The use of functions f:D_1×D_2→R^2 for encrypting and decrypting data in a plane

Azir Jusufi, Blinera Zekaj, Gazmend Xhaferi, Altin Jusufi

Abstract


The study of cryptosystems is significant, and valuable scientific works are dedicated to them. Cryptosystems are mathematical structures that deal with data encryption and decryption, focusing on confidentiality and authenticity. Cryptography plays a crucial role in meeting these requirements, with numerous researchers proposing various solutions and developing algorithms that have contributed to the security of data confidentiality, integrity, and authentication. However, the issue of securing the internet through modern cryptography has also become increasingly complex. Modern encryption systems rely on complex mathematical algorithms and employ a combination of symmetric and asymmetric key encryption schemes to ensure secure communication. The use of  for image encryption provides an effective and secure method for protecting the privacy, security, and confidentiality of sensitive data, such as artwork or sketches.

The use of functions operating in two-dimensional space encrypts images in a way that makes it difficult for unauthorized individuals to decipher their shape and structure.

The use of encryption functions for images has the potential to be applied in industries such as product design, computer graphics, virtual reality, engineering, and many other fields.


Keywords


Encryption, decryption, functions, commutative composite functions, image, artwork.

Full Text:

PDF

References


Azir Jusufi Kristaq Filipi, Matematikë Diskrete dhe Aplikime, Prishtine, 2022

https://tresorit.com/blog/the-history-of-encryption-the-roots-of-modern-day-cyber-security/

D. Dolev, C. Dwork, and M. Naor. Non-malleable cryptography. In23rd Annual ACM Symposium on Theory of Computing,1991.

D. Dolev, C. Dwork, and M. Naor. Non-malleable cryptography, 1998.

C. Dwork and M. Naor. Method for message authentication from non-malleable cryptosystems, 1996.

I. Damgard. Towards practical public key cryptosystems secure againstchosen ciphertext attacks. In Advances in Cryptology.

K. Filipi, A. Jusufi, Xh. Beqiri, Matematika për ekonomistë, Tetovë, 2012

Discrete Math, Mohamed Jamaloodeen, Kathy Pinzon, Daniel Pragel, Joshua Roberts, Sebastien Siva

Mathematical Foundations and Aspects of Discrete Mathematics, Jean Gallier and Jocelyn Quaintance, March 2022

Discrete Mathematics an Open Introduction, Oscar Levin, July 2021

Discrete Maths in Computer Science, Gary Haggard, John Schlipf, Sue Whitesides

A. Jusufi, D, Berisha, M, Reqica, Permbledhje detyrash nga matematika diskrete, Prishtine, 2022

F. Kabashi, A. Jusufi, USE OF COMPOSITE COMMUTATION FUNCTIONS IN DETERMINING THE DIFFIE-HELLMAN KEYS, PROCEEDINGS OF THE 7TH ANNUAL INTERNATIONAL CONFERENCE-UBT, 2018

B. Zekaj, A. Jusufi, B. Imeri-Jusufi, Using incomplete polynomial functions of the odd degree n and their inverses for data encryption and decryption, IFAC-PapersOnLine, Volume 55, Issue 39, 2022, Pages 241-246

Mirlinda Reqica, Diellza Berisha, Azir Jusufi, Meriton Reqica, Exploitation of exponential and logarithmic functions for data encryption and decryption, IFAC-PapersOnLine, Volume 55, Issue 39, 2022, Pages 286-291




DOI: http://dx.doi.org/10.52155/ijpsat.v48.2.6874

Refbacks

  • There are currently no refbacks.


Copyright (c) 2025 Azir Jusufi

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.