PAIR BINARY TO RNS MULTI-MODULI FOR RESIDUE NUMBER ...
 
Analysis and improvement of pairing free certificate-less two-party authentic...
Analysis and improvement of pairing free certificate-less two-party authentic...Analysis and improvement of pairing free certificate-less two-party authentic...
Analysis and improvement of pairing free certificate-less two-party authentic...
 

Viewers also liked (20)

Aj35198205
Aj35198205Aj35198205
Aj35198205
 
Ks2518741883
Ks2518741883Ks2518741883
Ks2518741883
 
Cw24640644
Cw24640644Cw24640644
Cw24640644
 
E41013142
E41013142E41013142
E41013142
 
Ag26204209
Ag26204209Ag26204209
Ag26204209
 
Of3424832487
Of3424832487Of3424832487
Of3424832487
 
Kp3618151819
Kp3618151819Kp3618151819
Kp3618151819
 
Hu3513551364
Hu3513551364Hu3513551364
Hu3513551364
 
Jc3515691575
Jc3515691575Jc3515691575
Jc3515691575
 
Ba36317323
Ba36317323Ba36317323
Ba36317323
 
Oi3425032505
Oi3425032505Oi3425032505
Oi3425032505
 
Ky3419651971
Ky3419651971Ky3419651971
Ky3419651971
 
Lf2519471952
Lf2519471952Lf2519471952
Lf2519471952
 
Ez24947953
Ez24947953Ez24947953
Ez24947953
 
Bo24437446
Bo24437446Bo24437446
Bo24437446
 
Dq35655671
Dq35655671Dq35655671
Dq35655671
 
Hy3513861391
Hy3513861391Hy3513861391
Hy3513861391
 
Jx3517171726
Jx3517171726Jx3517171726
Jx3517171726
 
Be24365370
Be24365370Be24365370
Be24365370
 
Nq2422332236
Nq2422332236Nq2422332236
Nq2422332236
 

Similar to Cryptography Using Laplace Transform

A Mathematical Model to Solve Nonlinear Initial and Boundary Value Problems b...
A Mathematical Model to Solve Nonlinear Initial and Boundary Value Problems b...A Mathematical Model to Solve Nonlinear Initial and Boundary Value Problems b...
A Mathematical Model to Solve Nonlinear Initial and Boundary Value Problems b...IJERA Editor
 
Cryptographic Technique Used Lower and Upper Triangular Decomposition Method
Cryptographic Technique Used Lower and Upper Triangular Decomposition MethodCryptographic Technique Used Lower and Upper Triangular Decomposition Method
Cryptographic Technique Used Lower and Upper Triangular Decomposition MethodIJERA Editor
 
11.[8 17]numerical solution of fuzzy hybrid differential equation by third or...
11.[8 17]numerical solution of fuzzy hybrid differential equation by third or...11.[8 17]numerical solution of fuzzy hybrid differential equation by third or...
11.[8 17]numerical solution of fuzzy hybrid differential equation by third or...Alexander Decker
 
11.numerical solution of fuzzy hybrid differential equation by third order ru...
11.numerical solution of fuzzy hybrid differential equation by third order ru...11.numerical solution of fuzzy hybrid differential equation by third order ru...
11.numerical solution of fuzzy hybrid differential equation by third order ru...Alexander Decker
 
Numerical solution of fuzzy hybrid differential equation by third order runge...
Numerical solution of fuzzy hybrid differential equation by third order runge...Numerical solution of fuzzy hybrid differential equation by third order runge...
Numerical solution of fuzzy hybrid differential equation by third order runge...Alexander Decker
 
Codes from the cyclic group of order three
Codes from the cyclic group of order threeCodes from the cyclic group of order three
Codes from the cyclic group of order threeEditor Jacotech
 
Large Semi Primes Factorization with Its Implications to RSA.pdf
Large Semi Primes Factorization with Its Implications to RSA.pdfLarge Semi Primes Factorization with Its Implications to RSA.pdf
Large Semi Primes Factorization with Its Implications to RSA.pdfDr. Richard Otieno
 
Local Model Checking Algorithm Based on Mu-calculus with Partial Orders
Local Model Checking Algorithm Based on Mu-calculus with Partial OrdersLocal Model Checking Algorithm Based on Mu-calculus with Partial Orders
Local Model Checking Algorithm Based on Mu-calculus with Partial OrdersTELKOMNIKA JOURNAL
 
