0% found this document useful (0 votes)
52 views3 pages

Security in Communication by Using Laplace

The document presents a method for encrypting and decrypting messages using Laplace transforms and cryptography. Plaintext is converted to ciphertext by taking the Laplace transform of a trigonometric function with the plaintext as coefficients. The ciphertext can be converted back to plaintext using the inverse Laplace transform. An example is provided to demonstrate the method.

Uploaded by

Noor Alshibani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views3 pages

Security in Communication by Using Laplace

The document presents a method for encrypting and decrypting messages using Laplace transforms and cryptography. Plaintext is converted to ciphertext by taking the Laplace transform of a trigonometric function with the plaintext as coefficients. The ciphertext can be converted back to plaintext using the inverse Laplace transform. An example is provided to demonstrate the method.

Uploaded by

Noor Alshibani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 8, ISSUE 12, DECEMBER 2019 ISSN 2277-8616

Security In Communication By Using Laplace


Transforms And Cryptography
Dr.Hemant K. Undegaonkar

Abstract: In this paper we will show that how to increase the security in communication between two persons by using Laplace transform &
cryptography .In the first part of the paper we will consider one plain text (original message) and convert it to cipher text(text in hidden form) by applying
Laplace transform to trigonometric cosine function. In second part we will convert this cipher text to plain text by applying inverse Laplace transform.

Key-words: Laplace transform, Inverse Laplace transform, Cryptography, Plain text, cipher text, encryption, decryption
——————————  ——————————

INTRODUCTION: Where the kernel of this transform and p is is the


The word Cryptography comes from the Greek word transform variable which is a complex number.
Kryptos which means hidden and graphein means ‘to write’. Def.1.1.2: If F(p)is the Laplace transform of f(x) then the
Cryptography is the branch in which we study some inverse Laplace transform of F(p) is f( ) and we
techniques to convert our original message to such a write * ( )+ ( )
message which could not be easily understandable without Def.1.1.3: [3] [The relation of congruent modulo n]
providing some additional information or formula. Original Let n be a positive integer. Then an integer is congruent
message which is to be converted to hidden form is called
as plain text and the converted form is called s cipher text. to an integer modulo n if n divides .If is congruent
The conversion of plain text to cipher text is called as
encryption and the conversion from cipher text to plain text to modulo n then symbolically we write ( ). If
is called as decryption. After demonetization in 2016 people
is not congruent to modulo n then we denote it as
prefers cashless transactions like ATM, PaYTM, Mobile
banking, internet banking, etc.Password or Code is ( )
necessary to operate all these facilities. In Mathematics Theorem 1.1.4:[2] Let
there are some integral transforms like Laplace transform, , given
Sumudu transform, Fourier transform etc. Integral plaintext in terms of i=0, 1, 2, 3, 4,…… under Laplace
transforms play an important role in the process of transform of H can be converted to cipher text
encryption and decryption. The main aim of this paper is to = -26 for i =0, 1, 2, 3,……. where = (2i+2) (2i+3)
present method to create such a confidential text so that for i=0, 1, 2, 3, 4… and a key is given by
communication between two persons will be secured. = for i =0, 1, 2, 3, 4…
Integral transforms play an important role in solving
differential and integral equations and also in other
Theorem 1.1.5:[2] The given cipher text in terms of
sciences. In the process of cryptography there is a
With a given key can be
contribution of some integral transforms like Laplace
transform, Sumudu transform, and Elzaki transform. There converted to plain text under the inverse Laplace
are various kinds of techniques for the process of transform of
encryption and decryption found in literature [2], [4], [8]. A H =∑ where = ( )(
for i=0, 1,
)
new cryptographic scheme was developed by applying L.T. 2, 3, 4…... and =
to hyperbolic sine and cosine functions [2], [4].In this paper
we have applied Laplace transform and Inverse Laplace
transform to trigonometric sine function to derive such
2. Methodology for encryption & decryption
results regarding encryption decryption. in this Paper we will use the method to convert the given
plain text in to such a hidden text which could not Possible
1.1Some important definitions & theorems to crack without key by operating Laplace transforms.
Def.1.1.1 [6] we define Laplace transform of ( ) by Suppose that we are given A B C D E F G H………….Z. as
a plain text. In the first step we have to give the following
, ( )- ( ) ∫ ( ) . , Re (p)
allotment to letters in the given plain text.
A

