0 views

The opening years of the twenty â€“first century have been remarkable ones for mathematical sciences. Mathematical sciences play an essential role in the physical & biological sciences, engineering, medicine, economics, finance & social science. [The mathematical science have become integral to many emerging industries]The mathematical sciences includes for more than numbers they deal with geometrical figures, logical patterns networks, randomness & Predictions from incomplete data, various transforms etc; & the mathematical sciences are part of almost every aspect of everyday life. Laplace transform is a powerful tool which is used in various areas of engineering and science. This paper deals with the application of Laplace transform in cryptography. Cryptology is the science and art of secret communications. Cryptography is the set method used to ensure the secrecy and authenticity of messages. Cryptology plays vital role in the provision of logical barriers to attacks on information systems security. In this paper we can take a review of applications of Laplace transform in cryptography.
https://journalnx.com/journal-article/20150235

- Network Security(seminar part1)
- syl_mca_sem5_comp.pdf
- New Trends in Cryptography
- Information Security - A Primer
- Analysis of a Hardware Security Module’s
- Crypto Agility Interoperability
- 06rr410504 Network Security and Cryptography
- Data Security Using Armstrong Numbers 1
- Cryptography
- A 04330104
- Security Threats and Their Sources
- A Novel Mechanism for Searching Keyword in Cloud by Using Dual-Server Public-Key Encryption
- fips
- 000011768
- cryptography
- CRYPTOGRAPHY
- ENCRYTED
- encrypt > encryption
- android based encrypted sms system.pptx
- i-Twin-Limitless-Pendrive-Technology-Full-Seminar-Report-and-PPT (4).ppt

You are on page 1of 3

NATIONAL CONFERENCE ON INNOVATIVE TRENDS IN ENGINEERING & TECHNOLOGY-2017

15TH & 16TH MARCH 2017

CONFERENCE PROCEEDINGS ISSN NO - 2454-7875

______________________________________________________________________________________________________________________________________________________________________________

Paper ID: NITET17

A SURVEY ON APPLICATION OF LAPLACE TRANSFORM IN

CRYPTOGRAPHY

PROF.(MS). SHUBHANGI GURAV.

A.G. Patil Institute of Technology Solapur, Solapur University, Department of Mathematics (General Science Engineering)

Email:shubhangigurav28@gmail.com

MS.DHANASHRI ALURE.

A.G. Patil Institute of Technology, Solapur University, Department of Computer Engineering.

Email:shivanialure@gmail.com

ABSTRACT DEFINITIONS

The opening years of the twenty –first century have ENCRYPTION- encryption is the process Converting the

been remarkable ones for mathematical sciences. intelligible message (Plain text) to its unintelligible

Mathematical sciences play an essential role in the form (The cipertext).

physical & biological sciences, engineering, DECRYPTION:-decryption is the process of converting

medicine, economics, finance & social science. [The the unintelligible message back to its intelligible Form

mathematical science have become integral to many the original under stable message.

emerging industries]The mathematical sciences CIPHER TEXT - is a method to transform a plain text

includes for more than numbers they deal with into Something that is difficult to understand.

geometrical figures, logical patterns networks, LAPLACE TRANSFORM:-If and (t) is function

randomness & Predictions from incomplete data, Defined on 0, ∞ ,then the Laplace transform of f(t) is

various transforms etc; & the mathematical sciences defined as

∞

are part of almost every aspect of everyday life.

Laplace transform is a powerful tool which is used in L f(t) = e−st f t dt = ∅ S

various areas of engineering and science. This paper 0

deals with the application of Laplace transform in provided that a function f(t) should satisfies the

cryptography. Cryptology is the science and art of following condition

secret communications. Cryptography is the set 1) f(t) is continuous

method used to ensure the secrecy and authenticity 2) limit as t → ∞ e−at f(t) is finite, then the

of messages. Laplace transform of f(t)

∞

Cryptology plays vital role in the provision of logical i.e. 0 e−at f t dt exists for s>a

barriers to attacks on information systems security.

In this paper we can take a review of applications of Inverse of Laplace transform – If L{ f(t)} is function in S

Laplace transform in cryptography. given as

KEYWORDS: Laplace transform, Cryptography, Plain L{f(t)}= ∅ S

text, Cipher text, inverse Laplace transform then inverse laplace transform is defined as follows

,Encryption, Decryption. L−1 ∅ S = f(t)

Laplace transform of some standard function

INTRODUCTION L{

K

} = K. L t n = K.

n!

tn s n +1

Cryptography has been defined As, The ‘umbrella word 1 t n −1

used to Describe the entire field of secret L−1 [ ]=

sn n−1 !

