Mathematical modeling for cryptography using Jafari transformation method
DOI:
https://doi.org/10.21533/pen.v9.i4.994Abstract
Data protection is representing a huge trade in the modern era; the vast communication development gave this field increased attention from all sorts of parties (friends and foes); integral transforms have played a decent role in many methods that are proposed to be used in the cryptography field.
In this work, the Jafari integral transform has been used as a part of a symmetric key system, by implementing a practical example in encryption and decryption; Jafari integral transform has proven its capability to be invested in cryptography and in the data security field in general.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.




