Professional Documents
Culture Documents
Cryptography
May 2017
Outline
1 Introduction
2 Definitions and Standard Results
The Laplace Transform
Some Standard Results of Laplace Transform:
3 Main Result
Encryption
Decryption
4 Encryption Algorithm
Discussion Examples
Implementation Strategies
5 Further Study
Introduction
Definitions and Standard Results
Main Result
Encryption Algorithm
Further Study
Introduction
Introduction
Introduction
Introduction
Introduction cont’d. . .
Introduction cont’d. . .
Introduction cont’d. . .
Introduction cont’d. . .
Definition 2.2
When plain text message is codified using any suitable
scheme, the resulting message is called as cipher text.
Definition 2.3(a)
Encryption transforms a plain text message into cipher text,
whereas decryption transforms a cipher text message back into
plain text.
Presented by: Wudneh T. Application of Laplace Transform for Cryptography 5 / 33
Introduction
Definitions and Standard Results
The Laplace Transform
Main Result
Some Standard Results of Laplace Transform:
Encryption Algorithm
Further Study
Definition 2.3(b)
Every encryption and decryption process has two aspects: The
algorithm and the key. The key is used for encryption and
decryption that makes the process of cryptography secure.
Theorem 2.1
Laplace transform is a linear transform. That is, if
L{f1 (t)} = F1 (s); L{f2 (t)} = F2 (s); · · · ; L{fn (t)} = Fn (s) then
Encryption
Encryption cont’d. . .
Encryption cont’d. . .
Encryption cont’d. . .
Encryption cont’d. . .
Encryption cont’d. . .
Encryption cont’d. . .
For t2 sinh 2t
23 t3 25 t5 27 t7 29 t9 2
f (t) = t2 G0,0 2t + G1,0 + G2,0 + G3,0 + G4,0 + G5,0
3! 5! 7! 9!
∞ 2i+1 2i+3
X 2 t Gi,0
=
i=0
(2i + 1)!
2t3 23 t5 25 t7 27 t9 29 t11 211 t13
= 22 + 20 +3 + 13 +4 +7
1! 3! 5! 7! 9! (11)!
(10)
Taking Laplace transform on both sides of (10), we have
Encryption cont’d. . .
Encryption cont’d. . .
Encryption cont’d. . .
f ori = 0, 1, 2, 3, · · ·
where
Encryption cont’d. . .
Encryption cont’d. . .
Theorem 3.2
The given plain text in terms of Gi,1 , i = 1, 2, 3, · under Laplace
transform of Gi,1 t2 sinh 2t, (that is by writing them as a
coefficients of t2 sinh 2t and then taking the Laplace transform)
can be converted to cipher text
f ori = 0, 1, 2, 3, · · ·
where
Encryption cont’d. . .
Encryption cont’d. . .
Theorem 3.3
The given plain text in terms of Gi,0 , i = 1, 2, 3, · under Laplace
transform of Gi,0 t2 sinh 2t, successively j times(that is by writing
them as a coefficients of t2 sinh 2t and then taking the Laplace
transform successively) can be converted to cipher text
f ori, j = 0, 1, 2, 3, · · ·
where
Encryption cont’d. . .
Remark 3.1
Theorem 3.1 is a special case of Theorem 3.3 with j = 1 and
Theorem 3.2 with j = 2.
Decryption
Decryption
Decryption
Decryption
Decryption cont’d. . .
1 We consider
2
−d 2 264 3200 4032 119808 225280
= 4 + 6 + 8 + +
ds (s2 2
−2 ) s s s s10 s12
n
1118208 X qi,1
+ 14
= .
s i=0
s2i+4
(22)
2 Taking inverse Laplace transform we get
Decryption cont’d. . .
1 We consider
2
−d 2 264 3200 4032 119808 225280
= 4 + 6 + 8 + +
ds (s2 2
−2 ) s s s s10 s12
n
1118208 X qi,1
+ 14
= .
s i=0
s2i+4
(22)
2 Taking inverse Laplace transform we get
Decryption cont’d. . .
2t3 23 t5 25 t7 27 t9
f (t) = Gt2 sinh 2t = 22 + 20 +3 + 13
1! 3! 5! 7!
29 t11 211 t13
+4 +7
9! 11!
23 t3 25 t5 27 t7
2
= t G0,0 2t + G1,0 + G2,0 + G3,0
3! 5! 7!
9
2 t 9 11
2 t 11 13
2 t 13 215 t15
+ G4,0 + G5,0 + G6,0 + G7,0
9! 11! 13! 15!
(23)
Decryption cont’d. . .
2t3 23 t5 25 t7 27 t9
f (t) = Gt2 sinh 2t = 22 + 20 +3 + 13
1! 3! 5! 7!
29 t11 211 t13
+4 +7
9! 11!
23 t3 25 t5 27 t7
2
= t G0,0 2t + G1,0 + G2,0 + G3,0
3! 5! 7!
9
2 t 9 11
2 t 11 13
2 t 13 215 t15
+ G4,0 + G5,0 + G6,0 + G7,0
9! 11! 13! 15!
(23)
Decryption cont’d. . .
where
Decryption cont’d. . .
26ki,0 + Gi,1 − p
Gi,0 = 2i+1
,i = 0, 1, 2, · · · , p ∈ N, 0 ≤ p ≤ 25
2 (2i + 2)(2i + 3)
(25)
and
qi,0 = 26ki,0 + Gi,1 , i = 0, 1, 2, 3, · · · (26)
The generalized iterative theorem can be obtained on the
similar way which is included in the following
Decryption cont’d. . .
Theorem 4.2
The given cipher text in terms of Gi,j , i, j = 1, 2, 3, · · · with a
given key ki,j−1 , I, j = 1, 2, 3, · · · can be converted to plain text
Gi,j−1 under the inverse Laplace transform of
2 n
−d 2 qi,j−1
X
G = . (27)
ds (s − 2 ) i=0 s2i+4
2 2
where
26ki,j−1 + Gi,j − p
Gi,j−1 = , i, j = 1, 2, · · · , p ∈ N, 0 ≤ p ≤ 25
22i+1 (2i + 2)(2i + 3)
(28)
and
Presented by: Wudneh T. Application of Laplace Transform for Cryptography 26 / 33
Introduction
Definitions and Standard Results
Discussion Examples
Main Result
Implementation Strategies
Encryption Algorithm
Further Study
Encryption Algorithm
Encryption Algorithm
Encryption Algorithm
Discussion Examples
Implementation Strategies
Implementation Strategies
Further Study
Further Study
Further Study
Further Study