SlideShare a Scribd company logo
1 of 5
Download to read offline
A.P. Hiwarekar Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 4, ( Part -5) April 2015, pp.102-106
www.ijera.com 102 | P a g e
Cryptography Using Laplace Transform
A.P. Hiwarekar
Department of Mathematics Vidya Pratishthan’s College of Engineering Baramati (University of Pune)
Vidyanagari, Bhigwan Road, Baramati, Dist.Pune, Maharashtra, India
Abstract
In this paper we present a new iterative method for cryptography, in which we apply Laplace transform of
suitable function for encrypting the plain text and we apply corresponding inverse Laplace transform for
decryption. Finally we developed the results in the generalized form. We also obtained the corresponding
encryption algorithm for this method.
Keywords: Cryptography, Data encryption, Applications to coding, coding theory and cryptography,
Algebraic coding theory; cryptography, Laplace Transforms.
I. INTRODUCTION
When we send a message to someone, we always
suspect that someone else will interpret it and read it
or modify it before re-sending. There is always a
desire to know about a secret message being sent or
received between two parties with or without any
personal, financial or political gains. It is no wonder
that to have the desire to send a message to someone
so that nobody else can interpret it. Thus information
security has become a very critical aspect of modern
computing system. Information security is mostly
achieved through the use of cryptography.
Various techniques for cryptography are found in
literature [1], [2], [3], [4], [12], [17], [18].
Mathematical technique using matrices for the same
are found in Overbey, Traves and Wojdylo, [14];
Saeednia, [16]. In Naga Lakshmi, Ravi Kumar and
Chandra Sekhar, [6]; Hiwarekar, [8], [9], [10] and
[11]; they encrypt a string by using series expansion
of ( )f t and its Laplace transform.
II. DEFINITIONS AND STANDARD
RESULTS
Definition 2.1.: Plain text signifies a message that
can be understood by the sender, the recipient and
also by anyone else who gets an access to that
message.
Definition 2.2.: When plain text message is codified
using any suitable scheme, the resulting message is
called as cipher text.
Definition 2.3.: Encryption transforms a plain text
message into cipher text, whereas decryption
transforms a cipher text message back into plain text.
Every encryption and decryption process has two
aspects: the algorithm and the key. The key is used
for encryption and decryption that makes the process
of cryptography secure. Here we require following
results.
2.1. The Laplace Transform: If ( )f t is a function
defined for all positive values of ,t then the Laplace
Transform of ( )f t is defined as
0
{ ( )} ( ) ( ) ,st
L f t F s e f t dt


   (2.1)
provided that the integral exists. Here the parameter
s is a real or complex number. The corresponding
inverse Laplace transform is
1
{ ( )} ( ),L F s f t

[5, 13, 15].
2.2. Theorem: Laplace transform is a linear
transform. That is, if
1 1 2 2{ ( )} ( ), { ( )} ( ), { ( )} ( ),n nL f t F s L f t F s L f t F s   (2.2)
then
     1 1 2 2 1 1 2 2{ ( ) ( ) ( )} ,n n n nL c f t c f t c f t c F s c F s c F s      
(2.3)
where 1 2, , , nc c c are constants, [5, 13, 15].
2.3. Some Standard Results of Laplace Transform:
In this paper we are assuming that all the considered
functions are such that their Laplace transform exists.
We are also assuming that N be the set of natural
numbers. Here we require following standard results
of Laplace transform
1. 1
2 2 2 2
{cosh } , { } cosh .
s s
L kt L kt
s k s k

 
 
(2.4)
2. 1
1 1
! !
{ } , { } , .n n
n n
n n
L t L t n N
s s

 
  
(2.5)
3.
       1
{ } , { } ,
n n
n nd d
L t f t F s L F s t f t
ds ds
    
    
   
(2.6)
[5, 13, 15].
RESEARCH ARTICLE OPEN ACCESS
A.P. Hiwarekar Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 4, ( Part -5) April 2015, pp.102-106
www.ijera.com 103 | P a g e
III. MAIN RESULTS
3.1 Encryption
We consider standard expansion
 
2
2 2 4 4 6 6 2 2
2 ! 2 !
0
cosh 1 ,
2! 4! 6!
i
i i
i i
i
rtr t r t r t r t
rt


           
(3.1)
where r N is a constant, and
2 4 4 6 6 8 2 2 2
2 2
2 !
2 2 2
2 !
0
2 2 2 2
cosh 2
2! 4! 6!
2
.
i i
i
i i
i
i
t t t t
t t t
t



       
 
  
(3.2)
We allocated 0 to A and 1 to B then Z will be 25.
Let given message called plain text be ‘FRUITS’, it is
equivalent to
5 17 20 8 19 18.
Let us assume that
0,0 1,0 2,0 3,0 4,0 5,0 ,05, 17, = 20, = 8, = 19, = 18, = 0 for n 6.nG G G G G G G  
Writing these numbers as a coefficients of
2
cosh 2 ,t t and assuming 2
( ) cosh 2 ,f t Gt t we
get
2 2 4 4 6 6 8 8 10 10
2
0,0 1,0 2,0 3,0 4,0 5,0
2 2 2 2 2
( ) [ ]
2! 4! 6! 8! 10!
t t t t t
f t t G G G G G G     
2 2 2 2 2 4 4 6 6 8 8 10 10 12
,0
2 !
0
2 2 2 2 2 2
5 17 20 8 19 18 .
0! 2! 4! 6! 8! 10!
i i
i
i
i
t G t t t t t t


      
(3.3)
Taking Laplace transform on both sides of (3.3), we
have
2
3 5 7 9 11 13
10 816 9600 28672 437760 2433024
{ ( )} { cosh 2 } + + + + .L f t L Gt t
s s s s s s
  
(3.4)
Adding 10p  to the resultant values
10 816 9600 28672 437760 2433024
and then adjusting it to mod 26 that is
20 20 mod 26, 826 20mod 26, 9610 16 mod 26,
28682 4 mod 26, 437770 8mod 26, 2433034 6 mod 26.
  
  
Sender sends the values
0 31 369 1103 16837 93578
as a key. Assuming
0,1 1,1 2,1 3,1 4,1 5,1
,1
G = 20, G = 20, = 16, = 4, = 8 = 6,
= 0 for n 6.n
G G G G
G 
The given plain text gets converted to cipher text
20 20 16 4 8 6.
Here message ‘FRUITS’ gets converted to
‘UUQEIG’. These results are included in the
following
Theorem 3.1: The given plain text in terms of
,0 , 1, 2,3, ,iG i   under Laplace transform of
2
cosh 2 ,Gt t (that is by writing them as a
coefficients of 2
cosh 2 ,t t and then taking the
Laplace transform) can be converted to cipher text
  2
,1 ,0
,1 ,1
(2 2 1 2 2 )mod 26
26 , 0,1,2,3, ,
i
i i
i i
G i i G p
q k for i
   
