Cryptography is the science of providing security for information, It has been used historically as a means of providing secure communication between individuals. Message encryption has become very essential to avoid the threat against possible attacks by hackers during transmission process of the message. In this paper authors have proposed a method of cryptography, in which authors have used Aboodh transform for encrypting the plain text and corresponding inverse Aboodh transform for decryption.
Published in | Pure and Applied Mathematics Journal (Volume 5, Issue 5) |
DOI | 10.11648/j.pamj.20160505.12 |
Page(s) | 151-154 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2016. Published by Science Publishing Group |
Cryptography, Encryption, Decryption, Aboodh Transform
[1] | K. S. Aboodh, The New Integral Transform “Aboodh Transform” Global Journal of pure and Applied Mathematics, 9 (1), 35-43 (2013). |
[2] | K. S. Aboodh, Application of New Transform “Aboodh transform” to Partial Differential Equations, Global Journal of pure and Applied Math, 10 (2), 249-254 (2014). |
[3] | Khalid SulimanAboodh, Homotopy Perturbation Method and Aboodh Transform for Solving Nonlinear Partial Differential Equations, Pure and Applied Mathematics JournalVolume 4, Issue 5, October 2015, Pages: 219-224. |
[4] | Khalid SulimanAboodh, Solving Fourth Order Parabolic PDE with Variable Coefficients Using Aboodh Transform Homotopy Perturbation Method, Pure and Applied Mathematics Journal 2015; 4 (5): 219-224. |
[5] | A. P. Hiwarekar “A NEW METHOD OF CRYPTOGRAPHY USING LAPLACE TRANSFORM”International Journal of Mathematical Archive-3 (3), 2012, Page: 1193-1197. |
[6] | A. P. Stakhov, “The golden matrices and a new kind of cryptography”, Chaos, Soltions and Fractals. |
[7] | Stallings W., Cryptography and Network Security, Fourth Edition, Prentice Hall, 2005. |
[8] | Grewal B. S. – Higher Engineering Mathematics, Khanna Pub. Delhi, 2005. |
[9] | Barr T. H., Invitation to Cryptography, Prentice Hall, (2002). |
[10] | Blakley G. R., Twenty years of Cryptography in the open literature, Security and Privacy 1999, Proceedingsof the IEEE Symposium, 9-12, May 1999. |
[11] | Petersen K. – Notes on Number Theory and Cryptography, http://www.math.unc.edu/ Faculty petersen/ Coding/cr2.pdf. |
[12] | Overbey J. - Traves W. and Wojdylo J. – On the Key space of the Hill Cipher, Cryptologia, 29 (1), January 2005, 59-72. |
[13] | A. P. Hiwarekar, Application of Laplace Transform For Cryptographic Scheme, Proceedings of the World Congress on Engineering 2013 Vol I, WCE 2013, July 3 - 5, 2013, London, U.K. |
[14] | Swati Dhingra, Archana A. Savalgi, Swati Jain, Laplace Transformation based Cryptographic Technique in Network Security, International Journal of Computer Applications (0975 – 8887) Volume 136 – No. 7, February 2016. |
[15] | A. P. Hiwarekar, A NEW METHOD OF CRYPTOGRAPHY USING LAPLACE TRANSFORM, International Journal of Mathematical Archive-3 (3), 2012, Page: 1193-1197. |
[16] | Abdulkadir Baba HASSAN, Matthew Sunday ABOLARIN, Onawola Hassan JIMOH, The Application of Visual Basic Computer Programming Language to Simulate Numerical Iterations, Leonardo Journal of Sciences, Issue 9, July-December 2006 p. 125-136. |
APA Style
Abdelilah K. Hassan Sedeeg, Mohand M. Abdelrahim Mahgoub, Muneer A. Saif Saeed. (2016). An Application of the New Integral “Aboodh Transform” in Cryptography. Pure and Applied Mathematics Journal, 5(5), 151-154. https://doi.org/10.11648/j.pamj.20160505.12
ACS Style
Abdelilah K. Hassan Sedeeg; Mohand M. Abdelrahim Mahgoub; Muneer A. Saif Saeed. An Application of the New Integral “Aboodh Transform” in Cryptography. Pure Appl. Math. J. 2016, 5(5), 151-154. doi: 10.11648/j.pamj.20160505.12
AMA Style
Abdelilah K. Hassan Sedeeg, Mohand M. Abdelrahim Mahgoub, Muneer A. Saif Saeed. An Application of the New Integral “Aboodh Transform” in Cryptography. Pure Appl Math J. 2016;5(5):151-154. doi: 10.11648/j.pamj.20160505.12
@article{10.11648/j.pamj.20160505.12, author = {Abdelilah K. Hassan Sedeeg and Mohand M. Abdelrahim Mahgoub and Muneer A. Saif Saeed}, title = {An Application of the New Integral “Aboodh Transform” in Cryptography}, journal = {Pure and Applied Mathematics Journal}, volume = {5}, number = {5}, pages = {151-154}, doi = {10.11648/j.pamj.20160505.12}, url = {https://doi.org/10.11648/j.pamj.20160505.12}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.pamj.20160505.12}, abstract = {Cryptography is the science of providing security for information, It has been used historically as a means of providing secure communication between individuals. Message encryption has become very essential to avoid the threat against possible attacks by hackers during transmission process of the message. In this paper authors have proposed a method of cryptography, in which authors have used Aboodh transform for encrypting the plain text and corresponding inverse Aboodh transform for decryption.}, year = {2016} }
TY - JOUR T1 - An Application of the New Integral “Aboodh Transform” in Cryptography AU - Abdelilah K. Hassan Sedeeg AU - Mohand M. Abdelrahim Mahgoub AU - Muneer A. Saif Saeed Y1 - 2016/09/09 PY - 2016 N1 - https://doi.org/10.11648/j.pamj.20160505.12 DO - 10.11648/j.pamj.20160505.12 T2 - Pure and Applied Mathematics Journal JF - Pure and Applied Mathematics Journal JO - Pure and Applied Mathematics Journal SP - 151 EP - 154 PB - Science Publishing Group SN - 2326-9812 UR - https://doi.org/10.11648/j.pamj.20160505.12 AB - Cryptography is the science of providing security for information, It has been used historically as a means of providing secure communication between individuals. Message encryption has become very essential to avoid the threat against possible attacks by hackers during transmission process of the message. In this paper authors have proposed a method of cryptography, in which authors have used Aboodh transform for encrypting the plain text and corresponding inverse Aboodh transform for decryption. VL - 5 IS - 5 ER -