Skip to main content

Secret Information Sharing Using Probability and Bilinear Transformation

  • Conference paper
  • First Online:
Proceedings of 2nd International Conference on Mathematical Modeling and Computational Science

Abstract

Information security is very much important in this Internet world, especially in electronic communications such as system security, smart card, mobile communications. Cryptography is based on transformation of multiple rounds of transformation of messages in the form of plain text as input into encrypted text message. Through suitable mathematical technique, secrecy of the information is maintained. This paper proposes a cryptographic technique using probability and bilinear transformation for encryption and decryption of a message. The algorithm for encryption and decryption is given. The probability concept is employed to secure the key between the communicator and recipient. The methodologies are used to get a safe communication between communicator and recipient. The bilinear transformation gives more secure for the process in key transformation. The bilinear transformation is used to encrypt the message. The inverse bilinear transformation is used to decrypt the message. The example is presented to validate the theory part.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hiwarekar, A.P. 2014. New mathematical modeling for cryptography. Journal of Information Assurance and Security, MIR Lab USA 9: 027–033.

    Google Scholar 

  2. Gençoğlu, M.T. 2017. Cryptanalysis of a new method of cryptography using laplace transform hyperbolic functions. Communications in Mathematics and Applications 8 (2): 183–189.

    Google Scholar 

  3. Hiwarekar, A.P. 2013. A new method of cryptography using laplace transform of hyperbolic functions. International Journal of Mathematical Archive 4 (2): 208–213.

    Google Scholar 

  4. Undegaonkar, Hemant K. 2019. Security in communication by using laplace transform and cryptography. International Journal of Scientific & Technology Research 8 (12): 3207–3209.

    Google Scholar 

  5. Sujatha, S. 2013. Application of laplace transforms in cryptography. International Journal of Mathematical Archive 4: 67–71.

    Google Scholar 

  6. Jayanthi, C.H., and V. Srinivas. 2019. Mathematical modelling for cryptography using laplace transform. International Journal of Mathematics Trends and Technology 65: 10–15.

    Google Scholar 

  7. Nagalakshmi, G., A.C. Sekhar, and D.R. Sankar. 2020. Asymmetric key cryptography using laplace transform. International Journal of Innovative Technology and Exploring Engineering 9: 3083–3087.

    Article  Google Scholar 

  8. Dhingra, S., A.A. Savalgi, and S. Jain. 2016. Laplace transformation based cryptographic technique in network security. International Journal of Computer Applications 136 (7): 0975–8887.

    Google Scholar 

  9. Saha, M. 2017. Application of laplace-mellin transform for cryptography. Rai Journal of Technology Research & Innovation 5 (1): 12–17.

    Google Scholar 

  10. Sedeeg, A.K.H., M.M. AbdelrahimMahgoub, and M.A. SaifSaeed. 2016. An application of the new integral “Aboodh Transform” in cryptography. Pure and Applied Mathematics Journal 5 (5): 151–154.

    Article  Google Scholar 

  11. Abdalla, M., J.H. An, M. Bellare, and C. Namprempre. 2008. From identification to signatures via the Fiat-Shamir transform: Necessary and sufficient conditions for security and forward-security. IEEE Transactions on Information Theory 54 (8): 3631–3646.

    Article  MathSciNet  Google Scholar 

  12. Aliyu, A.A.M., and A. Olaniyan. 2010. Vigenere cipher: Trends. Review and Possible Modifications. In PiE 101: 1.

    Google Scholar 

  13. Sanchez, J., R. Correa, H. Buena, S. Arias, and H. Gomez. 2016. Encryption techniques: A theoretical overview and future proposals. In 2016 Third International Conference on eDemocracy & eGovernment (ICEDEG), 60–64. IEEE.

    Google Scholar 

  14. Diffie, W., P.C. Van Oorschot, and M.J. Wiener. 1992. Authentication and authenticated key exchanges. Designs, Codes and Cryptography 2 (2): 107–125.

    Article  MathSciNet  Google Scholar 

  15. Chatterjee, D., J. Nath, S. Dasgupta, and A. Nath. 2011. A new symmetric key cryptography algorithm using extended MSA method: DJSA symmetric key algorithm. In Communication Systems and Network Technologies (CSNT), International Conference, 8994.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kala Raja Mohan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mohan, K.R., Rasappan, S., Murugesan, R., Kumaravel, S.K., Elngar, A.A. (2022). Secret Information Sharing Using Probability and Bilinear Transformation. In: Peng, SL., Lin, CK., Pal, S. (eds) Proceedings of 2nd International Conference on Mathematical Modeling and Computational Science. Advances in Intelligent Systems and Computing, vol 1422. Springer, Singapore. https://doi.org/10.1007/978-981-19-0182-9_12

Download citation

Publish with us

Policies and ethics