   
(3.5)
where,
  2 1
,1 ,02 2 1 2 2 , 0,1,2,3, , , 0 25,i
i iq i i G p i p N p
       
(3.6)
and a key
,1 ,1
,1 0,1, 2,3,
26
i i
i
q G
k for i

   .
(3.7)
Now we apply the same operation again on the
output of the resulting cipher text obtained in the
Theorem 3.1 and obtain its new form which is
included in the following theorem.
Theorem 3.2: The given plain text in terms of
,1, 1, 2,3, ,iG i   under Laplace
transform of 2
,1 cosh 2 ,iG t t (that is by writing
them as a coefficients of 2
cosh 2t t and then
taking the Laplace transform) can be converted to
cipher text
  2
,2 ,1 ,2 ,2( 2 2 1 2 2 )mod26 26 , 0,1,2,3, ,i
i i i iG G i i p q k i       
(3.8)
where,
  2
,2 ,1( 2 2 1 2 2 ), 0,1,2,3, , , 0 25,i
i iq G i i p i p N p       
(3.9)
and a key
,2 ,2
,2 , 0,1, 2, 3, ,
26
i i
i
q G
k i

  
. (3.10)
Now we apply such operations successively j
times on the given plain text and obtain its new form
as cipher text. This iterative method is included in the
following theorem.
Theorem 3.3: The given plain text in terms of
,0 , 1, 2,3, ,iG i   under Laplace transform
of 2
,0 cosh 2 ,iG t t successively j times (that is by
writing them as a coefficients of 2
cosh 2 ,t t
and then taking the Laplace transform successively)
can be converted to cipher text
  2 1
, , 1 , ,( 2 2 1 2 2 ) mod26 26 , , 0,1,2,3, ,i
i j i j i j i jG G i i p q k i j
       
(3.11)
where
  2
, , 1( 2 2 1 2 2 ), , 0,1,2,3, , , 0 25,i
i j i jq G i i p i j p N p       
(3.12)
and a key
, ,
, , , 0,1, 2,3, ,
26
i j i j
i j
q G
k i j

   (3.13)
A.P. Hiwarekar Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 4, ( Part -5) April 2015, pp.102-106
www.ijera.com 104 | P a g e
Remark 3.1: Theorem 3.1 is a special case of
Theorem 3.3 with 1j  and Theorem 3.2
with 2j  .
Remark 3.2: Results in [10], Hiwarekar A.P are
generalized here and are special cases of Theorem 3.3
with 1j  and with 0.p 
3.2. Generalization
The generalization of the results in section 3 can
be obtained by considering more general function
given by ( ) cosh , ,l .l
f t Gt rt r N  Using the
procedure discussed in section 3, we can convert the
given message ,0iG to ,1 ,iG
where
    2
,1 ,0( 2 1 2 2 2 ),
, 0,1,2, ,
i
i iq G r i i i l p
i l
    



(3.14)
with key
,1 ,1
,1 , 0,1,2,3, .
26
i i
i
q G
k i

   (3.15)
Hence we have following generalized theorem
Theorem 3.4: The given plain text in terms of
,0 , 1,2,3, ,iG i   under Laplace transform of
,0 cosh ,l
iG t rt (that is by writing them as a
coefficients of cosh ,l
t rt and then taking the
Laplace transform) can be converted to cipher text
  
 
2
,1 .0
,1 ,1
( 2 1 2 2
2 ) mod 26
26 , , 0,1, 2,3, ,
i
i i
i i
G G r i i
i l p
q k i l
  
 
  


(3.16)
with ,1iq and ,1ik are given by (3.14) and (3.15)
respectively.
Remark 4.1: Theorem 3.3 is a special case of theorem
3.4 with 2, 2.l r 
Now we apply above operations successively j
times on the output obtained in the last step on the
cipher text and obtain new cipher text this is included
in the following new theorem.
Theorem 3.5: The given plain text in terms of
,0 , 1,2,3, ,iG i   under Laplace transform of
,0 cosh ,l
iG t rt successively j times (that is by
writing them as a coefficients of cosh ,l
t rt and
then taking the Laplace transform successively) can
be converted to cipher text
    2
, , 1
, ,
( 2 1 2 2 2 )mod 26
26 , , , 0,1,2 ,,3,
i
i j i j
i j i j
G G r i i i l p
q k i j l
    
  


(3.17)
and
    2
, , 1( 2 1 2 2 2 ), , , 0,1,2,3, ,i
i j i jq G r i i i l p i j l      
(3.18)
and key
, ,
, , , 0,1,2,3, ,
26
i j i j
i j
q G
k i j

   . (3.19)
Remark 3.2: Theorem 3.4 is a special case of
Theorem 3.5 with 1.j  Hence all Theorems 3.1 to
3.4 follows from Theorem 3.5.
IV. DECRYPTION
For the decryption of the received cipher text we
proceed exactly in the reverse direction using inverse
Laplace transform. The method is as follows.
Suppose we have received message as ‘UUQEIG’
which is equivalent to
20 20 16 4 8 6.
Let us assume that
0,1 1,1 2,1 3,1 4,1 5,1
,1
G = 20, G = 20, = 16, = 4, = 8 = 6,
= 0 for n 6.n
G G G G
G 
Using given key ,0 , 0,1,2,3,ik i   as
0 31 369 1103 16837 93578
and 10,p  assuming
,1 ,1 ,126 , 0,1, 2,3, .i i iq G k p i     . (4.1)
We consider
 
2
2 2
3 5 7 9 11 13
,1
2 3
0
2
10 816 9600 28672 437760 2433024
+ + + +
.
n
i
i
i
d s
G
ds s
s s s s s s
q
s 

 
 
 
 
 
(4.2)
Taking inverse Laplace transform we get
2
2 2 2
,0
2 !
0
2 2 4 4 6 6 8 8 10 10 12
( ) cosh 2
2
2 2 2 2 2
5 17 20 8 19 18 .
0! 2! 4! 6! 8! 10!
i i
i
i
i
f t Gt t
t G
t t t t t t




     

2 2 4 4 6 6
2
0,0 1,0 2,0 3,0
8 8 10 10
4,0 5,0
2 2 2
[
2! 4! 6!
2 2
]
8! 10!
t t t
t G G G G
t t
G G
   
 
(4.3)
Here we have
0,0 1,0 2,0 3,0 4,0 5,0
,0
5, 17, = 20, = 8, = 19, = 18,
= 0 for n 6.n
G G G G G G
G
 

A.P. Hiwarekar Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 4, ( Part -5) April 2015, pp.102-106
www.ijera.com 105 | P a g e
Here message
5 17 20 8 19 18. is
equivalent to ‘FRUITS’. Thus ‘UUQEIG’ under
inverse Laplace transform gets converted to
‘FRUITS’. Hence we have following decryption
theorem
Theorem 4.1: The given cipher text in terms of
,1, 1,2,3, ,iG i   with a given key
,0 , 0,1,2,3,ik i   can be converted to plain text
,0iG under the inverse Laplace transform of
 
2
,0
2 32 2
0
,
2
n
i
i
i
qd s
G
ds ss


 
  
 
 (4.4)
where
  
,0 ,1
,0 2
26
, 0,1,2,3, , , 0 25,
2 2 1 2 2
i i
i i
k G p
G i p N p
i i
 
    
 

(4.5)
and ,0 ,0 ,126 , 0,1, 2,3, .i i iq k G i    (4.6)
The generalized iterative theorem can be obtained on
the similar way which is included in the following
Theorem 4.2: The given cipher text in terms of
, , , 1,2,3 ,i jG i j   with a given key
, 1, , 1,2,3 ,i jk i j  
can be converted to plain text , 1i jG  under the
inverse Laplace transform of
 