Communications.’ Standard expansion of sinhat

Cryptography Has been concerned with Protecting the a3t3 a5t5 a7t7 an tn

sinhat = at+ + + +⋯+

3! 5! 7! n!

secrecy of information Cryptography involves

mathematical Transformation of transformation. n

∞ (at )

Nowadays applicative mathematics Is plays an important = n=1 n!

role to make

Society technically advanced. In this Paper Laplace MAIN RESULT

transform is used for Cryptography .In [1], they encrypt We consider standard expansion

A string by using series of cosh2t and Its Laplace a3 t3 a5t5 a7 t7 an tn

tsinhat =at+ + + + ⋯+

3! 5! 7! n!

transform. In this paper use hyperbolic sine function.

74 | P a g e www.ijrpet.org

NOVATEUR PUBLICATIONS

INTERNATIONAL JOURNAL OF RESEARCH PUBLICATIONS IN ENGINEERING AND TECHNOLOGY [IJRPET]

NATIONAL CONFERENCE ON INNOVATIVE TRENDS IN ENGINEERING & TECHNOLOGY-2017

15TH & 16TH MARCH 2017

CONFERENCE PROCEEDINGS ISSN NO - 2454-7875

______________________________________________________________________________________________________________________________________________________________________________

= ∞ (at )

n

= ∞ (a) t 2i−1 2i

the given key k i i=0,1,2,3…as

n=1 n! i=0 2i−1 !

where aϵN is a constant with N is the set of natural 528228226200 36916814260000000

number. we allocated 0 to A and 1 to B then Z will be Here we have qi for i=0,1,2,3,…8 are respectively given

25.Let given message plain text string be ‘ PASSWORD ’. by

It is equivalent to

15 0 18 18 22 14 17 3 60 0 414720 92897280 40874803200 13733933880000

we assume that 121407975500000000

G0 = 15 G1 = 0 G2 = 18 9598371707000000000

G3 = 18 G4 = 22 G5 = 18 Using the formula

G6 = 17 G7 = 14 qi = 26 k i +Gi′ by [1]

f(t)=Gtsinh2t= d 1 ki 60 0 414720 92897280

23 t 3 25 t 5 27 t 7 29 t 9 2 11 t 11

G{- } = i=0 s 2i+1 = s 3

∞

+ + + +

ds (s 2 −2 2 ) s5 s7 s9

t{ G0 2t+G1 + G2 + G3 + G4 + G5 + 40874803200 13733933880000 1214079755 00000000

3! 5! 7! 9! 11!

2 13 t 13 2 15 t 15

+ + +

s 11 s 13 s 15

G6 + G7 9598371707000000000

13! 15!

.

s 17

23 t 3 25 t 5 27 t 7 29 t 9

=t{15 * 2 *t + 0∗ + 18* + 18* +22 * Taking inverse Laplace transform we get

3! 5! 7! 9!

2 11 t 11 2 13 t 13 2 15 t 15 23 t 4 25 t 6 27 t 8

+14* + 17 ∗ +14* } G tsinh2t=15 * 2 *t 2 + 0∗ + 18* + 18* +22

11! 13! 15! 3! 5! 7!

2 9 t 10 2 11 t 12 2 13 t 14 2 15 t 16

2i−1 t 2i

* +14* + 17 ∗ +14* .

9! 11! 13! 15!

∞ Gi (2)

= i=0 Hence we have

2i−1 !

Taking Laplace transform on both sides we have G0 = 15 G1 = 0 G2 = 18

L{f(t)} = L{G tsinh2t} = G3 = 18 G4 = 22 G5 = 18

23 t 4 25 t 6 27 t 8 2 9 t 10 G6 = 17 G7 = 14 for n ≥ 9.

L{15 * 2 *t 2 + 0∗ + 18* + 18* +22 *

3! 5! 7! 9!

which is equivalent to ‘PASSWORD’.

2 11 t 12 2 13 t 14 2 15 t 16

+14* + 17 ∗ +14* }

11! 13! 15!

CONCLUSION

=

60

+

0

+

414720

+

92897280

+

40874803200

+ In this paper we have studied in detail the concept of

s3 s5 s7 s9 s 11

13733933880000 121407975500000000 cryptography using Laplace transform. It is an important

+ +

s 13 s 15 and analytical tool that used for various applications.

9598371707000000000

+

s 17

This survey provides the researchers and students to

know about how Laplace transform is used in

to mod 26 the given plain text strings gets converts to cryptography

cipher text string

8 0 20 8 18 22 24 24 APPLICATIONS OF LAPLACE TRANSFORM

Hence the given message string ‘PASSWORD’ get Laplace transform is used to solve Boundary value

converted to ‘IAUISWYY’ with key k i for i=0,1,2,3…as problems,ordinary differential equation, Used in

2 0 15950 3572972 157210769 linear nonlinear difference equation ,steady state

528228226200 36916814260000000 solutions ,cryptography.

