New Mathematical Modeling For Cryptography
New Mathematical Modeling For Cryptography
net/publication/301585534
CITATIONS READS
9 5,211
1 author:
Anil Hiwarekar
Vidya Pratishthan’s Kamalnayan Bajaj Institute of Engineering and Technology, Baramati (S.P.University of Pune), India.
22 PUBLICATIONS 85 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
BETTER NETWORK SECURITY USING GENERALISED HILL CIPHER ALGORITHAM View project
All content following this page was uploaded by Anil Hiwarekar on 23 April 2016.
Abstract : Information protection has been an important computer and information security is obvious. To be
part of human life from ancient time. In computer society, secured, information needs to be protected from
information security becomes more and more important unauthorized access. Hence, data security has become a
for humanity and new emerging technologies are critical and imperative issue. One of the widely used
developing in an endless stream. Cryptography is one of approaches for information security is Cryptography.
the most important techniques used for securing Cryptography, the mathematic of encryption, plays a
transmission of messages and protection of data. vital role in many fields.
Examples includes, e-commerce; electronic The fundamental objective of cryptography is to
communications such as mobile communications, enable two people, to communicate over an insecure
sending private emails; business transactions; Pay-TV; channel in such a way that an opponent cannot
transmitting financial information; security of ATM understand what is being said. Encryption is the process
cards; computer passwords etc, which touches on many of obscuring information to make it unreadable without
aspects of our daily lives. Cryptography provides privacy special knowledge. A cipher is an algorithm for
and security for the secret information by hiding it. It is performing encryption (and the reverse, decryption) a
done through mathematical technique. series of well-defined steps that can be followed as a
Laplace transform has many applications in procedure. The original information is known as plain
various fields here we discuss its new application to text, and the encrypted form as cipher text. The cipher
cryptography. This paper presents a new iterative method text message contains all the information of the plaintext
for cryptography, in which we apply successive Laplace message, but is not in a format readable by a human or
transform of suitable function for encrypting the plain computer without the proper mechanism to decrypt it.
text and apply corresponding inverse Laplace transform Ciphers are usually parameterized by a piece of auxiliary
for decryption. Generalization of the results is also information, called a key. The encrypting procedure is
obtained. varied depending on the key which changes the detailed
Encryption by Laplace Transform is resistance operation of the algorithm. Without the key, the cipher
to nearly all types of attacks on symmetric encryption cannot be used to encrypt, or more importantly, to
algorithms. There is flexibility in implementation of decrypt, [1, 2, 3, 5, 6, 7, 10, 11, 12]. Various techniques
algorithms. One can implement the algorithms as per the for cryptography are found in literature [1], [2], [3], [5],
application demands. We can find many application of [12], [17], [18]. Mathematical technique using matrices
encryption by Laplace Transform in banking, Security, for the same are found in Dhanorkar and Hiwarekar, [4];
One time password generation. Overbey,Traves and Wojdylo, [14]; Saeednia, [16]. In
Naga Lakshmi, Ravi Kumar and Chandra Sekhar, [7];
Key words: Cryptography, Data encryption, Applications to Hiwarekar, [10] and [11]; Vyavahare, Bani Upmanayu;
coding theory and cryptography, Algebraic coding theory; [21]; Sujitha, [19]; they encrypt a string by using series
cryptography, Laplace Transforms.
expansion of f(t) and its Laplace transform and the
results for cryptanalysis found in Gupta and Mishra [9].
1. Introduction DNA secret writing using Laplace transform is found in
In Today's world, with increasing usage of computer Sukalyan and Moumita [20].
networks and internet, the importance of network,
t }
algorithm and the key. The key is used for encryption
and decryption that makes the process of cryptography L{t n f F s,
3. ds (2.6)
secure. Here we require following results.
d
n
L1{ F s } t n f t ,
2.1. The Laplace Transform: If f (t ) is a function ds
defined for all positive values of t , then the Laplace [6, 8, 13, 15].
Transform of f (t ) is defined as
3. Main Results
L{ f (t )} F ( s ) e st f (t )dt , (2.1)
0
3.1 Encryption
provided that the integral exists. Here the parameter s is We consider standard expansion
a real or complex number. The corresponding inverse
1
Laplace transform is L {F ( s)} f (t ), [6, 8, 13, 15].