2
, 1
2 32 2
0
,
2
n
i j
i
i
qd s
G
ds ss



 
  
 
 (4.7)
where
  
, 1 ,
, 1 2
26
, , 1,2,3, , , 0 25,
2 2 1 2 2
i j i j
i j i
k G p
G i j p N p
i i


 
    
 

(4.8)
and , , ,26 , , 1,2,3, ,i j i j i jq k G i j    (4.9)
Remark 4.1: Results in [6], G.Naga Lakshmi, B.
Ravi Kumar and A. Chandra Sekhar are obtained by
considering Laplace transform
t
te and are
generalized in Hiwarekar A.P. [8], [9].
The method developed in this paper can be used
in the form of following algorithm.
V. ENCRYPTION ALGORITHM
1) Treat every letter in the plain text message as a
number so that 0; 1; 2; , 25.A B C Z   
2) The plain text message ,0iG is organized as a
finite sequence of numbers, based on the above
conversion. Only consider ,0iG till the length of input
string, i.e. 1i  to 1.n 
3) Consider suitable function ( )f t as in Theorem
3.5, choose suitable values of , , , .l r j p Take
successive Laplace transform of ( )f t and get
formula (3.17) for encryption. Hence each character
in the input string converts to new position , j.iG
4) Key values ,jiK for every character can be
obtained by equation (3.19) using (3.18).
5) Send ,j 1iG  and ,jiK as well as , , ,l r j p to the
receiver.
On similar way we can also obtain decryption
algorithm.
5.1. Illustrative Examples
Using results obtained in Theorem 3.3, if we
have original message ‘FRUITS’, then it gets
converted to
1. ‘WCUMUW’ for
2, 3, 4, 10,l r j p   
2. ‘LRNVLV’ for
2, 2, 3, 7,l r j p   
3. ‘GQCIIG’ for 3, 4, 5, 6,l r j p   
4. ‘WUYIME’ for
3, 5, 6, 4,l r j p   
5. ‘AUOKKE’ for
3, 5, 2, 4.l r j p   
5.2 Implementation Strategies
The main advantage of this algorithm is for same
input alphabets we can get different output alphabets.
We just need to change values of l or r or j or p or
all of them (in theorem 3.3). Algorithm may prevent
different attacks on the symmetric encryption such as
cipher text only, known plaintext, chosen plaintext,
chosen cipher text, chosen text. Moreover we can
divide the document into blocks of four to six
alphabets. Apply Encryption on these blocks in
parallel and generate cipher text as well as the keys
respectively. If we consider encryption of one
complete document then we can choose different
values of ‘r’ (in Theorem 3.5) for different blocks.
For each block chose different value of r so that by
any way attacker cracked one block he will not be
able to crack other blocks. We can also apply iterative
method in some cases. This will resist all types of
attacks mentioned earlier. For Brute Force attack
large amount of calculations will be needed as
attacker doesn’t know the algorithm as well as we are
adding extra layer of security by using variable values
of l or r or j or p or all of them at a time (in
Theorem 3.5). Other aspect of algorithm is key length
it can be considered as advantage in some
applications or disadvantage in case of data length
limited applications.
A.P. Hiwarekar Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 4, ( Part -5) April 2015, pp.102-106
www.ijera.com 106 | P a g e
VI. DISCUSSION AND CONCLUDING
REMARKS
1. Many sectors such as banking and other financial
institutions are adopting e-services and
improving their internet services. However, the
e-service requirements are also opening up new
opportunity to commit financial fraud. Internet
banking fraud is one of the most serious
electronic crimes and mostly committed by
unauthorized users. The new method of key
generation scheme developed in this paper may
be used for a fraud prevention mechanism.
2. In the proposed work we develop a new
cryptographic scheme using Laplace transforms
and the key is the number of multiples of mod n.
Therefore it is very difficult for an eyedropper to
trace the key by any attack. The results in section
3 provide as many transformations as per the
requirements which is the most useful factor for
changing key.
3. The similar results can be obtained by using
Laplace transform of other suitable function.
Hence extension of this work is possible.
Moreover the entire document can be encrypted
by considering block ciphers of small sizes.
4. For computer network security random
number generation is a prime important task and
also it is very essential in constructing keys for
cryptographic algorithm. Method used in this
paper can be useful for random number
generation.
5. To reduce the crypt-analysis attack risk, a
dynamic key theory plays important role, the
method presented in this paper is useful in such
situations.
ACKNOWLEDGEMENTS
Author is thankful to Principal Dr. S. B.
Deosarkar and Vidya Pratishthan's College of
Engineering, Baramati, Dist. Pune, Maharashtra,
India, for the support to this work.
REFERENCES
[1] Alexander Stanoyevitch, Introduction to
cyrptography with mathematical foundations
and computer implementations, CRC Press,
(2002).
[2] Barr T.H., Invitation to Cryptography,
Prentice Hall, (2002).
[3] Blakley G.R., Twenty years of Cryptography
in the open literature, Security and Privacy
1999, Proceedings of the IEEE Symposium,
9-12, (May1999).
[4] Eric C., Ronald K., James W.C., Netwark
SecurityBible Second edn.,Wiley India
pub.(2009).
[5] Erwin Kreyszing, Advanced Engineering
Mathematics, John Wiley and Sons
Inc.(1999).
[6] G.Naga Lakshmi, B.Ravi Kumar and
A.Chandra Sekhar, A cryptographic scheme
of Laplace transforms, International Journal
of Mathematical Archive-2, 2515-2519,
(2011).
[7] Grewal B.S., Higher Engineering
Mathematics, Khanna Pub., Delhi, (2005).
[8] Hiwarekar A.P., A new method of
cryptography using Laplace transform,
International Journal of Mathematical
Archive, 3(3), 1193-1197, (2012).
[9] Hiwarekar A.P., A new method of
cryptography using Laplace transform of
hyperbolic functions, International Journal
of Mathematical Archive, 4(2), 208-213,
(2013).
[10] Hiwarekar A.P., Application of Laplace
Transform for Cryptographic Scheme,
proceeding of World Congress on
Engineering Vol.II, LNCS, 95-100, (2013).
[11] Hiwarekar A.P., New Mathematical
Modeling for Cryptography, Journal of
Information Assurance and Security, MIR
Lab USA, Vol. 9, 027-033, (2014).
[12] Johannes A. Buchmann, Introduction to
Cryptography, Fourth Edn., Indian Reprint,
Springer, (2009).
[13] Lokenath Debnath, Dambaru Bhatta, Integrl
Transforms and Their Applications,
Chapman and Hall/CRC, First Indian edn.
(2010).
[14] Overbey J., Traves W.and Wojdylo J., On
the Keyspace of the Hill Cipher,
Cryptologia, 29, 59-72, (January 2005).
[15] Ramana B.V., Higher Engineering
Mathematics, Tata McGraw-Hills, (2007).
[16] Saeednia S., How to Make the Hill Cipher
Secure,Cryptologia, 24, 353-360, (October
2000).
[17] Stallings W., Cryptography and network
security, 4th edition, Prentice Hall, (2005).
[18] Stallings W., Network security essentials:
Applications and standards, first edition,
Pearson Education, Asia, (2001).

