Abstract

The need and the demand to hide the content of written messages from prying eyes has arisen as long as writing itself has existed. Particularly, in recent times the protection of information is considered to be quite crucial due to the increased use and development of streaming applications. Therefore, the urge to have more sophisticated, stronger and hard to break data encryption and decryption systems is increasing. In order to attain these requirements, cryptography plays an important role, where many researchers have come up with different proposals and developed algorithms that have helped out a little in ensuring the confidentiality, integrity and authentication of the given information. However, even the internet security through modern cryptography is quite complex and depends on the difficulty of certain computational problems in mathematics. Modern systems of encryption are based on complex mathematical algorithms and carry out a combination of symmetric and asymmetric key encryption schemes to secure communication. For those a significant background in algebra, number theory and geometry is required. In this paper a new cryptosystem is presented, which is based on compound commutative functions such as exponential and logarithmic functions. After the necessary theoretical deliberation in this paper, we will provide the encryption and decryption approach accompanied with relevant examples

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.