Volume 69 | Issue 2 | Year 2023 | Article Id. IJMTT-V69I2P503 | DOI : https://doi.org/10.14445/22315373/IJMTT-V69I2P503
In this Paper our aim is to present how to keep confidentiality in between two or more persons by using Sumudu transform and Cryptography. In the first part of the paper we will consider one message in plain-text and convert it in confidential form by applying Sumudu transform to trigonometric sine series. In second part we will convert this confidential message to our original message by applying inverse Sumudu transform.
[1] A.D. Poularikas, The Transform and Applications Hand-book, McGrahill, 2000.
[2] A.P. Hiwarekar, “A New method of Cryptography using Laplace transform of Hyper geometric function,” International Journal of Mathematical Archive, vol. 4, no. 2, 2013.
[3] David Burton, Elementary Number Theory, Seventh edition, McGraw, 2017.
[4] D.S. Bodkhe, and S.K. Panchal, “Use of Sumudu Transform in Cryptography,” Bulletin of the Marathwada Mathematical Society, vol.16, no.1, pp.1-6, 2015.
[5] G.R. Blakely, “Twenty Years of Cryptography in the Open Literature,” Proceedings of the IEEE Symposium on Security and Privacy, pp. 106-107, 1999. Crossref, https://doi.org/10.1109/SECPRI.1999.766903
[6] T.H. Barr, Invitation to Cryptography, Prentice Hall, 2002.
[7] Sumudu Transforms: A New Integral Transform to Solve Differential Equations and Control Engineering Problems,” Mathematical Engineering in Industry, vol. 6, pp. 319-329, 1998.
[8] Fethi Bin Muhammad Belgacem, “Boundary value problems with indefinite weight and applications,” International Journal of problems of Nonlinear Analysis in Engineering systems, vol. 2, no. 10, pp.51-58, 1999.
[9] Hassan Eltayeb, and Adem Kilicman, “A Note on the Sumudu Transform and Differential Equations,” Applied Mathematical Sciences, vol. 4, no.22, pp. 1089-1098, 2010.
[10] Murray R. Spigel, “Theory and Problems of Laplace Transforms,” International Journal of Mathematical education in Science and Technology, vol. 29, no. 1, pp. 618-621, 1998.
[11] G. Naga Lakshmi, B. Ravikuar, and A. Chandra Sekher, “A Cryptographic Scheme of Laplace Transforms,” International Journal of Mathematical Archive, vol. 2, no. 12, pp. 65-70, 2011.
[12] William Stallings, Cryptography and Network Security, Fourth Edition, Prentice Hall, 2005.
[13] A.P. Stakhov, “The Golden Matrices and A New Kind of Cryptography,” Chaos, Solutions and Fractals, vol. 32, no. 3, pp.1138-1146, 2007. Crossref, https://doi.org/10.1016/j.chaos.2006.03.069
[14] Muniru Aderemi Asiru, “Further Properties of the Samudu Transform and Its Applications,” International Journal of Mathematical education in science and Technology, vol. 33, no. 3, pp. 441-449, 2002. Crossref, https://doi.org/10.1080/002073902760047940
[15] Sarita Poonia, “Solution of Differential Equations Using Sumudu Transforms,” International Journal of Mathematics and Computer Research, vol. 2, no. 1, pp. 316-323, 2014.
[16] Lokenath Debnaths, and Dambaru Bhatta, Integral Transforms and Their Applications, Third Edition, University of Texas-Pan American Edinburg, USA.
[17] Thomas Koshy, Elementary Number Theory with Applications, Second edition, Academic Press, 2007.
[18] Alexander Stanoyevitch, Introduction to Cryptography with Mathematical Foundation and Computer Implementations, CRC Press, 2002.
[19] Fethi Bin Muhammad Belgacem, and Ahmad Abdullatif Karaballi, “Sumudu Transform Fundamental Properties Investigations and Applications,” Journal of Applied Mathematics and Stochastic Analysis, 2006. Crossref, https://doi.org/10.1155/JAMSA/2006/91083
[20] Tarig M. Elzaki, Salih M. Elzaki, and Eman M.A. Hilal, “Transform and Sumudu Transform for solving some Differential Equations,” Global Journal of Pure and Applied Mathematics, vol. 8, no. 2, pp. 167-173, 2012.
[21] Tarig M. Elzaki, “The New Integral Transform ‘Elzaki Transform’,” Global Journal of Pure and Applied Mathematics, vol. 7, no. 1, pp. 57-64, 2011.
Hemant K. Undegaonkar, "Confidentiality in Communication by using Sumudu transform and Cryptography," International Journal of Mathematics Trends and Technology (IJMTT), vol. 69, no. 2, pp. 25-28, 2023. Crossref, https://doi.org/10.14445/22315373/IJMTT-V69I2P503