More Related Content

What's hot

Dijkstra algorithm a dynammic programming approach
Dijkstra algorithm   a dynammic programming approachDijkstra algorithm   a dynammic programming approach
Dijkstra algorithm a dynammic programming approachAkash Sethiya
 
Binary Coded Decimal.pptx
Binary Coded Decimal.pptxBinary Coded Decimal.pptx
Binary Coded Decimal.pptxssuserb0a163
 
Jurnal Journal - Penggunaan Metode Depth First Search (DFS) dan Breadth Firs...
Jurnal Journal - Penggunaan Metode Depth First Search (DFS) dan  Breadth Firs...Jurnal Journal - Penggunaan Metode Depth First Search (DFS) dan  Breadth Firs...
Jurnal Journal - Penggunaan Metode Depth First Search (DFS) dan Breadth Firs...Budi Prasetiyo
 
Implementation of boolean function through1 multiplexer
Implementation of boolean function through1 multiplexerImplementation of boolean function through1 multiplexer
Implementation of boolean function through1 multiplexerEzeokafor Chibueze
 
Advanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution BoxAdvanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution BoxHardik Manocha
 
Pendeteksi kualitas udara dengan sensor mq 135 berbasis microcontroller
Pendeteksi kualitas udara dengan sensor mq 135 berbasis microcontrollerPendeteksi kualitas udara dengan sensor mq 135 berbasis microcontroller
Pendeteksi kualitas udara dengan sensor mq 135 berbasis microcontrollerHeny Handayani
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket LayerPina Parmar
 
Presentation on cyclic redundancy check (crc)
Presentation on cyclic redundancy check (crc)Presentation on cyclic redundancy check (crc)
Presentation on cyclic redundancy check (crc)Sudhanshu Srivastava
 
Arithmetic coding
Arithmetic codingArithmetic coding
Arithmetic codingGidey Leul
 
Tugas mesin otomatis
Tugas mesin otomatisTugas mesin otomatis
Tugas mesin otomatisandri kolimon
 
Distruct week 15 graphs theory (updated)
Distruct week 15 graphs theory (updated)Distruct week 15 graphs theory (updated)
Distruct week 15 graphs theory (updated)Robert Almazan
 
UNIT-III-PPT.pptx
UNIT-III-PPT.pptxUNIT-III-PPT.pptx
UNIT-III-PPT.pptxDakshBaveja
 
Error Correction of Burst error
Error Correction of Burst errorError Correction of Burst error
Error Correction of Burst errorTanzila Islam
 
FAST ETHERNET
FAST ETHERNET FAST ETHERNET
FAST ETHERNET Sujitha14
 

What's hot (20)

IP Security
IP SecurityIP Security
IP Security
 
Time Division Multiplexing
Time Division MultiplexingTime Division Multiplexing
Time Division Multiplexing
 
Dijkstra algorithm a dynammic programming approach
Dijkstra algorithm   a dynammic programming approachDijkstra algorithm   a dynammic programming approach
Dijkstra algorithm a dynammic programming approach
 
Binary Coded Decimal.pptx
Binary Coded Decimal.pptxBinary Coded Decimal.pptx
Binary Coded Decimal.pptx
 
Graph algorithm
Graph algorithmGraph algorithm
Graph algorithm
 
Jurnal Journal - Penggunaan Metode Depth First Search (DFS) dan Breadth Firs...
Jurnal Journal - Penggunaan Metode Depth First Search (DFS) dan  Breadth Firs...Jurnal Journal - Penggunaan Metode Depth First Search (DFS) dan  Breadth Firs...
Jurnal Journal - Penggunaan Metode Depth First Search (DFS) dan Breadth Firs...
 
Implementation of boolean function through1 multiplexer
Implementation of boolean function through1 multiplexerImplementation of boolean function through1 multiplexer
Implementation of boolean function through1 multiplexer
 
Advanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution BoxAdvanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution Box
 
Pendeteksi kualitas udara dengan sensor mq 135 berbasis microcontroller
Pendeteksi kualitas udara dengan sensor mq 135 berbasis microcontrollerPendeteksi kualitas udara dengan sensor mq 135 berbasis microcontroller
Pendeteksi kualitas udara dengan sensor mq 135 berbasis microcontroller
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Presentation on cyclic redundancy check (crc)
Presentation on cyclic redundancy check (crc)Presentation on cyclic redundancy check (crc)
Presentation on cyclic redundancy check (crc)
 
Unit 4 bandwidth utilization
Unit 4 bandwidth utilizationUnit 4 bandwidth utilization
Unit 4 bandwidth utilization
 
Arithmetic coding
Arithmetic codingArithmetic coding
Arithmetic coding
 
Tugas mesin otomatis
Tugas mesin otomatisTugas mesin otomatis
Tugas mesin otomatis
 
Distruct week 15 graphs theory (updated)
Distruct week 15 graphs theory (updated)Distruct week 15 graphs theory (updated)
Distruct week 15 graphs theory (updated)
 
UNIT-III-PPT.pptx
UNIT-III-PPT.pptxUNIT-III-PPT.pptx
UNIT-III-PPT.pptx
 
Error Correction of Burst error
Error Correction of Burst errorError Correction of Burst error
Error Correction of Burst error
 
FAST ETHERNET
FAST ETHERNET FAST ETHERNET
FAST ETHERNET
 
IP Security
IP SecurityIP Security
IP Security
 
Chapter 3 2
Chapter 3 2Chapter 3 2
Chapter 3 2
 

Viewers also liked (20)

Aj35198205
Aj35198205Aj35198205
Aj35198205
 
Ks2518741883
Ks2518741883Ks2518741883
Ks2518741883
 
Cw24640644
Cw24640644Cw24640644
Cw24640644
 
E41013142
E41013142E41013142
E41013142
 
Ag26204209
Ag26204209Ag26204209
Ag26204209
 
Of3424832487
Of3424832487Of3424832487
Of3424832487
 
Kp3618151819
Kp3618151819Kp3618151819
Kp3618151819
 
Hu3513551364
Hu3513551364Hu3513551364
Hu3513551364
 
Jc3515691575
Jc3515691575Jc3515691575
Jc3515691575
 
Ba36317323
Ba36317323Ba36317323
Ba36317323
 
Oi3425032505
Oi3425032505Oi3425032505
Oi3425032505
 
Ky3419651971
Ky3419651971Ky3419651971
Ky3419651971
 
Lf2519471952
Lf2519471952Lf2519471952
Lf2519471952
 
Ez24947953
Ez24947953Ez24947953
Ez24947953
 
Bo24437446
Bo24437446Bo24437446
Bo24437446
 
Dq35655671
Dq35655671Dq35655671
Dq35655671
 
Hy3513861391
Hy3513861391Hy3513861391
Hy3513861391
 
Jx3517171726
Jx3517171726Jx3517171726
Jx3517171726
 
Be24365370
Be24365370Be24365370
Be24365370
 
Nq2422332236
Nq2422332236Nq2422332236
Nq2422332236
 

Similar to Cryptography Using Laplace Transform

Fast Algorithm for Computing the Discrete Hartley Transform of Type-II
Fast Algorithm for Computing the Discrete Hartley Transform of Type-IIFast Algorithm for Computing the Discrete Hartley Transform of Type-II
Fast Algorithm for Computing the Discrete Hartley Transform of Type-IIijeei-iaes
 