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...Marisa Paryasto
 
The discrete quartic spline interpolation over non uniform mesh
The discrete  quartic spline interpolation over non uniform meshThe discrete  quartic spline interpolation over non uniform mesh
The discrete quartic spline interpolation over non uniform meshAlexander Decker
 
optimal solution method of integro-differential equaitions under laplace tran...
optimal solution method of integro-differential equaitions under laplace tran...optimal solution method of integro-differential equaitions under laplace tran...
optimal solution method of integro-differential equaitions under laplace tran...INFOGAIN PUBLICATION
 
Master’s theorem Derivative Analysis
Master’s theorem Derivative AnalysisMaster’s theorem Derivative Analysis
Master’s theorem Derivative AnalysisIRJET Journal
 
Specifying and Implementing SNOW3G with Cryptol
Specifying and Implementing SNOW3G with CryptolSpecifying and Implementing SNOW3G with Cryptol
Specifying and Implementing SNOW3G with CryptolUlisses Costa
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...cscpconf
 
Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...
Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...
Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...IJERA Editor
 
Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...
Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...
Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...IJERA Editor
 

Similar to Cryptography Using Laplace Transform (20)

A Mathematical Model to Solve Nonlinear Initial and Boundary Value Problems b...
A Mathematical Model to Solve Nonlinear Initial and Boundary Value Problems b...A Mathematical Model to Solve Nonlinear Initial and Boundary Value Problems b...
A Mathematical Model to Solve Nonlinear Initial and Boundary Value Problems b...
 
Cryptographic Technique Used Lower and Upper Triangular Decomposition Method
Cryptographic Technique Used Lower and Upper Triangular Decomposition MethodCryptographic Technique Used Lower and Upper Triangular Decomposition Method
Cryptographic Technique Used Lower and Upper Triangular Decomposition Method
 
PRINCEPPTFINAL.pptx
PRINCEPPTFINAL.pptxPRINCEPPTFINAL.pptx
PRINCEPPTFINAL.pptx
 
11.[8 17]numerical solution of fuzzy hybrid differential equation by third or...
11.[8 17]numerical solution of fuzzy hybrid differential equation by third or...11.[8 17]numerical solution of fuzzy hybrid differential equation by third or...
11.[8 17]numerical solution of fuzzy hybrid differential equation by third or...
 
11.numerical solution of fuzzy hybrid differential equation by third order ru...
11.numerical solution of fuzzy hybrid differential equation by third order ru...11.numerical solution of fuzzy hybrid differential equation by third order ru...
11.numerical solution of fuzzy hybrid differential equation by third order ru...
 
Numerical solution of fuzzy hybrid differential equation by third order runge...
Numerical solution of fuzzy hybrid differential equation by third order runge...Numerical solution of fuzzy hybrid differential equation by third order runge...
Numerical solution of fuzzy hybrid differential equation by third order runge...
 
Codes from the cyclic group of order three
Codes from the cyclic group of order threeCodes from the cyclic group of order three
Codes from the cyclic group of order three
 
Large Semi Primes Factorization with Its Implications to RSA.pdf
Large Semi Primes Factorization with Its Implications to RSA.pdfLarge Semi Primes Factorization with Its Implications to RSA.pdf
Large Semi Primes Factorization with Its Implications to RSA.pdf
 
Local Model Checking Algorithm Based on Mu-calculus with Partial Orders
Local Model Checking Algorithm Based on Mu-calculus with Partial OrdersLocal Model Checking Algorithm Based on Mu-calculus with Partial Orders
Local Model Checking Algorithm Based on Mu-calculus with Partial Orders
 
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...
 
The discrete quartic spline interpolation over non uniform mesh
The discrete  quartic spline interpolation over non uniform meshThe discrete  quartic spline interpolation over non uniform mesh
The discrete quartic spline interpolation over non uniform mesh
 
optimal solution method of integro-differential equaitions under laplace tran...
optimal solution method of integro-differential equaitions under laplace tran...optimal solution method of integro-differential equaitions under laplace tran...
optimal solution method of integro-differential equaitions under laplace tran...
 
