The Use Of Functions f:D_1×D_2×D_3→R^3 For Encrypting And Decrypting Data In Space
Abstract
Cryptology, due to its ancient use, can be considered an old science; however, given the rapid development it has undergone recently, it can also be viewed as a contemporary science. The study of cryptosystems is highly important, and there is valuable scientific research on the subject. Modern encryption systems are based on complex mathematical algorithms and implement a combination of symmetric and asymmetric key encryption schemes to ensure secure communication. Using the function for encrypting objects provides an effective and secure method to protect the privacy, security, and confidentiality of sensitive data, such as artworks or various sculptures.
The use of operates in three-dimensional space, encrypting objects in a way that makes it difficult for unauthorized individuals to decrypt their shape and structure. The application of encryption functions for 3D objects or forms can be utilized in industries such as virtual reality, engineering, and many other fields.
Keywords
Full Text:
PDFReferences
Azir Jusufi Kristaq Filipi, Matematikë Diskrete dhe Aplikime, Prishtine, 2022
https://tresorit.com/blog/the-history-of-encryption-the-roots-of-modern-day-cyber-security/
D. Dolev, C. Dwork, and M. Naor. Non-malleable cryptography. In23rd Annual ACM Symposium on Theory of Computing,1991.
D. Dolev, C. Dwork, and M. Naor. Non-malleable cryptography, 1998.
C. Dwork, M. Naor. Method for message authentication from non-malleable cryptosystems, 1996.
I. Damgard. Towards practical public key cryptosystems secure againstchosen ciphertext attacks. In Advances in Cryptology.
K. Filipi, A. Jusufi, Xh. Beqiri, Matematika për ekonomistë, Tetovë, 2012
Discrete Math, Mohamed Jamaloodeen, Kathy Pinzon, Daniel Pragel, Joshua Roberts, Sebastien Siva
Mathematical Foundations and Aspects of Discrete Mathematics, Jean Gallier and Jocelyn Quaintance, March 2022
Discrete Mathematics an Open Introduction, Oscar Levin, July 2021
Discrete Maths in Computer Science, Gary Haggard, John Schlipf, Sue Whitesides
A. Jusufi, D, Berisha, M, Reqica, P;rmbledhje detyrash nga matematika diskrete, Prishtine, 2022
F. Kabashi, A. Jusufi, USE OF COMPOSITE COMMUTATION FUNCTIONS IN DETERMINING THE DIFFIE-HELLMAN KEYS, PROCEEDINGS OF THE 7TH ANNUAL INTERNATIONAL CONF-UBT, 2018
B. Zekaj, A. Jusufi, B. Imeri-Jusufi, Using incomplete polynomial functions of the odd degree n and their inverses for data encryption and decryption, IFAC-PapersOnLine, Volume 55, Issue 39, 2022, Pages 241-246
Mirlinda Reqica, Diellza Berisha, Azir Jusufi, Meriton Reqica, Exploitation of exponential and logarithmic functions for data encryption and decryption, IFAC-PapersOnLine, Volume 55, Issue 39, 2022, Pages 286-291
DOI: http://dx.doi.org/10.52155/ijpsat.v48.2.6875
Refbacks
- There are currently no refbacks.
Copyright (c) 2025 Azir Jusufi

This work is licensed under a Creative Commons Attribution 4.0 International License.