Improving the initial values of VFactor suitable for balanced modulus
Improving the initial values of VFactor suitable for  balanced modulus Improving the initial values of VFactor suitable for  balanced modulus
Improving the initial values of VFactor suitable for balanced modulus IJECEIAES
 
A Mathematical Model to Solve Nonlinear Initial and Boundary Value Problems b...
A Mathematical Model to Solve Nonlinear Initial and Boundary Value Problems b...A Mathematical Model to Solve Nonlinear Initial and Boundary Value Problems b...
A Mathematical Model to Solve Nonlinear Initial and Boundary Value Problems b...IJERA Editor
 
Cryptographic Technique Used Lower and Upper Triangular Decomposition Method
Cryptographic Technique Used Lower and Upper Triangular Decomposition MethodCryptographic Technique Used Lower and Upper Triangular Decomposition Method
Cryptographic Technique Used Lower and Upper Triangular Decomposition MethodIJERA Editor
 
Direct split-radix algorithm for fast computation of type-II discrete Hartley...
Direct split-radix algorithm for fast computation of type-II discrete Hartley...Direct split-radix algorithm for fast computation of type-II discrete Hartley...
Direct split-radix algorithm for fast computation of type-II discrete Hartley...TELKOMNIKA JOURNAL
 
11.[8 17]numerical solution of fuzzy hybrid differential equation by third or...
11.[8 17]numerical solution of fuzzy hybrid differential equation by third or...11.[8 17]numerical solution of fuzzy hybrid differential equation by third or...
11.[8 17]numerical solution of fuzzy hybrid differential equation by third or...Alexander Decker
 
11.numerical solution of fuzzy hybrid differential equation by third order ru...
11.numerical solution of fuzzy hybrid differential equation by third order ru...11.numerical solution of fuzzy hybrid differential equation by third order ru...
11.numerical solution of fuzzy hybrid differential equation by third order ru...Alexander Decker
 
Numerical solution of fuzzy hybrid differential equation by third order runge...
Numerical solution of fuzzy hybrid differential equation by third order runge...Numerical solution of fuzzy hybrid differential equation by third order runge...
Numerical solution of fuzzy hybrid differential equation by third order runge...Alexander Decker
 
Codes from the cyclic group of order three
Codes from the cyclic group of order threeCodes from the cyclic group of order three
Codes from the cyclic group of order threeEditor Jacotech
 
Large Semi Primes Factorization with Its Implications to RSA.pdf
Large Semi Primes Factorization with Its Implications to RSA.pdfLarge Semi Primes Factorization with Its Implications to RSA.pdf
Large Semi Primes Factorization with Its Implications to RSA.pdfDr. Richard Otieno
 
Local Model Checking Algorithm Based on Mu-calculus with Partial Orders
Local Model Checking Algorithm Based on Mu-calculus with Partial OrdersLocal Model Checking Algorithm Based on Mu-calculus with Partial Orders
Local Model Checking Algorithm Based on Mu-calculus with Partial OrdersTELKOMNIKA JOURNAL
 
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...Marisa Paryasto
 
The discrete quartic spline interpolation over non uniform mesh
The discrete  quartic spline interpolation over non uniform meshThe discrete  quartic spline interpolation over non uniform mesh
The discrete quartic spline interpolation over non uniform meshAlexander Decker
 
optimal solution method of integro-differential equaitions under laplace tran...
optimal solution method of integro-differential equaitions under laplace tran...optimal solution method of integro-differential equaitions under laplace tran...
optimal solution method of integro-differential equaitions under laplace tran...INFOGAIN PUBLICATION
 
Master’s theorem Derivative Analysis
Master’s theorem Derivative AnalysisMaster’s theorem Derivative Analysis
Master’s theorem Derivative AnalysisIRJET Journal
 
Specifying and Implementing SNOW3G with Cryptol
Specifying and Implementing SNOW3G with CryptolSpecifying and Implementing SNOW3G with Cryptol
Specifying and Implementing SNOW3G with CryptolUlisses Costa
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...cscpconf
 

Similar to Cryptography Using Laplace Transform (20)

Fast Algorithm for Computing the Discrete Hartley Transform of Type-II
Fast Algorithm for Computing the Discrete Hartley Transform of Type-IIFast Algorithm for Computing the Discrete Hartley Transform of Type-II
Fast Algorithm for Computing the Discrete Hartley Transform of Type-II
 
Improving the initial values of VFactor suitable for balanced modulus
Improving the initial values of VFactor suitable for  balanced modulus Improving the initial values of VFactor suitable for  balanced modulus
Improving the initial values of VFactor suitable for balanced modulus
 
A Mathematical Model to Solve Nonlinear Initial and Boundary Value Problems b...
A Mathematical Model to Solve Nonlinear Initial and Boundary Value Problems b...A Mathematical Model to Solve Nonlinear Initial and Boundary Value Problems b...
A Mathematical Model to Solve Nonlinear Initial and Boundary Value Problems b...
 
Cryptographic Technique Used Lower and Upper Triangular Decomposition Method
Cryptographic Technique Used Lower and Upper Triangular Decomposition MethodCryptographic Technique Used Lower and Upper Triangular Decomposition Method
Cryptographic Technique Used Lower and Upper Triangular Decomposition Method
 
PRINCEPPTFINAL.pptx
PRINCEPPTFINAL.pptxPRINCEPPTFINAL.pptx
PRINCEPPTFINAL.pptx
 
Direct split-radix algorithm for fast computation of type-II discrete Hartley...
Direct split-radix algorithm for fast computation of type-II discrete Hartley...Direct split-radix algorithm for fast computation of type-II discrete Hartley...
Direct split-radix algorithm for fast computation of type-II discrete Hartley...
 
G029037043
G029037043G029037043
G029037043
 
11.[8 17]numerical solution of fuzzy hybrid differential equation by third or...
11.[8 17]numerical solution of fuzzy hybrid differential equation by third or...11.[8 17]numerical solution of fuzzy hybrid differential equation by third or...
11.[8 17]numerical solution of fuzzy hybrid differential equation by third or...
 
11.numerical solution of fuzzy hybrid differential equation by third order ru...
11.numerical solution of fuzzy hybrid differential equation by third order ru...11.numerical solution of fuzzy hybrid differential equation by third order ru...
11.numerical solution of fuzzy hybrid differential equation by third order ru...
 
Numerical solution of fuzzy hybrid differential equation by third order runge...
Numerical solution of fuzzy hybrid differential equation by third order runge...Numerical solution of fuzzy hybrid differential equation by third order runge...
Numerical solution of fuzzy hybrid differential equation by third order runge...
 
Codes from the cyclic group of order three
Codes from the cyclic group of order threeCodes from the cyclic group of order three
Codes from the cyclic group of order three
 
Large Semi Primes Factorization with Its Implications to RSA.pdf
Large Semi Primes Factorization with Its Implications to RSA.pdfLarge Semi Primes Factorization with Its Implications to RSA.pdf
Large Semi Primes Factorization with Its Implications to RSA.pdf
 
Local Model Checking Algorithm Based on Mu-calculus with Partial Orders
Local Model Checking Algorithm Based on Mu-calculus with Partial OrdersLocal Model Checking Algorithm Based on Mu-calculus with Partial Orders
Local Model Checking Algorithm Based on Mu-calculus with Partial Orders
 
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...
 