Master’s theorem Derivative Analysis
Master’s theorem Derivative AnalysisMaster’s theorem Derivative Analysis
Master’s theorem Derivative Analysis
 
D044042432
D044042432D044042432
D044042432
 
Specifying and Implementing SNOW3G with Cryptol
Specifying and Implementing SNOW3G with CryptolSpecifying and Implementing SNOW3G with Cryptol
Specifying and Implementing SNOW3G with Cryptol
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
 
Cy33602608
Cy33602608Cy33602608
Cy33602608
 
Cy33602608
Cy33602608Cy33602608
Cy33602608
 
Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...
Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...
Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...
 
Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...
Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...
Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...
 

Recently uploaded

Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxPurva Nikam
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 

Recently uploaded (20)

Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptx
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 

Cryptography Using Laplace Transform

  • 1. A.P. Hiwarekar Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 4, ( Part -5) April 2015, pp.102-106 www.ijera.com 102 | P a g e Cryptography Using Laplace Transform A.P. Hiwarekar Department of Mathematics Vidya Pratishthan’s College of Engineering Baramati (University of Pune) Vidyanagari, Bhigwan Road, Baramati, Dist.Pune, Maharashtra, India Abstract In this paper we present a new iterative method for cryptography, in which we apply Laplace transform of suitable function for encrypting the plain text and we apply corresponding inverse Laplace transform for decryption. Finally we developed the results in the generalized form. We also obtained the corresponding encryption algorithm for this method. Keywords: Cryptography, Data encryption, Applications to coding, coding theory and cryptography, Algebraic coding theory; cryptography, Laplace Transforms. I. INTRODUCTION When we send a message to someone, we always suspect that someone else will interpret it and read it or modify it before re-sending. There is always a desire to know about a secret message being sent or received between two parties with or without any personal, financial or political gains. It is no wonder that to have the desire to send a message to someone so that nobody else can interpret it. Thus information security has become a very critical aspect of modern computing system. Information security is mostly achieved through the use of cryptography. Various techniques for cryptography are found in literature [1], [2], [3], [4], [12], [17], [18]. Mathematical technique using matrices for the same are found in Overbey, Traves and Wojdylo, [14]; Saeednia, [16]. In Naga Lakshmi, Ravi Kumar and Chandra Sekhar, [6]; Hiwarekar, [8], [9], [10] and [11]; they encrypt a string by using series expansion of ( )f t and its Laplace transform. II. DEFINITIONS AND STANDARD RESULTS Definition 2.1.: Plain text signifies a message that can be understood by the sender, the recipient and also by anyone else who gets an access to that message. Definition 2.2.: When plain text message is codified using any suitable scheme, the resulting message is called as cipher text. Definition 2.3.: Encryption transforms a plain text message into cipher text, whereas decryption transforms a cipher text message back into plain text. Every encryption and decryption process has two aspects: the algorithm and the key. The key is used for encryption and decryption that makes the process of cryptography secure. Here we require following results. 