New Method of Cryptography With Python']Python Code Using Elzaki Transform and Linear Combination of Function

被引:0
|
作者
Raut, P. P. [1 ]
Hiwarekar, A. P. [2 ]
机构
[1] Savitribai Phule Pune Univ, New Horizon Inst Technol & Management, New Horizon Educ Soc, Thana, Maharashtra, India
[2] Savitribai Phule Pune Univ, Vidya Pratishthans Kamalnayan Bajaj Inst Engn & Te, Pune, Maharashtra, India
来源
关键词
Cryptography; Elzaki transform; Information security; Encryption; Decryption;
D O I
10.26713/cma.v14i3.2458
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
In today's digital world, cybercrime has become biggest challenge to face in order to keep the confidential information secure from intruders. The security mechanisms used to curb the cyberattacks, need to be improvised on constant basis with the help of advanced mathematical techniques. This paper deals with new cryptography based iterative method by using successive Elzaki transform of linear combination of functions for encryption and corresponding inverse Elzaki transform for decryption. Starting with a detailed procedure, we presented our work in the form of result. Further, it is generalized and then we applied the iterative method for making our algorithm more secure. We also implemented this method programmatically using PYTHON language which fits current needs. Finally, we illustrate our results with suitable examples.
引用
收藏
页码:1245 / 1254
页数:10
相关论文
共 50 条
  • [1] NEW CRYPTOSYSTEM USING LINEAR COMBINATION OF FUNCTION AND SUMUDU TRANSFORM WITH PYTHON']PYTHON CODE
    Raut, P. P.
    Hiwarekar, A. P.
    TWMS JOURNAL OF APPLIED AND ENGINEERING MATHEMATICS, 2025, 15 (01): : 197 - 206
  • [2] Linear Algebraic Louvain Method in Python']Python
    Low, Tze Meng
    Spampinato, Daniele G.
    McMillan, Scott
    Pelletier, Michel
    2020 IEEE 34TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS (IPDPSW 2020), 2020, : 223 - 226
  • [3] Using AI to Inject Vulnerabilities in Python']Python Code
    Bogaerts, Frederic C. G.
    Ivaki, Naghmeh
    Fonseca, Jose
    2023 53RD ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS, DSN-W, 2023, : 223 - 230
  • [4] A New Evaluation Metrics for Block-based Python']Python Code
    Liu, Zheng
    Luo, Hong
    Chai, Xiaolin
    2019 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN (ICCE-TW), 2019,
  • [5] Idiomatizing Python']Python Source Code Using Different Recurrent Architectures
    Szalontai, Balazs
    Marton, Tamas
    Kukucska, Akos
    Pinter, Balazs
    Gregorics, Tibor
    INTELLIGENT SYSTEMS AND APPLICATIONS, VOL 3, INTELLISYS 2024, 2024, 1067 : 228 - 242
  • [6] Using Python']Python for large scale linear algebra applications
    Bröker, O
    Chinellato, O
    Geus, R
    FUTURE GENERATION COMPUTER SYSTEMS, 2005, 21 (06) : 969 - 979
  • [7] Don't DIY: Automatically transform legacy Python']Python code to support structural pattern matching
    Rozsa, Balazs
    Antal, Gabor
    Ferenc, Rudolf
    2022 IEEE 22ND INTERNATIONAL WORKING CONFERENCE ON SOURCE CODE ANALYSIS AND MANIPULATION (SCAM 2022), 2022, : 164 - 169
  • [8] Using Relative Lines of Code to Guide Automated Test Generation for Python']Python
    Holmes, Josie
    Ahmed, Iftekhar
    Brindescu, Caius
    Gopinath, Rahul
    Zhang, He
    Groce, Alex
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2020, 29 (04)
  • [9] Python']Python Source Code De-Anonymization Using Nested Bigrams
    Hozhabrierdi, Pegah
    Hitos, Dunai Fuentes
    Mohan, Chilukuri K.
    2018 18TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW), 2018, : 23 - 28
  • [10] A review of Python']Python-based code for landslide modeling and inversion using Electrical Resistivity Tomography method
    Jabrane, Oussama
    Martinez-Pagan, Pedro
    El Azzab, Driss
    Martinez-Segura, Marcos A.
    Urruela, Aritz
    SOFTWARE IMPACTS, 2023, 16