Cryptanalysis of A New Method of Cryptography using Laplace Transform Hyperbolic Functions

Authors

  • M. Tuncay Gençoğlu Vocational School of Technical Sciences, Firat University, 23119 Elazig

DOI:

https://doi.org/10.26713/cma.v8i2.708

Keywords:

Laplace transform, Cryptography, Cryptanalysis, A general attack scenario

Abstract

Although Laplace Transform is a good application field in the design of cryptosystems, many encryption algorithm proposals become unsatisfactory for secure communication since cryptanalysis studies are not sufficient. One of the important factors resulting in poor proposals is the fact that security analysis of the proposed encryption algorithms is performed with only statistical tests and experimental results. In this study, a general attack scenario was given in order to conduct security analyses of Laplace Transform based cryptosystems. The application of proposed general attack scenario was shown on recently proposed Laplace Transform based encryption scheme.

Downloads

Download data is not yet available.

References

D.S. Bodkhe and S.K. Panchal, Use of Sumudu transform in cryptography, Bulletin of the Marathwada Mathematical Society 16 (2) (2015), 1 – 6.

A.P. Hiwarekar, A new method of cryptography using Laplace transform, International Journal of Mathematical Archive 3 (3) (2012), 1193 – 1197.

A.P. Hiwarekar, A new method of cryptography using Laplace transform of Hyperbolic functions, International Journal of Mathematical Archive 4 (2) (2013), 208 – 213.

G. Naga Lakshmi, B. Ravi Kumar and A. Chandra Sekhar, A cryptographic scheme of Laplace transforms, International Journal of Mathematical Archive 2 (12) (2011), 2515 – 2519.

M.T. Gençoğlu, Use of integral transform in cryptology, Science and Eng. J of Fırat Univ. 28 (2) (2016), 217 – 220.

C. Li and K.-T. Lo, Optimal quantitative cryptanalysis of permutation–only multimedia ciphers against plaintext attacks, Signal Processing 91 (2011), 949 – 954.

X. Ge, F. Liu, B. Lu and C. Yang, Improvement of Rhoumasattacks on Gaoalgorithm, Physics Letters A 374 (2010), 1362 – 1367.

M. Safkhani, P. Lopez, J. Hernandez-Castroc and N. Bagheri, Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol, Journal of Computational and Applied Mathematics 259 (2014), 571 – 577.

E.B. Kavun, E. Tischhauser and T. Yalçın, Large-scale high-resolution computational validation of novel complexity models in linear cryptanalysis Andrey-Bogdanov, Journal of Computational and

Applied Mathematics 259 (2014), 592 – 598.

M.T. Sakallı and B. Aslan, On the algebraic construction of cryptographically good (32times 32) binary linear transformations, Journal of Computational and Applied Mathematics 259 (2014), 485 – 494.

Downloads

Published

30-08-2017
CITATION

How to Cite

Gençoğlu, M. T. (2017). Cryptanalysis of A New Method of Cryptography using Laplace Transform Hyperbolic Functions. Communications in Mathematics and Applications, 8(2), 183–189. https://doi.org/10.26713/cma.v8i2.708

Issue

Section

Research Article