The discrete quartic spline interpolation over non uniform mesh
The discrete  quartic spline interpolation over non uniform meshThe discrete  quartic spline interpolation over non uniform mesh
The discrete quartic spline interpolation over non uniform mesh
 
optimal solution method of integro-differential equaitions under laplace tran...
optimal solution method of integro-differential equaitions under laplace tran...optimal solution method of integro-differential equaitions under laplace tran...
optimal solution method of integro-differential equaitions under laplace tran...
 
Master’s theorem Derivative Analysis
Master’s theorem Derivative AnalysisMaster’s theorem Derivative Analysis
Master’s theorem Derivative Analysis
 
D044042432
D044042432D044042432
D044042432
 
Specifying and Implementing SNOW3G with Cryptol
Specifying and Implementing SNOW3G with CryptolSpecifying and Implementing SNOW3G with Cryptol
Specifying and Implementing SNOW3G with Cryptol
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
 

Recently uploaded

The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 

Recently uploaded (20)

The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 

Cryptography Using Laplace Transform

  • 1. A.P. Hiwarekar Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 4, ( Part -5) April 2015, pp.102-106 www.ijera.com 102 | P a g e Cryptography Using Laplace Transform A.P. Hiwarekar Department of Mathematics Vidya Pratishthan’s College of Engineering Baramati (University of Pune) Vidyanagari, Bhigwan Road, Baramati, Dist.Pune, Maharashtra, India Abstract In this paper we present a new iterative method for cryptography, in which we apply Laplace transform of suitable function for encrypting the plain text and we apply corresponding inverse Laplace transform for decryption. Finally we developed the results in the generalized form. We also obtained the corresponding encryption algorithm for this method. Keywords: Cryptography, Data encryption, Applications to coding, coding theory and cryptography, Algebraic coding theory; cryptography, Laplace Transforms. I. INTRODUCTION When we send a message to someone, we always suspect that someone else will interpret it and read it or modify it before re-sending. There is always a desire to know about a secret message being sent or received between two parties with or without any personal, financial or political gains. It is no wonder that to have the desire to send a message to someone so that nobody else can interpret it. Thus information security has become a very critical aspect of modern computing system. Information security is mostly achieved through the use of cryptography. Various techniques for cryptography are found in literature [1], [2], [3], [4], [12], [17], [18]. Mathematical technique using matrices for the same are found in Overbey, Traves and Wojdylo, [14]; Saeednia, [16]. In Naga Lakshmi, Ravi Kumar and Chandra Sekhar, [6]; Hiwarekar, [8], [9], [10] and [11]; they encrypt a string by using series expansion of ( )f t and its Laplace transform. II. DEFINITIONS AND STANDARD RESULTS Definition 2.1.: Plain text signifies a message that can be understood by the sender, the recipient and also by anyone else who gets an access to that message. Definition 2.2.: When plain text message is codified using any suitable scheme, the resulting message is called as cipher text. Definition 2.3.: Encryption transforms a plain text message into cipher text, whereas decryption transforms a cipher text message back into plain text. Every encryption and decryption process has two aspects: the algorithm and the key. The key is used for encryption and decryption that makes the process of cryptography secure. Here we require following results. 2.1. The Laplace Transform: If ( )f t is a function defined for all positive values of ,t then the Laplace Transform of ( )f t is defined as 0 { ( )} ( ) ( ) ,st L f t F s e f t dt      (2.1) provided that the integral exists. Here the parameter s is a real or complex number. The corresponding inverse Laplace transform is 1 { ( )} ( ),L F s f t  [5, 13, 15]. 2.2. Theorem: Laplace transform is a linear transform. That is, if 1 1 2 2{ ( )} ( ), { ( )} ( ), { ( )} ( ),n nL f t F s L f t F s L f t F s   (2.2) then      1 1 2 2 1 1 2 2{ ( ) ( ) ( )} ,n n n nL c f t c f t c f t c F s c F s c F s       (2.3) where 1 2, , , nc c c are constants, [5, 13, 15]. 2.3. Some Standard Results of Laplace Transform: In this paper we are assuming that all the considered functions are such that their Laplace transform exists. We are also assuming that N be the set of natural numbers. Here we require following standard results of Laplace transform 1. 1 2 2 2 2 {cosh } , { } cosh . s s L kt L kt s k s k      (2.4) 2. 1 1 1 ! ! { } , { } , .n n n n n n L t L t n N s s       (2.5) 3.        1 { } , { } , n n n nd d L t f t F s L F s t f t ds ds               (2.6) [5, 13, 15]. RESEARCH ARTICLE OPEN ACCESS
  • 2. A.P. Hiwarekar Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 4, ( Part -5) April 2015, pp.102-106 www.ijera.com 103 | P a g e III. MAIN RESULTS 3.1 Encryption We consider standard expansion   2 2 2 4 4 6 6 2 2 2 ! 2 ! 0 cosh 1 , 2! 4! 6! i i i i i i rtr t r t r t r t rt               (3.1) where r N is a constant, and 2 4 4 6 6 8 2 2 2 2 2 2 ! 2 2 2 2 ! 0 2 2 2 2 cosh 2 2! 4! 6! 2 . i i i i i i i t t t t t t t t                 (3.2) We allocated 0 to A and 1 to B then Z will be 25. Let given message called plain text be ‘FRUITS’, it is equivalent to 5 17 20 8 19 18. Let us assume that 0,0 1,0 2,0 3,0 4,0 5,0 ,05, 17, = 20, = 8, = 19, = 18, = 0 for n 6.nG G G G G G G   Writing these numbers as a coefficients of 2 cosh 2 ,t t and assuming 2 ( ) cosh 2 ,f t Gt t we get 2 2 4 4 6 6 8 8 10 10 2 0,0 1,0 2,0 3,0 4,0 5,0 2 2 2 2 2 ( ) [ ] 2! 4! 6! 8! 10! t t t t t f t t G G G G G G      2 2 2 2 2 4 4 6 6 8 8 10 10 12 ,0 2 ! 0 2 2 2 2 2 2 5 17 20 8 19 18 . 0! 2! 4! 6! 8! 10! i i i i i t G t t t t t t          (3.3) Taking Laplace transform on both sides of (3.3), we have 2 3 5 7 9 11 13 10 816 9600 28672 437760 2433024 { ( )} { cosh 2 } + + + + .L f t L Gt t s s s s s s    (3.4) Adding 10p  to the resultant values 10 816 9600 28672 437760 2433024 and then adjusting it to mod 26 that is 20 20 mod 26, 826 20mod 26, 9610 16 mod 26, 28682 4 mod 26, 437770 8mod 26, 2433034 6 mod 26.       