Mathematical modeling for cryptography using Jafari transformation method
Abstract
Data protection is representing a huge trade in the modern era; the vast communication development gave this field increased attention from all sorts of parties (friends and foes); integral transforms have played a decent role in many methods that are proposed to be used in the cryptography field.
In this work, the Jafari integral transform has been used as a part of a symmetric key system, by implementing a practical example in encryption and decryption; Jafari integral transform has proven its capability to be invested in cryptography and in the data security field in general.
In this work, the Jafari integral transform has been used as a part of a symmetric key system, by implementing a practical example in encryption and decryption; Jafari integral transform has proven its capability to be invested in cryptography and in the data security field in general.
Keywords
Jafari integral transform, Cryptosystem, Encryption, Decryption, Symmetric key system, Asymmetric key system, Private key, Public key.
Full Text:
PDFDOI: http://dx.doi.org/10.21533/pen.v9i4.2438
Refbacks
- There are currently no refbacks.
Copyright (c) 2021 Eman A. Mansour, Noor Kadhim Meftin
This work is licensed under a Creative Commons Attribution 4.0 International License.
ISSN: 2303-4521
Digital Object Identifier DOI: 10.21533/pen
This work is licensed under a Creative Commons Attribution 4.0 International License