You are on page 1of 3

# NOVATEUR PUBLICATIONS

## INTERNATIONAL JOURNAL OF RESEARCH PUBLICATIONS IN ENGINEERING AND TECHNOLOGY [IJRPET]

NATIONAL CONFERENCE ON INNOVATIVE TRENDS IN ENGINEERING & TECHNOLOGY-2017
15TH & 16TH MARCH 2017
CONFERENCE PROCEEDINGS ISSN NO - 2454-7875
______________________________________________________________________________________________________________________________________________________________________________
Paper ID: NITET17
A SURVEY ON APPLICATION OF LAPLACE TRANSFORM IN
CRYPTOGRAPHY
PROF.(MS). SHUBHANGI GURAV.
A.G. Patil Institute of Technology Solapur, Solapur University, Department of Mathematics (General Science Engineering)
Email:shubhangigurav28@gmail.com

MS.DHANASHRI ALURE.
A.G. Patil Institute of Technology, Solapur University, Department of Computer Engineering.
Email:shivanialure@gmail.com

ABSTRACT DEFINITIONS
The opening years of the twenty –first century have ENCRYPTION- encryption is the process Converting the
been remarkable ones for mathematical sciences. intelligible message (Plain text) to its unintelligible
Mathematical sciences play an essential role in the form (The cipertext).
physical & biological sciences, engineering, DECRYPTION:-decryption is the process of converting
medicine, economics, finance & social science. [The the unintelligible message back to its intelligible Form
mathematical science have become integral to many the original under stable message.
emerging industries]The mathematical sciences CIPHER TEXT - is a method to transform a plain text
includes for more than numbers they deal with into Something that is difficult to understand.
geometrical figures, logical patterns networks, LAPLACE TRANSFORM:-If and (t) is function
randomness & Predictions from incomplete data, Defined on 0, ∞ ,then the Laplace transform of f(t) is
various transforms etc; & the mathematical sciences defined as

are part of almost every aspect of everyday life.
Laplace transform is a powerful tool which is used in L f(t) = e−st f t dt = ∅ S
various areas of engineering and science. This paper 0

deals with the application of Laplace transform in provided that a function f(t) should satisfies the
cryptography. Cryptology is the science and art of following condition
secret communications. Cryptography is the set 1) f(t) is continuous
method used to ensure the secrecy and authenticity 2) limit as t → ∞ e−at f(t) is finite, then the
of messages. Laplace transform of f(t)

Cryptology plays vital role in the provision of logical i.e. 0 e−at f t dt exists for s>a
barriers to attacks on information systems security.
In this paper we can take a review of applications of Inverse of Laplace transform – If L{ f(t)} is function in S
Laplace transform in cryptography. given as
KEYWORDS: Laplace transform, Cryptography, Plain L{f(t)}= ∅ S
text, Cipher text, inverse Laplace transform then inverse laplace transform is defined as follows
,Encryption, Decryption. L−1 ∅ S = f(t)
Laplace transform of some standard function
INTRODUCTION L{
K
} = K. L t n = K.
n!
tn s n +1
Cryptography has been defined As, The ‘umbrella word 1 t n −1
used to Describe the entire field of secret L−1 [ ]=
sn n−1 !
Communications.’ Standard expansion of sinhat
Cryptography Has been concerned with Protecting the a3t3 a5t5 a7t7 an tn
sinhat = at+ + + +⋯+
3! 5! 7! n!
secrecy of information Cryptography involves
mathematical Transformation of transformation. n
∞ (at )
Nowadays applicative mathematics Is plays an important = n=1 n!

role to make
Society technically advanced. In this Paper Laplace MAIN RESULT
transform is used for Cryptography .In [1], they encrypt We consider standard expansion
A string by using series of cosh2t and Its Laplace a3 t3 a5t5 a7 t7 an tn
tsinhat =at+ + + + ⋯+
3! 5! 7! n!
transform. In this paper use hyperbolic sine function.
74 | P a g e www.ijrpet.org
NOVATEUR PUBLICATIONS
INTERNATIONAL JOURNAL OF RESEARCH PUBLICATIONS IN ENGINEERING AND TECHNOLOGY [IJRPET]
NATIONAL CONFERENCE ON INNOVATIVE TRENDS IN ENGINEERING & TECHNOLOGY-2017
15TH & 16TH MARCH 2017
CONFERENCE PROCEEDINGS ISSN NO - 2454-7875
______________________________________________________________________________________________________________________________________________________________________________

= ∞ (at )
n
= ∞ (a) t 2i−1 2i
the given key k i i=0,1,2,3…as
n=1 n! i=0 2i−1 !