2.1. The Laplace Transform: If ( )f t is a function defined for all positive values of ,t then the Laplace Transform of ( )f t is defined as 0 { ( )} ( ) ( ) ,st L f t F s e f t dt      (2.1) provided that the integral exists. Here the parameter s is a real or complex number. The corresponding inverse Laplace transform is 1 { ( )} ( ),L F s f t  [5, 13, 15]. 2.2. Theorem: Laplace transform is a linear transform. That is, if 1 1 2 2{ ( )} ( ), { ( )} ( ), { ( )} ( ),n nL f t F s L f t F s L f t F s   (2.2) then      1 1 2 2 1 1 2 2{ ( ) ( ) ( )} ,n n n nL c f t c f t c f t c F s c F s c F s       (2.3) where 1 2, , , nc c c are constants, [5, 13, 15]. 2.3. Some Standard Results of Laplace Transform: In this paper we are assuming that all the considered functions are such that their Laplace transform exists. We are also assuming that N be the set of natural numbers. Here we require following standard results of Laplace transform 1. 1 2 2 2 2 {cosh } , { } cosh . s s L kt L kt s k s k      (2.4) 2. 1 1 1 ! ! { } , { } , .n n n n n n L t L t n N s s       (2.5) 3.        1 { } , { } , n n n nd d L t f t F s L F s t f t ds ds               (2.6) [5, 13, 15]. RESEARCH ARTICLE OPEN ACCESS
  • 2. A.P. Hiwarekar Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 4, ( Part -5) April 2015, pp.102-106 www.ijera.com 103 | P a g e III. MAIN RESULTS 3.1 Encryption We consider standard expansion   2 2 2 4 4 6 6 2 2 2 ! 2 ! 0 cosh 1 , 2! 4! 6! i i i i i i rtr t r t r t r t rt               (3.1) where r N is a constant, and 2 4 4 6 6 8 2 2 2 2 2 2 ! 2 2 2 2 ! 0 2 2 2 2 cosh 2 2! 4! 6! 2 . i i i i i i i t t t t t t t t                 (3.2) We allocated 0 to A and 1 to B then Z will be 25. Let given message called plain text be ‘FRUITS’, it is equivalent to 5 17 20 8 19 18. Let us assume that 0,0 1,0 2,0 3,0 4,0 5,0 ,05, 17, = 20, = 8, = 19, = 18, = 0 for n 6.nG G G G G G G   Writing these numbers as a coefficients of 2 cosh 2 ,t t and assuming 2 ( ) cosh 2 ,f t Gt t we get 2 2 4 4 6 6 8 8 10 10 2 0,0 1,0 2,0 3,0 4,0 5,0 2 2 2 2 2 ( ) [ ] 2! 4! 6! 8! 10! t t t t t f t t G G G G G G      2 2 2 2 2 4 4 6 6 8 8 10 10 12 ,0 2 ! 0 2 2 2 2 2 2 5 17 20 8 19 18 . 0! 2! 4! 6! 8! 10! i i i i i t G t t t t t t          (3.3) Taking Laplace transform on both sides of (3.3), we have 2 3 5 7 9 11 13 10 816 9600 28672 437760 2433024 { ( )} { cosh 2 } + + + + .L f t L Gt t s s s s s s    (3.4) Adding 10p  to the resultant values 10 816 9600 28672 437760 2433024 and then adjusting it to mod 26 that is 20 20 mod 26, 826 20mod 26, 9610 16 mod 26, 28682 4 mod 26, 437770 8mod 26, 2433034 6 mod 26.       Sender sends the values 0 31 369 1103 16837 93578 as a key. Assuming 0,1 1,1 2,1 3,1 4,1 5,1 ,1 G = 20, G = 20, = 16, = 4, = 8 = 6, = 0 for n 6.n G G G G G  The given plain text gets converted to cipher text 20 20 16 4 8 6. Here message ‘FRUITS’ gets converted to ‘UUQEIG’. These results are included in the following Theorem 3.1: The given plain text in terms of ,0 , 1, 2,3, ,iG i   under Laplace transform of 2 cosh 2 ,Gt t (that is by writing them as a coefficients of 2 cosh 2 ,t t and then taking the Laplace transform) can be converted to cipher text   2 ,1 ,0 ,1 ,1 (2 2 1 2 2 )mod 26 26 , 0,1,2,3, , i i i i i G i i G p q k for i         (3.5) where,   2 1 ,1 ,02 2 1 2 2 , 0,1,2,3, , , 0 25,i i iq i i G p i p N p         (3.6) and a key ,1 ,1 ,1 0,1, 2,3, 26 i i i q G k for i     . (3.7) Now we apply the same operation again on the output of the resulting cipher text obtained in the Theorem 3.1 and obtain its new form which is included in the following theorem. Theorem 3.2: The given plain text in terms of ,1, 1, 2,3, ,iG i   under Laplace transform of 2 ,1 cosh 2 ,iG t t (that is by writing them as a coefficients of 2 cosh 2t t and then taking the Laplace transform) can be converted to cipher text   2 ,2 ,1 ,2 ,2( 2 2 1 2 2 )mod26 26 , 0,1,2,3, ,i i i i iG G i i p q k i        (3.8) where,   2 ,2 ,1( 2 2 1 2 2 ), 0,1,2,3, , , 0 25,i i iq G i i p i p N p        (3.9) and a key ,2 ,2 ,2 , 0,1, 2, 3, , 26 i i i q G k i     . (3.10) Now