Abstract
Ever since the beginning of time, people have valued privacy and information security. Information security is becoming increasingly vital in our digital society. The authentication system's protection of hidden information is crucial. One of the most significant methods used to protect data and secure message transmission is cryptography. There are the two components for the encoding and decoding process which includes the algorithm and key. Cryptography is made more secured by utilising a key for both encryption and decryption. Introduction: In many circumstances, the sender wants to keep the message private from the public or from unauthorised users. Information is protected using encryption, and the original message is unlocked using decryption. Various Techniques are found in literature and further we extend the findings by combining the Elzaki and Aboodh transforms to encrypt the message and apply their inverse transforms to decrypt it with the ASCII values under modulo 255. Objectives: In this paper we focused on two stages of encryption and two stages of decryption under modulo 255. Methods: Using different transformation techniques, we have encrypted and decrypted the data. One is Laplace transform technique while the other is Aboodh-Elzaki transform technique. Results: The text message is converted to coded message by using both Laplace transform technique and Aboodh-Elzaki transforms technique. Conclusions: In the current paper, we present a novel method that encrypts data using Laplace transform and decrypts it using the private key, which is under modulo255. The two integral transforms are used to increase the message's level of security during decryption by selecting a new function and altering the other elements.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.