New Method of Cryptography With Python Code Using Elzaki Transform and Linear Combination of Function


  • P. P. Raut New Horizon Education Society’s, New Horizon Institute of Technology and Management (Savitribai Phule University), Anand Nagar, Thane, Maharashtra, India
  • A. P. Hiwarekar Vidya Pratishthan’s Kamalnayan Bajaj, Institute of Engineering and Technology (Savitribai Phule Pune University), Baramati, Pune, Maharashtra, India



Cryptography, Elzaki transform, Information security, Encryption, Decryption


In today’s digital world, cybercrime has become biggest challenge to face in order to keep the confidential information secure from intruders. The security mechanisms used to curb the cyber-attacks, need to be improvised on constant basis with the help of advanced mathematical techniques. This paper deals with new cryptography based iterative method by using successive Elzaki transform of linear combination of functions for encryption and corresponding inverse Elzaki transform for decryption. Starting with a detailed procedure, we presented our work in the form of result. Further, it is generalized and then we applied the iterative method for making our algorithm more secure. We also implemented this method programmatically using PYTHON language which fits current needs. Finally, we illustrate our results with suitable examples.


Download data is not yet available.


E. Adeyefa, L. Akinola and O. Agbolade, Application of laplace transform to cryptography using linear combination of functions, TWMS Journal of Applied and Engineering Mathematics 11(4) (2021), 1050 – 1060.

L. Debnath and D. Bhatta, Integral Transforms and Their Applications, 3rd edition, CRC Press, Boca Raton (2015).

B. A. Forouzan, Introduction to Cryptography and Network Security, 2nd edition, McGraw-Hill Higher Education, Boston (2010).

A. P. Hiwarekar, Encryption-decryption using laplace transforms, Asian Journal of Mathematics and Computers 12 (2016), 201 – 209.

A. E. Idowu, A. Saheed, O. R. Adekola and F. E. Omofa, An application of integral transform based method in cryptograph, Asian Journal of Pure and Applied Mathematics 3 (2021), 13 – 18.

S. S. Jadhav and A. P. Hiwarekar, New method for cryptography using Laplace-Elzaki transform, Psychology and Education 58(1) (2021), 1 – 6.

A. Kahate, Cryptography and Network Security, 3rd edition, Tata McGraw-Hill, India, (2008).

G. N. Lakshmi, B. R. Kumar and A. C. Shekhar, A cryptographic scheme of Laplace transforms, International Journal of Mathematical Archive 2(12) (2011), 2515 – 2519.

B. Ni, R. Qazi, S. U. Rehman and G. Farid, Some graph-based encryption schemes, Journal of Mathematics 2021 (2021), Article ID 6614172, 8 pages, DOI: 10.1155/2021/6614172.

B. S. S. Raj and V. Sridhar, Identity based cryptography using matrices, Wireless Personal Communications 120 (2021), 1637 – 1657, DOI: 10.1007/s11277-021-08526-9.

D. R. Stinson, Cryptography: Theory and Practice, 3rd edition, Chapman and Hall/CRC, New York, 616 pages (2005), DOI: 10.1201/9781420057133.

L. Vinothkumar and V. Balaji, Encryption and decryption technique using matrix theory, Journal of Computational Mathematica 3(2) (2019), 1 – 7, DOI: 10.26524/cm49.




How to Cite

Raut, P. P., & Hiwarekar, A. P. (2023). New Method of Cryptography With Python Code Using Elzaki Transform and Linear Combination of Function. Communications in Mathematics and Applications, 14(3), 1245–1254.



Research Article