we apply such operations successively j times on the given plain text and obtain its new form as cipher text. This iterative method is included in the following theorem. Theorem 3.3: The given plain text in terms of ,0 , 1, 2,3, ,iG i   under Laplace transform of 2 ,0 cosh 2 ,iG t t successively j times (that is by writing them as a coefficients of 2 cosh 2 ,t t and then taking the Laplace transform successively) can be converted to cipher text   2 1 , , 1 , ,( 2 2 1 2 2 ) mod26 26 , , 0,1,2,3, ,i i j i j i j i jG G i i p q k i j         (3.11) where   2 , , 1( 2 2 1 2 2 ), , 0,1,2,3, , , 0 25,i i j i jq G i i p i j p N p        (3.12) and a key , , , , , 0,1, 2,3, , 26 i j i j i j q G k i j     (3.13)
  • 3. A.P. Hiwarekar Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 4, ( Part -5) April 2015, pp.102-106 www.ijera.com 104 | P a g e Remark 3.1: Theorem 3.1 is a special case of Theorem 3.3 with 1j  and Theorem 3.2 with 2j  . Remark 3.2: Results in [10], Hiwarekar A.P are generalized here and are special cases of Theorem 3.3 with 1j  and with 0.p  3.2. Generalization The generalization of the results in section 3 can be obtained by considering more general function given by ( ) cosh , ,l .l f t Gt rt r N  Using the procedure discussed in section 3, we can convert the given message ,0iG to ,1 ,iG where     2 ,1 ,0( 2 1 2 2 2 ), , 0,1,2, , i i iq G r i i i l p i l         (3.14) with key ,1 ,1 ,1 , 0,1,2,3, . 26 i i i q G k i     (3.15) Hence we have following generalized theorem Theorem 3.4: The given plain text in terms of ,0 , 1,2,3, ,iG i   under Laplace transform of ,0 cosh ,l iG t rt (that is by writing them as a coefficients of cosh ,l t rt and then taking the Laplace transform) can be converted to cipher text      2 ,1 .0 ,1 ,1 ( 2 1 2 2 2 ) mod 26 26 , , 0,1, 2,3, , i i i i i G G r i i i l p q k i l           (3.16) with ,1iq and ,1ik are given by (3.14) and (3.15) respectively. Remark 4.1: Theorem 3.3 is a special case of theorem 3.4 with 2, 2.l r  Now we apply above operations successively j times on the output obtained in the last step on the cipher text and obtain new cipher text this is included in the following new theorem. Theorem 3.5: The given plain text in terms of ,0 , 1,2,3, ,iG i   under Laplace transform of ,0 cosh ,l iG t rt successively j times (that is by writing them as a coefficients of cosh ,l t rt and then taking the Laplace transform successively) can be converted to cipher text     2 , , 1 , , ( 2 1 2 2 2 )mod 26 26 , , , 0,1,2 ,,3, i i j i j i j i j G G r i i i l p q k i j l           (3.17) and     2 , , 1( 2 1 2 2 2 ), , , 0,1,2,3, ,i i j i jq G r i i i l p i j l       (3.18) and key , , , , , 0,1,2,3, , 26 i j i j i j q G k i j     . (3.19) Remark 3.2: Theorem 3.4 is a special case of Theorem 3.5 with 1.j  Hence all Theorems 3.1 to 3.4 follows from Theorem 3.5. IV. DECRYPTION For the decryption of the received cipher text we proceed exactly in the reverse direction using inverse Laplace transform. The method is as follows. Suppose we have received message as ‘UUQEIG’ which is equivalent to 20 20 16 4 8 6. Let us assume that 0,1 1,1 2,1 3,1 4,1 5,1 ,1 G = 20, G = 20, = 16, = 4, = 8 = 6, = 0 for n 6.n G G G G G  Using given key ,0 , 0,1,2,3,ik i   as 0 31 369 1103 16837 93578 and 10,p  assuming ,1 ,1 ,126 , 0,1, 2,3, .i i iq G k p i     . (4.1) We consider   2 2 2 3 5 7 9 11 13 ,1 2 3 0 2 10 816 9600 28672 437760 2433024 + + + + . n i i i d s G ds s s s s s s s q s             (4.2) Taking inverse Laplace transform we get 2 2 2 2 ,0 2 ! 0 2 2 4 4 6 6 8 8 10 10 12 ( ) cosh 2 2 2 2 2 2 2 5 17 20 8 19 18 . 0! 2! 4! 6! 8! 10! i i i i i f t Gt t t G t t t t t t            2 2 4 4 6 6 2 0,0 1,0 2,0 3,0 8 8 10 10 4,0 5,0 2 2 2 [ 2! 4! 6! 2 2 ] 8! 10! t t t t G G G G t t G G       (4.3) Here we have 0,0 1,0 2,0 3,0 4,0 5,0 ,0 5, 17, = 20, = 8, = 19, = 18, = 0 for n 6.n G G G G G G G   
