Volume 65 | Issue 2 | Year 2019 | Article Id. IJMTT-V65I2P503 | DOI : https://doi.org/10.14445/22315373/IJMTT-V65I2P503
Information security is very significant in internet and other form of electronic communications such as system security, security of smart cards, email security, IP security, Time Stamp Protocol(TSP), web security, mobile communications, electronic commerce, Pay-TV etc., which links on many aspects of our daily lives. In this paper, it has been developed an algorithm for cryptography in which we propose Laplace transforms for encrypting the plain text and corresponding inverse Laplace transforms for decryption.
[1] Alexander Stanoyevitch, Introduction to cryptography with mathematical foundations and computer implementations, CRC Press, (2002).
[2] Barr T.H., Invitation to Cryptography, Prentice Hall, 2002.
[3] Blakley G.R., Twenty years of Cryptography in the open literature, Security and Privacy, Proceedings of the IEEE Symposium, May 1999, 9 -12.
[4] Eric C., Ronald K . and James W.C., Network Security Bible, Second edn., Wiley India pub., 2009.
[5] Erwin Kreyszing, Advanced Engineering Mathematics, John Wiley and Sons Inc., 1999.
[6] G.Naga Lakshmi, Ravi Kumar B. and Chandra Sekhar A., A cryptographic scheme of Laplace transforms, International Journal of Mathematical Archive-2, 2011, 2515-2519.
[7] Grewal B.S., Higher Engineering Mathematics, Khanna Pub., Delhi, 2005.
[8] Hiwarekar A.P., A new method of cryptography using Laplace transform of hyperbolic functions, International Journal of Mathematical Archive- 4(2), 2013, 208-213.
[9] Hiwarekar A.P., Application of Laplace Transform for Cryptographic Scheme, proceeding of World Congress on Engineering Vol.II, LNCS, 2013, 95-100.
[10] Johannes A. Buchmann, Introduction to Cryptography, Fourth Edn., Indian Reprint, Springer, 2009.
[11] Overbey J., Traves W. and Wojdylo J., On the Key space of the Hill Cipher, Cryptologia, 29(1), January 2005, 59-72.
[12] Saeednia S., How to Make the Hill Cipher Secure, Cryptologia, 24(4), October 2000, 353-360.
[13] Stallings W., Cryptography and network security, 4th edition, Prentice Hall, 2005.
[14] Stallings W., Network security essentials: Applications and standards, first edition, Pearson Education, Asia, 2001.
[15] Sukalyan Som and Moumita Som., Article: DNA Secret Writing with Laplace Transform, International Journal of Computer Applications, July 2012, 50(5):44-50.
[16] Swati Dhingra, Archana A. Savalgi and Swati Jain, Laplace Transformation based Cryptographic Technique in Network Security, International Journal of Computer Applications, Volume 136, No.7, February 2016, 0975-8887.
CH. Jayanthi, V.Srinivas, "Mathematical Modelling for Cryptography using Laplace Transform," International Journal of Mathematics Trends and Technology (IJMTT), vol. 65, no. 2, pp. 10-15, 2019. Crossref, https://doi.org/10.14445/22315373/IJMTT-V65I2P503