Abstract

The surgent availability of data and the demand for more data to implement several technological products which heavily depends on data have made the issue of cyber attacks, a global threat, of great concern. To ensure the protection of information, the heart of every nation, the development of formidable techniques which contribute to the advancement of present schemes is crucial to combat the challenge. In this research work, a mathematical framework, from the idea of cryptography, is developed using Jensen polynomial. Jensen polynomial is used for the encryption algorithm, and the Laplace transform is used as a transformation tool to convert the plain text message to cipher text message. The decryption is a reversal which involves the use of structured mathematical techniques and the key for the message.

Highlights

  • Cryptography has always played major role in the security of information

  • This research is to contribute to the new research direction of developing cryptographic schemes using Laplace transform as a transformation tool for encryption of text message from plain text to cipher text

  • The integer coefficients, which play an important role in the encryption algorithm of the message, are restricted to the coefficients of the polynomials adopted for the schemes

Read more

Summary

Introduction

Cryptography has always played major role in the security of information. There are many existing cryptographic schemes which are being adopted for internet security measure. The integer coefficients, which play an important role in the encryption algorithm of the message, are restricted to the coefficients of the polynomials adopted for the schemes. This may open these schemes to brute force attack, or cryptanalytic attack, or both. The functions and polynomials used by the authors are to generate integer coefficients for the Laplace transformation which plays an integral part of the schemes. Such coefficients which are restricted to the coefficients of the hyperbolic functions, exponential functions or polynomials which are well-known can expose such schemes to cryptanalysis attacks.

Major Result Preliminaries
Encryption Algorithm
Methodology
Security Analysis
Conclusion
(11) References
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.