  • 4. A.P. Hiwarekar Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 4, ( Part -5) April 2015, pp.102-106 www.ijera.com 105 | P a g e Here message 5 17 20 8 19 18. is equivalent to ‘FRUITS’. Thus ‘UUQEIG’ under inverse Laplace transform gets converted to ‘FRUITS’. Hence we have following decryption theorem Theorem 4.1: The given cipher text in terms of ,1, 1,2,3, ,iG i   with a given key ,0 , 0,1,2,3,ik i   can be converted to plain text ,0iG under the inverse Laplace transform of   2 ,0 2 32 2 0 , 2 n i i i qd s G ds ss           (4.4) where    ,0 ,1 ,0 2 26 , 0,1,2,3, , , 0 25, 2 2 1 2 2 i i i i k G p G i p N p i i           (4.5) and ,0 ,0 ,126 , 0,1, 2,3, .i i iq k G i    (4.6) The generalized iterative theorem can be obtained on the similar way which is included in the following Theorem 4.2: The given cipher text in terms of , , , 1,2,3 ,i jG i j   with a given key , 1, , 1,2,3 ,i jk i j   can be converted to plain text , 1i jG  under the inverse Laplace transform of   2 , 1 2 32 2 0 , 2 n i j i i qd s G ds ss            (4.7) where    , 1 , , 1 2 26 , , 1,2,3, , , 0 25, 2 2 1 2 2 i j i j i j i k G p G i j p N p i i             (4.8) and , , ,26 , , 1,2,3, ,i j i j i jq k G i j    (4.9) Remark 4.1: Results in [6], G.Naga Lakshmi, B. Ravi Kumar and A. Chandra Sekhar are obtained by considering Laplace transform t te and are generalized in Hiwarekar A.P. [8], [9]. The method developed in this paper can be used in the form of following algorithm. V. ENCRYPTION ALGORITHM 1) Treat every letter in the plain text message as a number so that 0; 1; 2; , 25.A B C Z    2) The plain text message ,0iG is organized as a finite sequence of numbers, based on the above conversion. Only consider ,0iG till the length of input string, i.e. 1i  to 1.n  3) Consider suitable function ( )f t as in Theorem 3.5, choose suitable values of , , , .l r j p Take successive Laplace transform of ( )f t and get formula (3.17) for encryption. Hence each character in the input string converts to new position , j.iG 4) Key values ,jiK for every character can be obtained by equation (3.19) using (3.18). 5) Send ,j 1iG  and ,jiK as well as , , ,l r j p to the receiver. On similar way we can also obtain decryption algorithm. 5.1. Illustrative Examples Using results obtained in Theorem 3.3, if we have original message ‘FRUITS’, then it gets converted to 1. ‘WCUMUW’ for 2, 3, 4, 10,l r j p    2. ‘LRNVLV’ for 2, 2, 3, 7,l r j p    3. ‘GQCIIG’ for 3, 4, 5, 6,l r j p    4. ‘WUYIME’ for 3, 5, 6, 4,l r j p    5. ‘AUOKKE’ for 3, 5, 2, 4.l r j p    5.2 Implementation Strategies The main advantage of this algorithm is for same input alphabets we can get different output alphabets. We just need to change values of l or r or j or p or all of them (in theorem 3.3). Algorithm may prevent different attacks on the symmetric encryption such as cipher text only, known plaintext, chosen plaintext, chosen cipher text, chosen text. Moreover we can divide the document into blocks of four to six alphabets. Apply Encryption on these blocks in parallel and generate cipher text as well as the keys respectively. If we consider encryption of one complete document then we can choose different values of ‘r’ (in Theorem 3.5) for different blocks. For each block chose different value of r so that by any way attacker cracked one block he will not be able to crack other blocks. We can also apply iterative method in some cases. This will resist all types of attacks mentioned earlier. For Brute Force attack large amount of calculations will be needed as attacker doesn’t know the algorithm as well as we are adding extra layer of security by using variable values of l or r or j or p or all of them at a time (in Theorem 3.5). Other aspect of algorithm is key length it can be considered as advantage in some applications or disadvantage in case of data length limited applications.