———————————————— Consider the trigonometric sine series given by


 Dr.HemantK.Undegaonkar Assistant Professor Department of = +
Mathematics Bahirji marakMahavidyalaya,Basmathnagar = + +
Dist:Hingoli(Maharashtra) [email protected]
(1)
Let , (1)
We write
3207
IJSTR©2019
www.ijstr.org
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 8, ISSUE 12, DECEMBER 2019 ISSN 2277-8616

k = + ( ) 6 2 28 1 2

7 4 14
By operating L.T. to (2) we will obtain one equation
having some new variable in denominator and some values
in the numerator (we call them as resulting values say ) From the above table (4.1) we may generalize the result on
adjusting these resulting values such that encryption given below.
we obtain which is our Theorem (3.1)
required cipher text. As decryption is the reverse process
of encryption we can obtain plain text by applying I.L.T. under the Laplace transform of can be converted
of * +. To determine cipher text by applying L.T. to cipher text where ( )( )
to trigonometric cosine function we may use the above and key is given by
method by considering some series of the form .
.
3. Example Let us consider one plain text Now we will convert the obtained cipher text in to plain text
by applying the same methodology.
given below Applying Inverse Laplace transform to equation (2) we have
R E L I A N C E and by methodology 1.1.6
we will convert this plain text to cipher First suppose by our
allotment given plain text be equivalent to * , -+ =34 [ ] [ ] [ ]
17 4 11 8 0 13 2 4 [ ] [ ] [ ] [ ]
Suppose that Let =11,
(1) [
] then we obtain the same equation (1)
Case 1.In this case by taking m=1&n=1 equation (1) plain text 17 4 11 8 0 13 2 4i.e.
becomes R E L I A N C E Hence in general we have
Kysiny=17 Theorem (3.2) The given cipher text With a given key
Can be converted to plain text under the I.L.T.
( )
Applying Laplace transform to both sides we have of , - =∑ where ( )[ ]
, - Where ,j
* + * }+ * + * }+ * + * + Case 2In this case by taking m=1&n=2 equation (1)
becomes
* +- * +
+
, -=
Let us assume that =
, , and we will obtain Operating Laplace transform to the above equation we
such that have
as follows , -
* + * }+ * + * }+ * +
{ }
* + - * +
,

Thus we have converted , -


given plain text
R E L I A N C E to cipher text i.e. in secret
form as Let us assume that =
8 10 14 14 0 0 2 14 i.e. I K O O A A ,
B M and we will obtain such that
as follows
( )
i =

0 17 34 1 8

1 4 10

2 11 66 2 14
,
3 8 14
Thus we have converted
4 0 0 0 0 given plain text
R E L I A N C E to cipher text i.e. in secret
5 13 6 0
form as
3208
IJSTR©2019
www.ijstr.org
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 8, ISSUE 12, DECEMBER 2019 ISSN 2277-8616

10 6 10 10 2 6 2 2 14 i.e. K G K K C I would like to thanks to Principal, N.E.S.Science College


G C C thus we have Nanded for providing me library facilities to complete my
research work. Also I am thankful to the principal Dr.
( ) R.N.Ingle & I.Q.A.C.Co-ordinator Dr.P.G.Gawali for
providing me some local facilities.
i =

5. References
0 17 68 3 [1] ]A.D. Poularika (McGraHill, 2000) Second edition
The Transforms and Applications Hand-book
1 4 [2] A.P. Hiwarekar: A new method of Cryptography
2 11 192 7 10 using Laplace transform of Hyperbolic function,
International Journal of Mathematical archive,
3 8 39 2013,4(2),pp.206-213
4 0 5120 197
[3] David M. Burton: Elementary number theory,
5 13
Seventh edition, McGraw Hill Education (India)
6 2 114688 4411 2
7 4 20165 2 Private Limited New Delhi.
[4] G. Naga Lakshmi, B. Ravikuar and A. Chandra
From the above table we may generalize the result on Sekher, A Cryptographic Scheme of Laplace
encryption and decryption given below. transforms, International Journal of Mathematical
Theorem(3.3) . archive, 2011, pp. 65-70
[5] G.A.Dhanorkar and A.P.Hiwarekar, A generalized
Then the given plain text in terms of can be transformed
Hill ciphers using Matrix transformation
to cipher text = by applying Laplace transform.
international Journal of Math.Sci and Engineering
to where
applications, Vol.5.no. 4(July 2011).pp. 19-23.
( ) ( ) and key is given by [6] Poularikas A.D., 1996. The transforms and
applications handbook, CRC Press, USA.
[7] Jaegar J.C. 1961, An Introduction to the Laplace
Theorem (3.4) The given cipher text , with a transformation with Engineering applications,
given key Can be converted to plain text under the Methuen London.
( ) [8] Johannes A. Buchmann, Introduction to
Inverse Laplace transform of , - =∑ Cryptography, Fourth Edition, Indian Reprint,
where Springer, (2009).

( ) [ ] Where ,
( ))
From the above two cases and derived theorems (2.1) to
(2.4) we make more generalization regarding encryption
and decryption as follows.
Theorem(3.5)
Then the given plaintext in terms of under the Laplace
transform of can be converted to cipher text
where
( ) ( )( ) ( ) and key
is given by
Theorem (3.6) The given cipher text , with a
given key Can be converted to plain text under the
( )
inverse Laplace transform of , - =∑
where
( ) [ ( )( ) (
]Where
)
,j

4. Conclusions
From the above theory part proved it is clear that by
changing values of m&n we will obtain different cipher texts
for given plain text which cannot be easily cracked without
providing some additional information. Thus Laplace
transform with cryptography plays an important role in
communication security.

5. Acknowledgements
3209
IJSTR©2019
www.ijstr.org

You might also like