Cryptography In Communication System Via Gupta Integral Transform
DOI:
https://doi.org/10.30526/37.3.3875Keywords:
Cryptography, , Gupta integral transform (GIT), Encryption,, Decryption ProcessesAbstract
Cryptography is a critical approach to secure data transmission and protection for authentication and privacy. It is a discipline related with communication system confidentiality. Recently, integral transform approach has been employed by many researchers to increase the power of encryption and decryption processes in cryptography. A group of practices known as information security are meant to stop unwanted access or changes to data. Cryptography is the sole thing preventing the hacker from reading protected data if they are able to bypass the security firewall, passwords, and other precautions put in place to keep them out. Thus, cryptography aids in data protection for both individuals and organizations. In order to prevent the ciphertext from being utilized for plaintext replication without the corresponding key, cryptography aims to transform plaintext into ciphertext that may be communicated across insecure communication channels. The number of multiples of mod n serves as the key in the newly designed cryptographic technique in the proposed work, which makes use of the Gupta transform. As a result, any kind of attack by an eyedropper finding the key would be exceedingly tough. The integral Gupta transform uses the symmetric cryptosystem where the key must stay secret and shared between the involved parties only to encrypt the transmitted plaintext. The Inverse integral Gupta transform is used to decrypt the received ciphertext back into its original context. The ability of integral Gupta transform is exhibited for the encryption and decryption processes in cryptography and in general, in the area of data security with the help of a practical application.
References
Kharde U. D., An Application of the Elzaki Transform in Cryptography, Journal for Advanced Research in Applied Sciences 2017, 4(5), 86– 89.
Mohammed, N.S. ; Emad, A. Kuffi. Perform the CSI complex Sadik integral transform in cryptography. Journal of Interdisciplinary Mathematics 2023 , 26(6),1303–1309.
Undegaonkar, H. K.; Ingle, R.N. Role of Some Integral Transforms in Cryptography. International Journal of Engineering and Advanced Technology 2020, 9(3), 376-380.
DOI: https://doi.org/10.35940/ijeat.C5117.029320
Kumer P.S.; Vasuki, S.An application of Mahgoub Transform in Cryptography. Advances in Theoretical and Applied Mathematics 2018, 13(2), 91-99.
Srinivas,V.; Jayanthi, C.H. Application of the New Integral J-trans¬form in Cryptography. International Journal of Emerging Technologies 2020, 11(2), 678-682.
Lakshmi, G. N.; Kumar, B. R., ; Sekhar, A. C.. A cryptographic scheme of Laplace transforms, International Journal of Mathematical Archive 2011, 2(12), 2515-2519..
Hiwarekar, A.P. A new method of cryptography using Laplace transform, International Journal of Mathematical Archive 2012, 3(3), 1193-1197.
Asmaa O. Mubayrash; Huda, M. Khalat New method for cryptography using Abaoub- Shkheam transform, The Libyan Journal of Science- University of Tripoli. 2022, 25(2), 35-39.
Sedeeg, A. K. H.; Abdelrahim Mahgoub, M. M. ; Saif Saeed, M. A. An Application of the New Integral “Aboodh Transform” in Cryptography, . Pure and Applied Mathematics Journal. 2016,5 (5), 151-154. doi: https://doi.org/10.11648/j.pamj.20160505.12
Paar, C.; Pelzl, J. Understanding Cryptography: A Textbook for Stu¬dents and Practitioners. 2010th Edition Springer-Verlag Berlin Heidel¬berg. 2010. https://doi.org/10.1007/978-3-662-69007-9
Mansour, E. A.; Kuffi, E. A.; Mehdi, S. A.. Applying SEE Integral Transform in Cryptography. Samarra Journal of Pure and Applied Science. 2022..
Menezes, A. J.; Van Oorschot, P. C.; Vanstone, S. A. Handbook of Applied Cryptography, CRC Press, 1st edition 1997. https://doi.org/10.1201/9780429466335
Jonathan Katz ; Yehuda Lindell, Introduction to Modern Cryptography, Chapman and Hall/CRC, 3rd edition 2021.
Hiwarekar, A.P. New Mathematical Modeling For Cryptography, Journal of Information Assurance and Security. 2014, 9, 027-033.
Akash Thakkar, Ravi Gor, Cryptographic method to enhance the Data Security using RSA algorithm and Sumudu Transform, Journal of Research in Applied Mathematics. 2023, 9(4), 48-54. http://dx.doi.org/10.29121/ijoest.v7.i2.2023.490
Jadhav Shaila Shivaji, Hiwarekar A.P., New Method for Cryptography using Laplace-Elzaki Transform, psychology and education 2021, 58(5),1-6
Rohit Gupta; Rahul Gupta. Securing data transmission by cryptography using Rohit integral transform. International Journal Of Engineering & Technology 2023,12(2), 109–11.
Rahul Gupta, Rohit Gupta, Dinesh Verma, Propounding a New Integral Transform: Gupta Transform with Applications in Science and Engineering, International Journal of Scientific Research in Multidisciplinary Studies 2020,6 (3), 14-19, March.
Rahul Gupta; Rohit Gupta; Rakesh Kumar Verma, Solving Electric Transmission Line Wave Equations via Double Gupta Transform, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering (IJAREEIE), 2022, 11(6), 2533-2538. DOI: http://dx.doi.org/10.15662/IJAREEIE.2022.1106029
Gupta, R.; Pandita N.; Gupta, R. Solving One-Dimensional Heat and Wave Equations Via Gupta Integral Transform,2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS), 2022, 921-925, doi: 10.1109/ICSCDS53736.2022.9760823.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Ibn AL-Haitham Journal For Pure and Applied Sciences
This work is licensed under a Creative Commons Attribution 4.0 International License.
licenseTerms