Abstract
Information security is very much important in this Internet world, especially in electronic communications such as system security, smart card, mobile communications. Cryptography is based on transformation of multiple rounds of transformation of messages in the form of plain text as input into encrypted text message. Through suitable mathematical technique, secrecy of the information is maintained. This paper proposes a cryptographic technique using probability and bilinear transformation for encryption and decryption of a message. The algorithm for encryption and decryption is given. The probability concept is employed to secure the key between the communicator and recipient. The methodologies are used to get a safe communication between communicator and recipient. The bilinear transformation gives more secure for the process in key transformation. The bilinear transformation is used to encrypt the message. The inverse bilinear transformation is used to decrypt the message. The example is presented to validate the theory part.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Hiwarekar, A.P. 2014. New mathematical modeling for cryptography. Journal of Information Assurance and Security, MIR Lab USA 9: 027–033.
Gençoğlu, M.T. 2017. Cryptanalysis of a new method of cryptography using laplace transform hyperbolic functions. Communications in Mathematics and Applications 8 (2): 183–189.
Hiwarekar, A.P. 2013. A new method of cryptography using laplace transform of hyperbolic functions. International Journal of Mathematical Archive 4 (2): 208–213.
Undegaonkar, Hemant K. 2019. Security in communication by using laplace transform and cryptography. International Journal of Scientific & Technology Research 8 (12): 3207–3209.
Sujatha, S. 2013. Application of laplace transforms in cryptography. International Journal of Mathematical Archive 4: 67–71.
Jayanthi, C.H., and V. Srinivas. 2019. Mathematical modelling for cryptography using laplace transform. International Journal of Mathematics Trends and Technology 65: 10–15.
Nagalakshmi, G., A.C. Sekhar, and D.R. Sankar. 2020. Asymmetric key cryptography using laplace transform. International Journal of Innovative Technology and Exploring Engineering 9: 3083–3087.
Dhingra, S., A.A. Savalgi, and S. Jain. 2016. Laplace transformation based cryptographic technique in network security. International Journal of Computer Applications 136 (7): 0975–8887.
Saha, M. 2017. Application of laplace-mellin transform for cryptography. Rai Journal of Technology Research & Innovation 5 (1): 12–17.
Sedeeg, A.K.H., M.M. AbdelrahimMahgoub, and M.A. SaifSaeed. 2016. An application of the new integral “Aboodh Transform” in cryptography. Pure and Applied Mathematics Journal 5 (5): 151–154.
Abdalla, M., J.H. An, M. Bellare, and C. Namprempre. 2008. From identification to signatures via the Fiat-Shamir transform: Necessary and sufficient conditions for security and forward-security. IEEE Transactions on Information Theory 54 (8): 3631–3646.
Aliyu, A.A.M., and A. Olaniyan. 2010. Vigenere cipher: Trends. Review and Possible Modifications. In PiE 101: 1.
Sanchez, J., R. Correa, H. Buena, S. Arias, and H. Gomez. 2016. Encryption techniques: A theoretical overview and future proposals. In 2016 Third International Conference on eDemocracy & eGovernment (ICEDEG), 60–64. IEEE.
Diffie, W., P.C. Van Oorschot, and M.J. Wiener. 1992. Authentication and authenticated key exchanges. Designs, Codes and Cryptography 2 (2): 107–125.
Chatterjee, D., J. Nath, S. Dasgupta, and A. Nath. 2011. A new symmetric key cryptography algorithm using extended MSA method: DJSA symmetric key algorithm. In Communication Systems and Network Technologies (CSNT), International Conference, 89–94.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Mohan, K.R., Rasappan, S., Murugesan, R., Kumaravel, S.K., Elngar, A.A. (2022). Secret Information Sharing Using Probability and Bilinear Transformation. In: Peng, SL., Lin, CK., Pal, S. (eds) Proceedings of 2nd International Conference on Mathematical Modeling and Computational Science. Advances in Intelligent Systems and Computing, vol 1422. Springer, Singapore. https://doi.org/10.1007/978-981-19-0182-9_12
Download citation
DOI: https://doi.org/10.1007/978-981-19-0182-9_12
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-0181-2
Online ISBN: 978-981-19-0182-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)