## 2 0 15950 3572972 157210769

where aϵN is a constant with N is the set of natural 528228226200 36916814260000000
number. we allocated 0 to A and 1 to B then Z will be Here we have qi for i=0,1,2,3,…8 are respectively given
25.Let given message plain text string be ‘ PASSWORD ’. by
It is equivalent to
15 0 18 18 22 14 17 3 60 0 414720 92897280 40874803200 13733933880000
we assume that 121407975500000000
G0 = 15 G1 = 0 G2 = 18 9598371707000000000
G3 = 18 G4 = 22 G5 = 18 Using the formula
G6 = 17 G7 = 14 qi = 26 k i +Gi′ by [1]

## Let us consider We consider

f(t)=Gtsinh2t= d 1 ki 60 0 414720 92897280
23 t 3 25 t 5 27 t 7 29 t 9 2 11 t 11
G{- } = i=0 s 2i+1 = s 3

+ + + +
ds (s 2 −2 2 ) s5 s7 s9
t{ G0 2t+G1 + G2 + G3 + G4 + G5 + 40874803200 13733933880000 1214079755 00000000
3! 5! 7! 9! 11!
2 13 t 13 2 15 t 15
+ + +
s 11 s 13 s 15
G6 + G7 9598371707000000000
13! 15!
.
s 17

23 t 3 25 t 5 27 t 7 29 t 9
=t{15 * 2 *t + 0∗ + 18* + 18* +22 * Taking inverse Laplace transform we get
3! 5! 7! 9!
2 11 t 11 2 13 t 13 2 15 t 15 23 t 4 25 t 6 27 t 8
+14* + 17 ∗ +14* } G tsinh2t=15 * 2 *t 2 + 0∗ + 18* + 18* +22
11! 13! 15! 3! 5! 7!
2 9 t 10 2 11 t 12 2 13 t 14 2 15 t 16
2i−1 t 2i
* +14* + 17 ∗ +14* .
9! 11! 13! 15!
∞ Gi (2)
= i=0 Hence we have
2i−1 !
Taking Laplace transform on both sides we have G0 = 15 G1 = 0 G2 = 18
L{f(t)} = L{G tsinh2t} = G3 = 18 G4 = 22 G5 = 18
23 t 4 25 t 6 27 t 8 2 9 t 10 G6 = 17 G7 = 14 for n ≥ 9.
L{15 * 2 *t 2 + 0∗ + 18* + 18* +22 *
3! 5! 7! 9!
2 11 t 12 2 13 t 14 2 15 t 16
+14* + 17 ∗ +14* }
11! 13! 15!
CONCLUSION
=
60
+
0
+
414720
+
92897280
+
40874803200
+ In this paper we have studied in detail the concept of
s3 s5 s7 s9 s 11
13733933880000 121407975500000000 cryptography using Laplace transform. It is an important
+ +
s 13 s 15 and analytical tool that used for various applications.
9598371707000000000
+
s 17
This survey provides the researchers and students to
know about how Laplace transform is used in
to mod 26 the given plain text strings gets converts to cryptography
cipher text string
8 0 20 8 18 22 24 24 APPLICATIONS OF LAPLACE TRANSFORM
Hence the given message string ‘PASSWORD’ get  Laplace transform is used to solve Boundary value
converted to ‘IAUISWYY’ with key k i for i=0,1,2,3…as problems,ordinary differential equation, Used in
2 0 15950 3572972 157210769 linear nonlinear difference equation ,steady state
528228226200 36916814260000000 solutions ,cryptography.
Gi′ = qi − 26 k i by [1]  Also Laplace transform has huge applications in
electric circuit theory, it has complex applications
DECRYPTION: in power system as well.
We assume that the received message string be ‘  The Laplace transform can be applied to solve the
IAUISWYY ’which is equivalent to  switching transient phenomenon in the series or
8 0 20 8 18 22 24 24 parallel RL, RC or RLC circuits
Assuming  Laplace transform is a very effective mathematical
G0′ = 8 G1′ = 0 G2′ = 20 tool to simplify very complex problems in the area

G3 = 8 ′
G4 = 18 G5′ = 22 of stability and control.
′ ′
G6 = 24 G7 = 24 for n ≥ 9

75 | P a g e www.ijrpet.org
NOVATEUR PUBLICATIONS
INTERNATIONAL JOURNAL OF RESEARCH PUBLICATIONS IN ENGINEERING AND TECHNOLOGY [IJRPET]
NATIONAL CONFERENCE ON INNOVATIVE TRENDS IN ENGINEERING & TECHNOLOGY-2017
15TH & 16TH MARCH 2017
CONFERENCE PROCEEDINGS ISSN NO - 2454-7875
______________________________________________________________________________________________________________________________________________________________________________
 Laplace transform has a lot of application in Physics 4) Electronic mail and firewall
and other sciences.
REFERENCES:
APPLICATIONS OF CRYPTOGRAPHY 1) A.P.Hiwarekar application of Laplace transform for
1) Mobile security cryptography.
2) Network security 2) Heigher Engineering Mathematics By B.S. Grewal
3) Information security 3) Information System Security By Nina Godbole.

76 | P a g e www.ijrpet.org