Gi′ = qi − 26 k i by [1] Also Laplace transform has huge applications in

electric circuit theory, it has complex applications

DECRYPTION: in power system as well.

We assume that the received message string be ‘ The Laplace transform can be applied to solve the

IAUISWYY ’which is equivalent to switching transient phenomenon in the series or

8 0 20 8 18 22 24 24 parallel RL, RC or RLC circuits

Assuming Laplace transform is a very effective mathematical

G0′ = 8 G1′ = 0 G2′ = 20 tool to simplify very complex problems in the area

′

G3 = 8 ′

G4 = 18 G5′ = 22 of stability and control.

′ ′

G6 = 24 G7 = 24 for n ≥ 9

75 | P a g e www.ijrpet.org

NOVATEUR PUBLICATIONS

INTERNATIONAL JOURNAL OF RESEARCH PUBLICATIONS IN ENGINEERING AND TECHNOLOGY [IJRPET]

NATIONAL CONFERENCE ON INNOVATIVE TRENDS IN ENGINEERING & TECHNOLOGY-2017

15TH & 16TH MARCH 2017

CONFERENCE PROCEEDINGS ISSN NO - 2454-7875

______________________________________________________________________________________________________________________________________________________________________________

Laplace transform has a lot of application in Physics 4) Electronic mail and firewall

and other sciences.

REFERENCES:

APPLICATIONS OF CRYPTOGRAPHY 1) A.P.Hiwarekar application of Laplace transform for

1) Mobile security cryptography.

2) Network security 2) Heigher Engineering Mathematics By B.S. Grewal

3) Information security 3) Information System Security By Nina Godbole.

76 | P a g e www.ijrpet.org

- Network Security(seminar part1)Uploaded byitdep_gpcet7225
- syl_mca_sem5_comp.pdfUploaded bysunuprvunl
- New Trends in CryptographyUploaded byShiv Saroj
- Information Security - A PrimerUploaded bySadashiv Vombatkere
- Analysis of a Hardware Security Module’sUploaded byjorges_santos
- Crypto Agility InteroperabilityUploaded byRichard Henderson
- 06rr410504 Network Security and CryptographyUploaded byandhracolleges
- Data Security Using Armstrong Numbers 1Uploaded byVinod Thete
- CryptographyUploaded bytimothyosaigbovo3466
- A 04330104Uploaded byIOSRJEN : hard copy, certificates, Call for Papers 2013, publishing of journal
- Security Threats and Their SourcesUploaded byNaveen
- A Novel Mechanism for Searching Keyword in Cloud by Using Dual-Server Public-Key EncryptionUploaded byLOGIC SYSTEMS
- fipsUploaded byShiva Krishnamoorthy
- cryptographyUploaded byapi-457004528
- CRYPTOGRAPHYUploaded byKondapalli Sandeep
- 000011768Uploaded byJairo Pinillos
- ENCRYTEDUploaded byXue Jing
- encrypt > encryptionUploaded byapi-25988294
- android based encrypted sms system.pptxUploaded bylekhareddy
- i-Twin-Limitless-Pendrive-Technology-Full-Seminar-Report-and-PPT (4).pptUploaded byAnanyarao Pinninti
- A Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSNUploaded byantonytechno
- Some Lessons in IntelligenceUploaded byGermán Aguirrezabala
- TJ-ACA: An Advanced Cryptographic Algorithm for Color Images using Ikeda MappingUploaded byseventhsensegroup
- Cloud Computing Approach using threshold Cryptography for Outsourced DataUploaded byIRJET Journal
- EFF: Key escrowUploaded byEFF
- Survey Paper1Uploaded byMahesh Tadalapur
- IJETTCS-2012-10-25-091Uploaded byAnonymous vQrJlEN
- 304067549-CSCU-Module-04-Data-Encryption-pdf.pdfUploaded bydace
- A Review Study on Secure Authentication in Mobile SystemUploaded byATS
- MY B.TECH PROJECTUploaded byshivamitra chiruthani