  • 5. A.P. Hiwarekar Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 4, ( Part -5) April 2015, pp.102-106 www.ijera.com 106 | P a g e VI. DISCUSSION AND CONCLUDING REMARKS 1. Many sectors such as banking and other financial institutions are adopting e-services and improving their internet services. However, the e-service requirements are also opening up new opportunity to commit financial fraud. Internet banking fraud is one of the most serious electronic crimes and mostly committed by unauthorized users. The new method of key generation scheme developed in this paper may be used for a fraud prevention mechanism. 2. In the proposed work we develop a new cryptographic scheme using Laplace transforms and the key is the number of multiples of mod n. Therefore it is very difficult for an eyedropper to trace the key by any attack. The results in section 3 provide as many transformations as per the requirements which is the most useful factor for changing key. 3. The similar results can be obtained by using Laplace transform of other suitable function. Hence extension of this work is possible. Moreover the entire document can be encrypted by considering block ciphers of small sizes. 4. For computer network security random number generation is a prime important task and also it is very essential in constructing keys for cryptographic algorithm. Method used in this paper can be useful for random number generation. 5. To reduce the crypt-analysis attack risk, a dynamic key theory plays important role, the method presented in this paper is useful in such situations. ACKNOWLEDGEMENTS Author is thankful to Principal Dr. S. B. Deosarkar and Vidya Pratishthan's College of Engineering, Baramati, Dist. Pune, Maharashtra, India, for the support to this work. REFERENCES [1] Alexander Stanoyevitch, Introduction to cyrptography with mathematical foundations and computer implementations, CRC Press, (2002). [2] Barr T.H., Invitation to Cryptography, Prentice Hall, (2002). [3] Blakley G.R., Twenty years of Cryptography in the open literature, Security and Privacy 1999, Proceedings of the IEEE Symposium, 9-12, (May1999). [4] Eric C., Ronald K., James W.C., Netwark SecurityBible Second edn.,Wiley India pub.(2009). [5] Erwin Kreyszing, Advanced Engineering Mathematics, John Wiley and Sons Inc.(1999). [6] G.Naga Lakshmi, B.Ravi Kumar and A.Chandra Sekhar, A cryptographic scheme of Laplace transforms, International Journal of Mathematical Archive-2, 2515-2519, (2011). [7] Grewal B.S., Higher Engineering Mathematics, Khanna Pub., Delhi, (2005). [8] Hiwarekar A.P., A new method of cryptography using Laplace transform, International Journal of Mathematical Archive, 3(3), 1193-1197, (2012). [9] Hiwarekar A.P., A new method of cryptography using Laplace transform of hyperbolic functions, International Journal of Mathematical Archive, 4(2), 208-213, (2013). [10] Hiwarekar A.P., Application of Laplace Transform for Cryptographic Scheme, proceeding of World Congress on Engineering Vol.II, LNCS, 95-100, (2013). [11] Hiwarekar A.P., New Mathematical Modeling for Cryptography, Journal of Information Assurance and Security, MIR Lab USA, Vol. 9, 027-033, (2014). [12] Johannes A. Buchmann, Introduction to Cryptography, Fourth Edn., Indian Reprint, Springer, (2009). [13] Lokenath Debnath, Dambaru Bhatta, Integrl Transforms and Their Applications, Chapman and Hall/CRC, First Indian edn. (2010). [14] Overbey J., Traves W.and Wojdylo J., On the Keyspace of the Hill Cipher, Cryptologia, 29, 59-72, (January 2005). [15] Ramana B.V., Higher Engineering Mathematics, Tata McGraw-Hills, (2007). [16] Saeednia S., How to Make the Hill Cipher Secure,Cryptologia, 24, 353-360, (October 2000). [17] Stallings W., Cryptography and network security, 4th edition, Prentice Hall, (2005). [18] Stallings W., Network security essentials: Applications and standards, first edition, Pearson Education, Asia, (2001).