The Use Of Functions f:D_1×D_2×D_3→R^3 For Encrypting And Decrypting Data In Space

Azir Jusufi, Blinera Zekaj, Gazmend Xhaferi, Altin Jusufi

Abstract


Cryptology, due to its ancient use, can be considered an old science; however, given the rapid development it has undergone recently, it can also be viewed as a contemporary science. The study of cryptosystems is highly important, and there is valuable scientific research on the subject. Modern encryption systems are based on complex mathematical algorithms and implement a combination of symmetric and asymmetric key encryption schemes to ensure secure communication. Using the function  for encrypting objects provides an effective and secure method to protect the privacy, security, and confidentiality of sensitive data, such as artworks or various sculptures.

The use of  operates in three-dimensional space, encrypting objects in a way that makes it difficult for unauthorized individuals to decrypt their shape and structure. The application of encryption functions for 3D objects or forms can be utilized in industries such as virtual reality, engineering, and many other fields.


Keywords


Encryption, Decryption, Functions, Commutative Composite Functions, Objects, 3D Shapes.

Full Text:

PDF

References


Azir Jusufi Kristaq Filipi, Matematikë Diskrete dhe Aplikime, Prishtine, 2022

https://tresorit.com/blog/the-history-of-encryption-the-roots-of-modern-day-cyber-security/

D. Dolev, C. Dwork, and M. Naor. Non-malleable cryptography. In23rd Annual ACM Symposium on Theory of Computing,1991.

D. Dolev, C. Dwork, and M. Naor. Non-malleable cryptography, 1998.

C. Dwork, M. Naor. Method for message authentication from non-malleable cryptosystems, 1996.

I. Damgard. Towards practical public key cryptosystems secure againstchosen ciphertext attacks. In Advances in Cryptology.

K. Filipi, A. Jusufi, Xh. Beqiri, Matematika për ekonomistë, Tetovë, 2012

Discrete Math, Mohamed Jamaloodeen, Kathy Pinzon, Daniel Pragel, Joshua Roberts, Sebastien Siva

Mathematical Foundations and Aspects of Discrete Mathematics, Jean Gallier and Jocelyn Quaintance, March 2022

Discrete Mathematics an Open Introduction, Oscar Levin, July 2021

Discrete Maths in Computer Science, Gary Haggard, John Schlipf, Sue Whitesides

A. Jusufi, D, Berisha, M, Reqica, P;rmbledhje detyrash nga matematika diskrete, Prishtine, 2022

F. Kabashi, A. Jusufi, USE OF COMPOSITE COMMUTATION FUNCTIONS IN DETERMINING THE DIFFIE-HELLMAN KEYS, PROCEEDINGS OF THE 7TH ANNUAL INTERNATIONAL CONF-UBT, 2018

B. Zekaj, A. Jusufi, B. Imeri-Jusufi, Using incomplete polynomial functions of the odd degree n and their inverses for data encryption and decryption, IFAC-PapersOnLine, Volume 55, Issue 39, 2022, Pages 241-246

Mirlinda Reqica, Diellza Berisha, Azir Jusufi, Meriton Reqica, Exploitation of exponential and logarithmic functions for data encryption and decryption, IFAC-PapersOnLine, Volume 55, Issue 39, 2022, Pages 286-291




DOI: http://dx.doi.org/10.52155/ijpsat.v48.2.6875

Refbacks

  • There are currently no refbacks.


Copyright (c) 2025 Azir Jusufi

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.