(3.1)
2.2. Theorem: Laplace transform is a linear transform.
That is, if
G5,0 = 19, G6,0 = 4, G7,0 =17, Gn,0 = 0 for n 8. G4,1 = 2 G5,1 = 0, G6,1 = 16, G7,1 = 20,
Writing these numbers as a coefficients of Gn ,1 = 0 for n 8.
t 2 sinh 2t , and assuming f (t ) Gt sinh 2t , we get
2
i 0
Gt 2 sinh 2t , (that is by writing them as a
coefficients of t 2 sinh 2t , and then taking the Laplace
2t 3 23 t 5 25 t 7 27 t 9
2 14 12 15 transform) can be converted to cipher text
1! 3! 5! 7!
9 11 11 13 13 15 Gi ,1 22i 1 2i 2 2i 3 Gi ,0 mod 26 (3.5)
2 t 2 t 2 t
20 19 4 qi ,1 26ki ,1 , for i 0,1, 2, 3, ,
9! 11! 13!
15 17
2 t
17 . where,
15! qi ,1 22i 1 2i 2 2i 3 Gi ,0 , i 0,1, 2,3, , (3.6)
Taking Laplace transform on both sides we have
and a key
L{ f (t )} L{Gt 2 sinh 2t}
qi ,1 Gi ,1
24 2240 16128 138240 ki ,1 for i 0,1, 2,3, . (3.7)
4 + 6 + + 26
s s s8 s10 (3.4) Now we apply the same operation again on the output of
1126400 6070272 6881280
+ the resulting cipher text obtained in the Theorem 3.1 and
s12 s14 s16 obtain its new form which is included in the following
151519232 theorem.
. Theorem 3.2: The given plain text in terms of
s18
under Laplace transform of
Adjusting the resultant values Gi ,1 t 2 sinh 2t, (that is by writing them as a coefficients
24 2240 16128 138240 1126400
6070272 6881280 151519232 of t 2 sinh 2t, and then taking the Laplace transform)
to mod 26 that is can be converted to cipher text
Gi ,2 Gi ,1 22 i 1 2i 2 2i 3 mod 26 (3.8)
24 24 mod 26, 2240 4 mod 26, qi ,2 26ki ,2 , i 0,1, 2, 3, ,
16128 8 mod 26, 138240 24 mod 26,
1126400 2 mod 26, 6070272 0 mod 26, where,
6881280 16 mod 26, 151519232 20 mod 26. qi ,2 Gi ,1 22i 1 2i 2 2i 3 , i 0,1, 2,3, , (3.9)
and a key
30 Hiwarekar
and assuming
qi ,1 Gi ,1 26ki ,1 , i 0,1, 2,3, .. (5.1) where
26ki ,0 Gi ,1
Gi ,0 , i 0,1, 2,3, , (5.5)
We consider
2
2 2 i 1
2i 2 2i 3
d 2
G
ds s 2 22 and
24 2240 16128 138240 qi ,0 26ki ,0 Gi ,1 , i 0,1, 2,3, . (5.6)
+ 6 + +
s4 s s8 s10 (5.2)
1126400 6070272 6881280 The generalized iterative theorem can be obtained on the
+ similar way which is included in the following
s12 s14 s16
Theorem 5.2: The given cipher text in terms of
151519232
. Gi , j , i, j 1, 2, 3 , with a given key
s18
n q ki , j 1 , i, j 1, 2,3 , can be converted to plain text
2ii ,1 4 .
i 0 s
Gi , j 1 under the inverse Laplace transform of
Taking inverse Laplace transform we get d
2
2 n q
G i2,ij41 , (5.7)
f (t ) Gt 2 sinh 2t ds s 2 i 0 s
2 2
2t 3 23 t 5 25 t 7
2 14 12
1! 3! 5! where
2 t7 9 9 11
2 t 211 t 13 26ki , j 1 Gi , j
15 20 19 Gi , j 1 , i, j 1, 2, 3, , (5.8)
7! 9! 11! (5.3) 2 2 i 1
2i 2 2i 3
13 15 15 17
2 t 2 t
4 17 and
13! 15!
qi , j 26ki , j Gi , j , i, j 1, 2, 3, , (5.9)
23 t 3 25 t 5
t 2 [G0,0 .2t G1,0 G2,0 Remark 5.1: The most generalized decryption theorem
3! 5!
corresponding to Theorem 4.2 can be obtained on the
27 t 7 29 t 9 211 t 11
G3,0 G4,0 G5,0 similar way.
