Mathematical Modelling for Cryptography using Laplace Transform

  IJMTT-book-cover
 
International Journal of Mathematics Trends and Technology (IJMTT)
 
© 2019 by IJMTT Journal
Volume-65 Issue-2
Year of Publication : 2019
Authors : CH.Jayanthi, V.Srinivas
  10.14445/22315373/IJMTT-V65I2P503

MLA

MLA Style:CH.Jayanthi, V.Srinivas "Mathematical Modelling for Cryptography using Laplace Transform" International Journal of Mathematics Trends and Technology 65.2 (2019): 10-15.

APA Style: CH.Jayanthi, V.Srinivas (2019). Mathematical Modelling for Cryptography using Laplace Transform. International Journal of Mathematics Trends and Technology, 65(2), 10-15.

Abstract
Information security is very significant in internet and other form of electronic communications such as system security, security of smart cards, email security, IP security, Time Stamp Protocol(TSP), web security, mobile communications, electronic commerce, Pay-TV etc., which links on many aspects of our daily lives. In this paper, it has been developed an algorithm for cryptography in which we propose Laplace transforms for encrypting the plain text and corresponding inverse Laplace transforms for decryption

References
[1] Alexander Stanoyevitch, Introduction to cryptography with mathematical foundations and computer implementations, CRC Press, (2002).
[2] Barr T.H., Invitation to Cryptography, Prentice Hall, 2002.
[3] Blakley G.R., Twenty years of Cryptography in the open literature, Security and Privacy, Proceedings of the IEEE Symposium, May 1999, 9 -12.
[4] Eric C., Ronald K . and James W.C., Network Security Bible, Second edn., Wiley India pub., 2009.
[5] Erwin Kreyszing, Advanced Engineering Mathematics, John Wiley and Sons Inc., 1999.
[6] G.Naga Lakshmi, Ravi Kumar B. and Chandra Sekhar A., A cryptographic scheme of Laplace transforms, International Journal of Mathematical Archive-2, 2011, 2515-2519.
[7] Grewal B.S., Higher Engineering Mathematics, Khanna Pub., Delhi, 2005.
[8] Hiwarekar A.P., A new method of cryptography using Laplace transform of hyperbolic functions, International Journal of Mathematical Archive- 4(2), 2013, 208-213.
[9] Hiwarekar A.P., Application of Laplace Transform for Cryptographic Scheme, proceeding of World Congress on Engineering Vol.II, LNCS, 2013, 95-100.
[10] Johannes A. Buchmann, Introduction to Cryptography, Fourth Edn., Indian Reprint, Springer, 2009.
[11] Overbey J., Traves W. and Wojdylo J., On the Key space of the Hill Cipher, Cryptologia, 29(1), January 2005, 59-72.
[12] Saeednia S., How to Make the Hill Cipher Secure, Cryptologia, 24(4), October 2000, 353-360.
[13] Stallings W., Cryptography and network security, 4th edition, Prentice Hall, 2005.
[14] Stallings W., Network security essentials: Applications and standards, first edition, Pearson Education, Asia, 2001.
[15] Sukalyan Som and Moumita Som., Article: DNA Secret Writing with Laplace Transform, International Journal of Computer Applications, July 2012, 50(5):44-50.
[16] Swati Dhingra, Archana A. Savalgi and Swati Jain, Laplace Transformation based Cryptographic Technique in Network Security, International Journal of Computer Applications, Volume 136, No.7, February 2016, 0975-8887.

Keywords
Laplace transforms, ASCII code, Network security, Cryptography