Pure and Applied Mathematics Journal
Volume 5, Issue 5, October 2016, Pages: 151-154
Received: Aug. 7, 2016;
Accepted: Aug. 23, 2016;
Published: Sep. 9, 2016
Views 3709 Downloads 233
Abdelilah K. Hassan Sedeeg, Mathematics Department Faculty of Sciences and Arts, Almikwah-Albaha University, Albaha, Saudi Arabia;Mathematics Department Faculty of Education, Holy Quran and Islamic Sciences University, Khartoum, Sudan
Mohand M. Abdelrahim Mahgoub, Mathematics Department Faculty of Sciences and Arts, Almikwah-Albaha University, Albaha, Saudi Arabia;Mathematics Department Faculty of Sciences, Omdurman Islamic University, Khartoum, Sudan
Muneer A. Saif Saeed, Computer Department Faculty of Sciences and Arts, Almikwah-Albaha University, Albaha, Saudi Arabia
Cryptography is the science of providing security for information, It has been used historically as a means of providing secure communication between individuals. Message encryption has become very essential to avoid the threat against possible attacks by hackers during transmission process of the message. In this paper authors have proposed a method of cryptography, in which authors have used Aboodh transform for encrypting the plain text and corresponding inverse Aboodh transform for decryption.
Abdelilah K. Hassan Sedeeg,
Mohand M. Abdelrahim Mahgoub,
Muneer A. Saif Saeed,
An Application of the New Integral “Aboodh Transform” in Cryptography, Pure and Applied Mathematics Journal.
Vol. 5, No. 5,
2016, pp. 151-154.
Copyright © 2016 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/
) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
K. S. Aboodh, The New Integral Transform “Aboodh Transform” Global Journal of pure and Applied Mathematics, 9 (1), 35-43 (2013).
K. S. Aboodh, Application of New Transform “Aboodh transform” to Partial Differential Equations, Global Journal of pure and Applied Math, 10 (2), 249-254 (2014).
Khalid SulimanAboodh, Homotopy Perturbation Method and Aboodh Transform for Solving Nonlinear Partial Differential Equations, Pure and Applied Mathematics JournalVolume 4, Issue 5, October 2015, Pages: 219-224.
Khalid SulimanAboodh, Solving Fourth Order Parabolic PDE with Variable Coefficients Using Aboodh Transform Homotopy Perturbation Method, Pure and Applied Mathematics Journal 2015; 4 (5): 219-224.
A. P. Hiwarekar “A NEW METHOD OF CRYPTOGRAPHY USING LAPLACE TRANSFORM”International Journal of Mathematical Archive-3 (3), 2012, Page: 1193-1197.
A. P. Stakhov, “The golden matrices and a new kind of cryptography”, Chaos, Soltions and Fractals.
Stallings W., Cryptography and Network Security, Fourth Edition, Prentice Hall, 2005.
Grewal B. S. – Higher Engineering Mathematics, Khanna Pub. Delhi, 2005.
Barr T. H., Invitation to Cryptography, Prentice Hall, (2002).
Blakley G. R., Twenty years of Cryptography in the open literature, Security and Privacy 1999, Proceedingsof the IEEE Symposium, 9-12, May 1999.
Petersen K. – Notes on Number Theory and Cryptography, http://www.math.unc.edu/ Faculty petersen/ Coding/cr2.pdf.
Overbey J. - Traves W. and Wojdylo J. – On the Key space of the Hill Cipher, Cryptologia, 29 (1), January 2005, 59-72.
A. P. Hiwarekar, Application of Laplace Transform For Cryptographic Scheme, Proceedings of the World Congress on Engineering 2013 Vol I, WCE 2013, July 3 - 5, 2013, London, U.K.
Swati Dhingra, Archana A. Savalgi, Swati Jain, Laplace Transformation based Cryptographic Technique in Network Security, International Journal of Computer Applications (0975 – 8887) Volume 136 – No. 7, February 2016.
A. P. Hiwarekar, A NEW METHOD OF CRYPTOGRAPHY USING LAPLACE TRANSFORM, International Journal of Mathematical Archive-3 (3), 2012, Page: 1193-1197.
Abdulkadir Baba HASSAN, Matthew Sunday ABOLARIN, Onawola Hassan JIMOH, The Application of Visual Basic Computer Programming Language to Simulate Numerical Iterations, Leonardo Journal of Sciences, Issue 9, July-December 2006 p. 125-136.