7! 9! 11! Remark 5.2: Results in [7], G.Naga Lakshmi, B. Ravi
213 t 13 215 t 15 Kumar and A. Chandra Sekhar are obtained by
G6,0 G7,0 ]. t
13! 15! considering Laplace transform te and are generalized in
Here we have [10, 11], Hiwarekar. Results in [4], Dhanorkar and
G0,0 2, G1,0 14, G2,0 = 12, Hiwarekar are obtained by using generalized Hill cipher
algorithms.
G3,0 = 15, G4,0 = 20, G5,0 = 19, 4.1. Illustrative Examples
G6,0 = 4, G7,0 =17, Gn,0 = 0 for n 8. Using results obtained in Theorem 4.2, if we have
original message ‘COMPUTER’, then it gets converted
to
Here message 2 14 12 15 20 19 4 17 is 1. ‘YMSYGAWG’ for r 2, j 3, l 2,
equivalent to ‘COMPUTER’. 2. ‘COOCUAEW’ for r 2, j 6, l 2,
32 Hiwarekar
on Soft Computing for Problem Solving Advances Vidya Pratishthan’s College of Engineering Baramati
in Intelligent Systems and Computing Vol.258, from March 2001. Anil also has to his credit sixteen
2014, 539-546. publications out of which four research papers are
[10] Hiwarekar A.P., A new method of cryptography published in the International Journals and four in
using Laplace transform, International Journal of National Journals. He has presented eleven papers in
Mathematical Archive, 3(3), 1193-1197, (2012). International and National Conferences. He has attended
[11] Hiwarekar A.P., A new method of cryptography around twenty one workshops/ conferences/ Seminars
using Laplace transform of hyperbolic functions, and also attended seven summer /refresher courses. He
International Journal of Mathematical has an important role in organizing about twelve
Archive, 4(2), 208-213, (2013). conferences/ workshops / programs. He was a chairman
[12] Johannes A. Buchmann, Introduction to of one session of AMTI National Conference (Dec.2011)
Cryptography,Fourth Edn.,Indian Reprint , at Baramati. He is working on BCUD Research project
Springer, (2009). ‘Better Network Security Using Generalized Hill Cipher
[13] Lokenath Debnath, Dambaru Bhatta, Integrl Algorithm'. Sanctioned by University of Pune,
Transforms and Their Applications, Chapman and Maharashtra, India.
Hall/CRC,First Indian edn.(2010). He is a life member of ISTE, Marathwada Mathematical
[14] Overbey J., Traves W.and Wojdylo J., On the Society, Aurangabad and All India Mathematics
Keyspace of the Hill Cipher, Cryptologia, 29, 59- Teachers of India. He is also member of international
72, (January 2005). association of Engineers.
[15] Ramana B.V., Higher Engineering Mathematics,
Tata McGraw-Hills, (2007).
[16] Saeednia S., How to Make the Hill Cipher Secure,
Cryptologia, 24, 353-360, (October 2000).
[17] Stallings W., Cryptography and network security,
4th edition, Prentice Hall, (2005).
[18] Stallings W., Network security essentials:
Applications and standards, first edition, Pearson
Education, Asia, (2001).
[19] Sujitha S., Applications of Laplace Transforms in
Cryptography, International Journal of Mathematical
Archive, 4(3), 2013, 67-71.
[20] Sukalyan S., Moumita S., DNA Secret Writing
With Laplace Transform, International Journal of
Computer Applications, Vol. 50 – No.5, July 2012,
44-50.
[21] Vyavahare S., Bani Upmanayu, A, Cryptographic
Scheme using Infinite Series and Laplace
transform, Global Research Analysis,Vol.2, No.6
June 2013, 60-61.