Applying functions f:D1×D2→R2 � : � 1 × � 2 → ℝ 2 for encryption and decryption of data within the field
Session
Computer Science and Communication Engineering
Description
The study of Cryptosystems is highly important, and there is valuable scientific work dedicated to them. Cryptosystems are mathematical structures related to data encryption and decryption, dealing with secrecy and authenticity. In fulfilling these requirements, cryptography plays a crucial role, where many researchers have come up with various proposals and developed algorithms that have contributed, to some extent, to ensuring the confidentiality, integrity, and verification of given information. However, the issue of internet security through modern cryptography has become quite complex. Modern encryption systems are built upon complex mathematical algorithms and employ a combination of symmetric and asymmetric key encryption schemes to ensure secure communication.
The use of the function ;" role="presentation" style="margin: 0px; padding: 0px; user-select: text; -webkit-user-drag: none; -webkit-tap-highlight-color: transparent; white-space-collapse: collapse; display: inline-table; line-height: normal; font-size: 16px; word-spacing: normal; overflow-wrap: normal; float: none; direction: ltr; max-width: none; max-height: none; min-width: position: relative;">f:D1×D2→R2 �:�1×�2→ℝ2 for encrypting figures provides an effective and secure method to protect the privacy, security, and confidentiality of sensitive data, such as works of art or various sketches.
The utilization of functions f:D1×D2→ℝ2 " role="presentation" style="margin: 0px; padding: 0px; user-select: text; -webkit-user-drag: none; -webkit-tap-highlight-color: transparent; white-space-collapse: collapse; display: inline-table; line-height: normal; font-size: 16px; word-spacing: normal; overflow-wrap: normal; float: none; direction: ltr; max-width: none; max-height: none; min-width: 0px; min-height: 0px; border: 0px; position: relative;">f:D1×D2→R2 �:�1×�2→ℝ2 operating in a two-dimensional space encrypts the figures in a way that makes it challenging for unauthorized individuals to decrypt their shape and structure.
Keywords:
Encryption, decryption, functions, commutative functions, figures, works of art.
Proceedings Editor
Edmond Hajrizi
ISBN
978-9951-550-95-6
Location
UBT Lipjan, Kosovo
Start Date
28-10-2023 8:00 AM
End Date
29-10-2023 6:00 PM
DOI
10.33107/ubt-ic.2023.279
Recommended Citation
Jusufi, Azir; Zekaj, Blinera; Berisha, Diellza; and Imeri, Bukurie, "Applying functions f:D1×D2→R2 � : � 1 × � 2 → ℝ 2 for encryption and decryption of data within the field" (2023). UBT International Conference. 15.
https://knowledgecenter.ubt-uni.net/conference/IC/CS/15
Applying functions f:D1×D2→R2 � : � 1 × � 2 → ℝ 2 for encryption and decryption of data within the field
UBT Lipjan, Kosovo
The study of Cryptosystems is highly important, and there is valuable scientific work dedicated to them. Cryptosystems are mathematical structures related to data encryption and decryption, dealing with secrecy and authenticity. In fulfilling these requirements, cryptography plays a crucial role, where many researchers have come up with various proposals and developed algorithms that have contributed, to some extent, to ensuring the confidentiality, integrity, and verification of given information. However, the issue of internet security through modern cryptography has become quite complex. Modern encryption systems are built upon complex mathematical algorithms and employ a combination of symmetric and asymmetric key encryption schemes to ensure secure communication.
The use of the function ;" role="presentation" style="margin: 0px; padding: 0px; user-select: text; -webkit-user-drag: none; -webkit-tap-highlight-color: transparent; white-space-collapse: collapse; display: inline-table; line-height: normal; font-size: 16px; word-spacing: normal; overflow-wrap: normal; float: none; direction: ltr; max-width: none; max-height: none; min-width: position: relative;">f:D1×D2→R2 �:�1×�2→ℝ2 for encrypting figures provides an effective and secure method to protect the privacy, security, and confidentiality of sensitive data, such as works of art or various sketches.
The utilization of functions f:D1×D2→ℝ2 " role="presentation" style="margin: 0px; padding: 0px; user-select: text; -webkit-user-drag: none; -webkit-tap-highlight-color: transparent; white-space-collapse: collapse; display: inline-table; line-height: normal; font-size: 16px; word-spacing: normal; overflow-wrap: normal; float: none; direction: ltr; max-width: none; max-height: none; min-width: 0px; min-height: 0px; border: 0px; position: relative;">f:D1×D2→R2 �:�1×�2→ℝ2 operating in a two-dimensional space encrypts the figures in a way that makes it challenging for unauthorized individuals to decrypt their shape and structure.