Sender sends the values 0 31 369 1103 16837 93578 as a key. Assuming 0,1 1,1 2,1 3,1 4,1 5,1 ,1 G = 20, G = 20, = 16, = 4, = 8 = 6, = 0 for n 6.n G G G G G  The given plain text gets converted to cipher text 20 20 16 4 8 6. Here message ‘FRUITS’ gets converted to ‘UUQEIG’. These results are included in the following Theorem 3.1: The given plain text in terms of ,0 , 1, 2,3, ,iG i   under Laplace transform of 2 cosh 2 ,Gt t (that is by writing them as a coefficients of 2 cosh 2 ,t t and then taking the Laplace transform) can be converted to cipher text   2 ,1 ,0 ,1 ,1 (2 2 1 2 2 )mod 26 26 , 0,1,2,3, , i i i i i G i i G p q k for i         (3.5) where,   2 1 ,1 ,02 2 1 2 2 , 0,1,2,3, , , 0 25,i i iq i i G p i p N p         (3.6) and a key ,1 ,1 ,1 0,1, 2,3, 26 i i i q G k for i     . (3.7) Now we apply the same operation again on the output of the resulting cipher text obtained in the Theorem 3.1 and obtain its new form which is included in the following theorem. Theorem 3.2: The given plain text in terms of ,1, 1, 2,3, ,iG i   under Laplace transform of 2 ,1 cosh 2 ,iG t t (that is by writing them as a coefficients of 2 cosh 2t t and then taking the Laplace transform) can be converted to cipher text   2 ,2 ,1 ,2 ,2( 2 2 1 2 2 )mod26 26 , 0,1,2,3, ,i i i i iG G i i p q k i        (3.8) where,   2 ,2 ,1( 2 2 1 2 2 ), 0,1,2,3, , , 0 25,i i iq G i i p i p N p        (3.9) and a key ,2 ,2 ,2 , 0,1, 2, 3, , 26 i i i q G k i     . (3.10) Now we apply such operations successively j times on the given plain text and obtain its new form as cipher text. This iterative method is included in the following theorem. Theorem 3.3: The given plain text in terms of ,0 , 1, 2,3, ,iG i   under Laplace transform of 2 ,0 cosh 2 ,iG t t successively j times (that is by writing them as a coefficients of 2 cosh 2 ,t t and then taking the Laplace transform successively) can be converted to cipher text   2 1 , , 1 , ,( 2 2 1 2 2 ) mod26 26 , , 0,1,2,3, ,i i j i j i j i jG G i i p q k i j         (3.11) where   2 , , 1( 2 2 1 2 2 ), , 0,1,2,3, , , 0 25,i i j i jq G i i p i j p N p        (3.12) and a key , , , , , 0,1, 2,3, , 26 i j i j i j q G k i j     (3.13)
  • 3. A.P. Hiwarekar Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 4, ( Part -5) April 2015, pp.102-106 www.ijera.com 104 | P a g e Remark 3.1: Theorem 3.1 is a special case of Theorem 3.3 with 1j  and Theorem 3.2 with 2j  . Remark 3.2: Results in [10], Hiwarekar A.P are generalized here and are special cases of Theorem 3.3 with 1j  and with 0.p  3.2. Generalization The generalization of the results in section 3 can be obtained by considering more general function given by ( ) cosh , ,l .l f t Gt rt r N  Using the procedure discussed in section 3, we can convert the given message ,0iG to ,1 ,iG where     2 ,1 ,0( 2 1 2 2 2 ), , 0,1,2, , i i iq G r i i i l p i l         (3.14) with key ,1 ,1 ,1 , 0,1,2,3, . 26 i i i q G k i     (3.15) Hence we have following generalized theorem Theorem 3.4: The given plain text in terms of ,0 , 1,2,3, ,iG i   under Laplace transform of ,0 cosh ,l iG t rt (that is by writing them as a coefficients of cosh ,l t rt and then taking the Laplace transform) can be converted to cipher text      2 ,1 .0 ,1 ,1 ( 2 1 2 2 2 ) mod 26 26 , , 0,1, 2,3, , i i i i i G G r i i i l p q k i l           (3.16) with ,1iq and ,1ik are given by (3.14) and (3.15) respectively. Remark 4.1: Theorem 3.3 is a special case of theorem 3.4 with 2, 2.l r  Now we apply above operations successively j times on the output obtained in the last step on the cipher text and obtain new cipher text this is included in the following new theorem. Theorem 3.5: The given plain text in terms of ,0 , 1,2,3, ,iG i   under Laplace transform of ,0 cosh ,l iG t rt successively j times (that is by writing them as a coefficients of cosh ,l t rt and then taking the Laplace transform successively) can be converted to cipher text     2 , , 1 , , ( 2 1 2 2 2 )mod 26 26 , , , 0,1,2 ,,3, i i j i j i j i j G G r i i i l p q k i j l           (3.17) and     2 , , 1( 2 1 2 2 2 ), , , 0,1,2,3, ,i i j i jq G r i i i l p i j l       (3.18) and key , , , , , 0,1,2,3, , 26 i j i j i j q G k i j     . (3.19) Remark 3.2: Theorem 3.4 is a special case of Theorem 3.5 with 1.j  Hence all Theorems 3.1 to 3.4 follows from Theorem 3.5. IV. DECRYPTION For the decryption of the received cipher text we proceed exactly in the reverse direction using inverse Laplace transform. The method is as follows. Suppose we have received message as ‘UUQEIG’ which is equivalent to 20 20 16 4 8 6. Let us assume that 0,1 1,1 2,1 3,1 4,1 5,1 ,1 G = 20, G = 20, = 16, = 4, = 8 = 6, = 0 for n 6.n G G G G G  Using given key ,0 , 0,1,2,3,ik i   as 0 31 369 1103 16837 93578 and 10,p  assuming ,1 ,1 ,126 , 0,1, 2,3, .i i iq G k p i     . (4.1) We consider   2 2 2 3 5 7 9 11 13 ,1 2 3 0 2 10 816 9600 28672 437760 2433024 + + + + . n i i i d s G ds s s s s s s s q s             (4.2) Taking inverse Laplace transform we get 2 2 2 2 ,0 2 ! 0 2 2 4 4 6 6 8 8 10 10 12 ( ) cosh 2 2 2 2 2 2 2 5 17 20 8 19 18 . 0! 2! 4! 6! 8! 10! i i i i i f t Gt t t G t t t t t t            2 2 4 4 6 6 2 0,0 1,0 2,0 3,0 8 8 10 10 4,0 5,0 2 2 2 [ 2! 4! 6! 2 2 ] 8! 10! t t t t G G G G t t G G       (4.3) Here we have 0,0 1,0 2,0 3,0 4,0 5,0 ,0 5, 17, = 20, = 8, = 19, = 18, = 0 for n 6.n G G G G G G G   
  • 4. A.P. Hiwarekar Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 4, ( Part -5) April 2015, pp.102-106 www.ijera.com 105 | P a g e Here message 5 17 20 8 19 18. is equivalent to ‘FRUITS’. Thus ‘UUQEIG’ under inverse Laplace transform gets converted to ‘FRUITS’. Hence we have following decryption theorem Theorem 4.1: The given cipher text in terms of ,1, 1,2,3, ,iG i   with a given key ,0 , 0,1,2,3,ik i   can be converted to plain text ,0iG under the inverse Laplace transform of   2 ,0 2 32 2 0 , 2 n i i i qd s G ds ss           (4.4) where    ,0 ,1 ,0 2 26 , 0,1,2,3, , , 0 25, 2 2 1 2 2 i i i i k G p G i p N p i i           (4.5) and ,0 ,0 ,126 , 0,1, 2,3, .i i iq k G i    (4.6) The generalized iterative theorem can be obtained on the similar way which is included in the following Theorem 4.2: The given cipher text in terms of , , , 1,2,3 ,i jG i j   with a given key , 1, , 1,2,3 ,i jk i j   can be converted to plain text , 1i jG  under the inverse Laplace transform of   2 , 1 2 32 2 0 , 2 n i j i i qd s G ds ss            (4.7) where    , 1 , , 1 2 26 , , 1,2,3, , , 0 25, 2 2 1 2 2 i j i j i j i k G p G i j p N p i i             (4.8) and , , ,26 , , 1,2,3, ,i j i j i jq k G i j    (4.9) Remark 4.1: Results in [6], G.Naga Lakshmi, B. Ravi Kumar and A. Chandra Sekhar are obtained by considering Laplace transform t te and are generalized in Hiwarekar A.P. [8], [9]. The method developed in this paper can be used in the form of following algorithm. V. ENCRYPTION ALGORITHM 1) Treat every letter in the plain text message as a number so that 0; 1; 2; , 25.A B C Z    2) The plain text message ,0iG is organized as a finite sequence of numbers, based on the above conversion. Only consider ,0iG till the length of input string, i.e. 1i  to 1.n  3) Consider suitable function ( )f t as in Theorem 3.5, choose suitable values of , , , .l r j p Take successive Laplace transform of ( )f t and get formula (3.17) for encryption. Hence each character in the input string converts to new position , j.iG 4) Key values ,jiK for every character can be obtained by equation (3.19) using (3.18). 