- Human IdentificationUploaded byJournalNX - a Multidisciplinary Peer Reviewed Journal
- Solar TrackerUploaded byJournalNX - a Multidisciplinary Peer Reviewed Journal
- Industrial WasteUploaded byJournalNX - a Multidisciplinary Peer Reviewed Journal
- -Optimization of a CrankshaftUploaded byJournalNX - a Multidisciplinary Peer Reviewed Journal
- Lung Cancer DetectionUploaded byJournalNX - a Multidisciplinary Peer Reviewed Journal
- Accident Prevention SystemUploaded byJournalNX - a Multidisciplinary Peer Reviewed Journal
- -Wireless Mobile ChargerUploaded byJournalNX - a Multidisciplinary Peer Reviewed Journal
- Wireless NetworkUploaded byJournalNX - a Multidisciplinary Peer Reviewed Journal
- -Eye Gaze TrakingUploaded byJournalNX - a Multidisciplinary Peer Reviewed Journal
- -Smart Car ParkingUploaded byJournalNX - a Multidisciplinary Peer Reviewed Journal
- -Screen Less DisplayUploaded byJournalNX - a Multidisciplinary Peer Reviewed Journal
- Hand Gesture RecognisationUploaded byJournalNX - a Multidisciplinary Peer Reviewed Journal
- -Text Reading for Blind PeopleUploaded byJournalNX - a Multidisciplinary Peer Reviewed Journal
- -Nitrogen DeficiencyUploaded byJournalNX - a Multidisciplinary Peer Reviewed Journal
- Voice RecognisationUploaded byJournalNX - a Multidisciplinary Peer Reviewed Journal
- -Speech RecognitionUploaded byJournalNX - a Multidisciplinary Peer Reviewed Journal
- endoscopyUploaded byJournalNX - a Multidisciplinary Peer Reviewed Journal
- Fingerprint DetectionUploaded byJournalNX - a Multidisciplinary Peer Reviewed Journal
- -Encryption StandardUploaded byJournalNX - a Multidisciplinary Peer Reviewed Journal
- - Multi-precision MultiplierUploaded byJournalNX - a Multidisciplinary Peer Reviewed Journal
- Adhoc NetworkUploaded byJournalNX - a Multidisciplinary Peer Reviewed Journal
- -Time Scale ModificationUploaded byJournalNX - a Multidisciplinary Peer Reviewed Journal
- Ss Cdma TransreceiverUploaded byJournalNX - a Multidisciplinary Peer Reviewed Journal
- -Image Registration TechniqueUploaded byJournalNX - a Multidisciplinary Peer Reviewed Journal
- -Handwriting RecognitionUploaded byJournalNX - a Multidisciplinary Peer Reviewed Journal
- Watershed SegmentationUploaded byJournalNX - a Multidisciplinary Peer Reviewed Journal
- Cfd AnalysisUploaded byJournalNX - a Multidisciplinary Peer Reviewed Journal
- e-biodieselUploaded byJournalNX - a Multidisciplinary Peer Reviewed Journal
- Cfd AnalysisUploaded byJournalNX - a Multidisciplinary Peer Reviewed Journal

- Crystallization 1Uploaded byNarcisa Leon
- APCR13_Robotica13.pdfUploaded byUblida Tise
- GPB Multiphase Meter Tests 1Uploaded bykhalid38
- 6035-510A Instruction ManualUploaded byrharaksi
- 07_Elasticity_Applications_04_Beam_Theory.pdfUploaded byJaved MA
- Facility Management Maintenance Projects in Cambridge MA Resume Edward YowUploaded byEdwardYow
- ANSYS Fluid Dynamics Verification ManualUploaded byhafidzfb
- Seabee Owners ManualUploaded byalbix58
- Aged Care ReportUploaded byqamin80
- HST7Uploaded byram
- Hybrid ModulationUploaded byprabath jayasekara
- Low frequency machinery monitoring: measurement considerationsUploaded byRaphael
- Introduction2016 NotesUploaded byChia You Tsai
- 3 Arcade Building Project Design Scope of Work Owners Project Requirements_201306111003144159Uploaded bytinie
- Effect of Lanthanum Doping on Bismuth Ferrite (BiFeO3) for Solar Cell ApplicationsUploaded byIJRASETPublications
- 1292_2012-12-17_1355746049Uploaded bypkb_999
- White light from RGB LED using PIC 18F4550Uploaded byBalu Raveendran
- PC4000 11 A4 InternetUploaded byvitaliy
- ADA954930 METALLURGYCAL EXAMINATION OF BRITISH ARMOURUploaded byhartmann100
- 1081ch2_37.pdfUploaded byCristopher Entena
- Pundit 6 ManualUploaded byJuan David Gonzalez
- sdUploaded byRuben García Ferrer
- XXIV-Poster-14.pdfUploaded byArcangelo Di Tano
- Drop Zone - WhitepaperUploaded byMarcusH5800
- What is an Enterprise ArchitectureUploaded byKibrom Haftu
- RCBKS Bulletin Vol 19 No 31Uploaded byAndrew Qi Wen
- PWHTUploaded byDelvin Davis M
- KHUSHBOO AGARWAL.docxUploaded byLuckyGupta
- All About Magento Migration - Magento 2 Migration - Magento Migration ServiceUploaded byTigren Solutions
- Stealth AntennasUploaded byblackbeast8