The use of functions f:D_1×D_2→R^2 for encrypting and decrypting data in a plane
Abstract
The study of cryptosystems is significant, and valuable scientific works are dedicated to them. Cryptosystems are mathematical structures that deal with data encryption and decryption, focusing on confidentiality and authenticity. Cryptography plays a crucial role in meeting these requirements, with numerous researchers proposing various solutions and developing algorithms that have contributed to the security of data confidentiality, integrity, and authentication. However, the issue of securing the internet through modern cryptography has also become increasingly complex. Modern encryption systems rely on complex mathematical algorithms and employ a combination of symmetric and asymmetric key encryption schemes to ensure secure communication. The use of for image encryption provides an effective and secure method for protecting the privacy, security, and confidentiality of sensitive data, such as artwork or sketches.
The use of functions operating in two-dimensional space encrypts images in a way that makes it difficult for unauthorized individuals to decipher their shape and structure.
The use of encryption functions for images has the potential to be applied in industries such as product design, computer graphics, virtual reality, engineering, and many other fields.
Keywords
Full Text:
PDFReferences
Azir Jusufi Kristaq Filipi, Matematikë Diskrete dhe Aplikime, Prishtine, 2022
https://tresorit.com/blog/the-history-of-encryption-the-roots-of-modern-day-cyber-security/
D. Dolev, C. Dwork, and M. Naor. Non-malleable cryptography. In23rd Annual ACM Symposium on Theory of Computing,1991.
D. Dolev, C. Dwork, and M. Naor. Non-malleable cryptography, 1998.
C. Dwork and M. Naor. Method for message authentication from non-malleable cryptosystems, 1996.
I. Damgard. Towards practical public key cryptosystems secure againstchosen ciphertext attacks. In Advances in Cryptology.
K. Filipi, A. Jusufi, Xh. Beqiri, Matematika për ekonomistë, Tetovë, 2012
Discrete Math, Mohamed Jamaloodeen, Kathy Pinzon, Daniel Pragel, Joshua Roberts, Sebastien Siva
Mathematical Foundations and Aspects of Discrete Mathematics, Jean Gallier and Jocelyn Quaintance, March 2022
Discrete Mathematics an Open Introduction, Oscar Levin, July 2021
Discrete Maths in Computer Science, Gary Haggard, John Schlipf, Sue Whitesides
A. Jusufi, D, Berisha, M, Reqica, Permbledhje detyrash nga matematika diskrete, Prishtine, 2022
F. Kabashi, A. Jusufi, USE OF COMPOSITE COMMUTATION FUNCTIONS IN DETERMINING THE DIFFIE-HELLMAN KEYS, PROCEEDINGS OF THE 7TH ANNUAL INTERNATIONAL CONFERENCE-UBT, 2018
B. Zekaj, A. Jusufi, B. Imeri-Jusufi, Using incomplete polynomial functions of the odd degree n and their inverses for data encryption and decryption, IFAC-PapersOnLine, Volume 55, Issue 39, 2022, Pages 241-246
Mirlinda Reqica, Diellza Berisha, Azir Jusufi, Meriton Reqica, Exploitation of exponential and logarithmic functions for data encryption and decryption, IFAC-PapersOnLine, Volume 55, Issue 39, 2022, Pages 286-291
DOI: http://dx.doi.org/10.52155/ijpsat.v48.2.6874
Refbacks
- There are currently no refbacks.
Copyright (c) 2025 Azir Jusufi

This work is licensed under a Creative Commons Attribution 4.0 International License.