CFP last date
20 December 2024
Reseach Article

Laplace Transformation based Cryptographic Technique in Network Security

by Swati Dhingra, Archana A. Savalgi, Swati Jain
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 136 - Number 7
Year of Publication: 2016
Authors: Swati Dhingra, Archana A. Savalgi, Swati Jain
10.5120/ijca2016908482

Swati Dhingra, Archana A. Savalgi, Swati Jain . Laplace Transformation based Cryptographic Technique in Network Security. International Journal of Computer Applications. 136, 7 ( February 2016), 6-10. DOI=10.5120/ijca2016908482

@article{ 10.5120/ijca2016908482,
author = { Swati Dhingra, Archana A. Savalgi, Swati Jain },
title = { Laplace Transformation based Cryptographic Technique in Network Security },
journal = { International Journal of Computer Applications },
issue_date = { February 2016 },
volume = { 136 },
number = { 7 },
month = { February },
year = { 2016 },
issn = { 0975-8887 },
pages = { 6-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume136/number7/24163-2016908482/ },
doi = { 10.5120/ijca2016908482 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:36:24.399600+05:30
%A Swati Dhingra
%A Archana A. Savalgi
%A Swati Jain
%T Laplace Transformation based Cryptographic Technique in Network Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 136
%N 7
%P 6-10
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Information security has been an essential part of human life from old time. In computer society, information protection turns out to be more vital for humankind and new rising technologies are developing in a perpetual stream. Cryptography is one of the most important techniques used for securing transmission of messages and protection of data. It provides privacy and security for the secret information by hiding it from unauthorized users. In this paper authors have proposed a method of cryptography, in which authors have used Laplace transform for encrypting the plain text and corresponding inverse Laplace transform for decryption. This paper is based on the work of [1,2,3,4].

References
  1. A.P.Hiwarekar, Application of Laplace Transform For Cryptographic Scheme, Proceedings of the World Congress on Engineering 2013 Vol I, WCE 2013, July 3 - 5, 2013, London, U.K.
  2. G.Naga Lakshmi, B.Ravi Kumar and A.Chandra Sekhar, A cryptographic scheme of Laplace transforms, International Journal of Mathematical Archive-2, 2515-2519, (2011).
  3. Hiwarekar A.P., A new method of cryptography using Laplace transform, International Journal of Mathematical Archive,3(3),1193-1197,(2012).
  4. Hiwarekar A.P., A new method of cryptography using Laplace transform of hyperbolic functions, International Journal of Mathematical Archive,4(2),208-213,(2013).
  5. A.P. Stakhov, “The golden matrices and a new kind of cryptography”, Chaos, Soltions and Fractals 32((2007) pp1138–1146
  6. A.P. Stakhov. “The golden section in the measurement theory”. Compute Math Appl; 17(1989):pp613–638.
  7. Alexander Stanoyevitch, Introduction to cyrptography with mathematical foundations and computer implementations, CRC Press, (2002).
  8. Barr T.H., Invitation to Cryptography, Prentice Hall, (2002).
  9. Blakley G.R., Twenty years of Cryptography in the open literature, Security and Privacy 1999, Proceedingsof the IEEE Symposium, 9-12, (May1999).
  10. Eric C., Ronald K., James W.C., Network Security Bible Second edn., Wiley India pub.(2009).
  11. Johannes A. Buchmann, Introduction to Cryptography, Fourth Edn., Indian Reprint ,Springer,(2009).
  12. Stallings W., Cryptography and network security, 4th edition, Prentice Hall, (2005).
  13. Stallings W., Network security essentials: Applications and standards,first edition, Pearson Education, Asia, (2001).
  14. Dhanorkar G.A. and Hiwarekar A.P., A generalized Hill cipher using matrix transformation, International J.of Math. Sci. & Engg. Appls,Vol. 5 No.IV, 19-23, (July 2011).
  15. Overbey J., Traves W.and Wojdylo J., On the Keyspace of the Hill Cipher, Cryptologia, 29, 59-72, (January 2005).
  16. Saeednia S., How to Make the Hill Cipher Secure, Cryptologia, 24, 353-360, (October 2000).
  17. Sukalyan Som and Moumita Som. Article: DNA Secret Writing with Laplace Transform. International Journal of Computer Applications 50(5):44-50, (July 2012).
  18. Sumee Rai, Nidhi Tyagi and Pradeep Kumar. Article:Secure communication for mobile Adhoc network using(LPIT) Lagrange polynomial and Integral transform with Exponential Function. International Journal of Innovative Research in Advanced Engineering (IJIRAE), Volume 1 Issue 6 (July 2014)
Index Terms

Computer Science
Information Sciences

Keywords

Laplace Transform Network Security Cryptography