Mathematical modeling for cryptography using Jafari transformation method

Eman A. Mansour, Noor Kadhim Meftin

Abstract


Data protection is representing a huge trade in the modern era; the vast communication development gave this field increased attention from all sorts of parties (friends and foes); integral transforms have played a decent role in many methods that are proposed to be used in the cryptography field.
In this work, the Jafari integral transform has been used as a part of a symmetric key system, by implementing a practical example in encryption and decryption; Jafari integral transform has proven its capability to be invested in cryptography and in the data security field in general.

Keywords


Jafari integral transform, Cryptosystem, Encryption, Decryption, Symmetric key system, Asymmetric key system, Private key, Public key.

Full Text:

PDF


DOI: http://dx.doi.org/10.21533/pen.v9i4.2438

Refbacks

  • There are currently no refbacks.


Copyright (c) 2021 Eman A. Mansour, Noor Kadhim Meftin

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

ISSN: 2303-4521

Digital Object Identifier DOI: 10.21533/pen

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License