5) Send ,j 1iG  and ,jiK as well as , , ,l r j p to the receiver. On similar way we can also obtain decryption algorithm. 5.1. Illustrative Examples Using results obtained in Theorem 3.3, if we have original message ‘FRUITS’, then it gets converted to 1. ‘WCUMUW’ for 2, 3, 4, 10,l r j p    2. ‘LRNVLV’ for 2, 2, 3, 7,l r j p    3. ‘GQCIIG’ for 3, 4, 5, 6,l r j p    4. ‘WUYIME’ for 3, 5, 6, 4,l r j p    5. ‘AUOKKE’ for 3, 5, 2, 4.l r j p    5.2 Implementation Strategies The main advantage of this algorithm is for same input alphabets we can get different output alphabets. We just need to change values of l or r or j or p or all of them (in theorem 3.3). Algorithm may prevent different attacks on the symmetric encryption such as cipher text only, known plaintext, chosen plaintext, chosen cipher text, chosen text. Moreover we can divide the document into blocks of four to six alphabets. Apply Encryption on these blocks in parallel and generate cipher text as well as the keys respectively. If we consider encryption of one complete document then we can choose different values of ‘r’ (in Theorem 3.5) for different blocks. For each block chose different value of r so that by any way attacker cracked one block he will not be able to crack other blocks. We can also apply iterative method in some cases. This will resist all types of attacks mentioned earlier. For Brute Force attack large amount of calculations will be needed as attacker doesn’t know the algorithm as well as we are adding extra layer of security by using variable values of l or r or j or p or all of them at a time (in Theorem 3.5). Other aspect of algorithm is key length it can be considered as advantage in some applications or disadvantage in case of data length limited applications.
  • 5. A.P. Hiwarekar Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 4, ( Part -5) April 2015, pp.102-106 www.ijera.com 106 | P a g e VI. DISCUSSION AND CONCLUDING REMARKS 1. Many sectors such as banking and other financial institutions are adopting e-services and improving their internet services. However, the e-service requirements are also opening up new opportunity to commit financial fraud. Internet banking fraud is one of the most serious electronic crimes and mostly committed by unauthorized users. The new method of key generation scheme developed in this paper may be used for a fraud prevention mechanism. 2. In the proposed work we develop a new cryptographic scheme using Laplace transforms and the key is the number of multiples of mod n. Therefore it is very difficult for an eyedropper to trace the key by any attack. The results in section 3 provide as many transformations as per the requirements which is the most useful factor for changing key. 3. The similar results can be obtained by using Laplace transform of other suitable function. Hence extension of this work is possible. Moreover the entire document can be encrypted by considering block ciphers of small sizes. 4. For computer network security random number generation is a prime important task and also it is very essential in constructing keys for cryptographic algorithm. Method used in this paper can be useful for random number generation. 5. To reduce the crypt-analysis attack risk, a dynamic key theory plays important role, the method presented in this paper is useful in such situations. ACKNOWLEDGEMENTS Author is thankful to Principal Dr. S. B. Deosarkar and Vidya Pratishthan's College of Engineering, Baramati, Dist. Pune, Maharashtra, India, for the support to this work. REFERENCES [1] Alexander Stanoyevitch, Introduction to cyrptography with mathematical foundations and computer implementations, CRC Press, (2002). [2] Barr T.H., Invitation to Cryptography, Prentice Hall, (2002). [3] Blakley G.R., Twenty years of Cryptography in the open literature, Security and Privacy 1999, Proceedings of the IEEE Symposium, 9-12, (May1999). [4] Eric C., Ronald K., James W.C., Netwark SecurityBible Second edn.,Wiley India pub.(2009). [5] Erwin Kreyszing, Advanced Engineering Mathematics, John Wiley and Sons Inc.(1999). [6] G.Naga Lakshmi, B.Ravi Kumar and A.Chandra Sekhar, A cryptographic scheme of Laplace transforms, International Journal of Mathematical Archive-2, 2515-2519, (2011). [7] Grewal B.S., Higher Engineering Mathematics, Khanna Pub., Delhi, (2005). [8] Hiwarekar A.P., A new method of cryptography using Laplace transform, International Journal of Mathematical Archive, 3(3), 1193-1197, (2012). [9] Hiwarekar A.P., A new method of cryptography using Laplace transform of hyperbolic functions, International Journal of Mathematical Archive, 4(2), 208-213, (2013). [10] Hiwarekar A.P., Application of Laplace Transform for Cryptographic Scheme, proceeding of World Congress on Engineering Vol.II, LNCS, 95-100, (2013). [11] Hiwarekar A.P., New Mathematical Modeling for Cryptography, Journal of Information Assurance and Security, MIR Lab USA, Vol. 9, 027-033, (2014). [12] Johannes A. Buchmann, Introduction to Cryptography, Fourth Edn., Indian Reprint, Springer, (2009). [13] Lokenath Debnath, Dambaru Bhatta, Integrl Transforms and Their Applications, Chapman and Hall/CRC, First Indian edn. (2010). [14] Overbey J., Traves W.and Wojdylo J., On the Keyspace of the Hill Cipher, Cryptologia, 29, 59-72, (January 2005). [15] Ramana B.V., Higher Engineering Mathematics, Tata McGraw-Hills, (2007). [16] Saeednia S., How to Make the Hill Cipher Secure,Cryptologia, 24, 353-360, (October 2000). [17] Stallings W., Cryptography and network security, 4th edition, Prentice Hall, (2005). [18] Stallings W., Network security essentials: Applications and standards, first edition, Pearson Education, Asia, (2001).