Page 25 - POSTER FYP MAC-OGOS 2025
P. 25
Faculty of Computer Science and Mathematics
DATA ENCRYPTION AND DECRYPTION IN CRYPTOGRAPHY
USING KUSHARE TRANSFORM
PREPARED BY: NURUL FARA NABILA BINTI MOKHTAR K242/26
SUPERVISOR: MISS MARDHIYAH BINTI ISMAIL
ABSTRACT
Data security is a mechanism that guards against unauthorized access, data stealing, and corruption throughout the life cycle of digital information. Cryptography is
the practice of securing information and communications can go to the intended person for whom the information is meant. Encryption and decryption are the
elementary operations of cryptography. The aim of this paper is to produce crytpsystem using Kushare Transform and to apply plaintext to the cryptosystem
produced, this step using Kushare Transform and Inverse Kushare Transform. The plaintext "MEET\_ME\_AT\_CAFE\_BUNGACANTIK\_AT\_FIVEPM\_BY\_TODAY" was
encrypted to the ciphertext "MLYN\_ML\_AG\_CXTS\_BRPEIUMFPRO\_AG\_F\_BSIS\_BF\_TITTI" to validate the cryptosystem produced. The decryption process
successfully recovered the original plaintext, demonstrating the accuracy and reliability of the scheme. The project used the Kushare Transform to produce
encryption and decryption scheme.
PROBLEM STATEMENT OBJECTIVE RESULT AND DISCUSSION
Digital technology is growing very fast. People can To produce crytpsystem using RESULT
easily share information through social media. But Kushare Transform. Develop an encryption and decryption algorithm.
with this growth, there is also the risk of data being To apply plaintext to the Using modulor arithmetic (mod 27).
changed or stolen by others. That’s why it is cryptosystem produced. The symmetric key is essential for both encryption
important to protect our data and keep it safe. This METHODOLOGY and decryption.
project uses the Kushare Transform to create a The algorithm achieved both project objectives and
system that keeps information secure. It is a math validated the integrity of the cryptosystem.
Transform function Apply the encryption
method that helps to lock (encrypt) and unlock algorithm produced to
using Kushare
(decrypt) information so that only the right person Transform plaintext
can see it. This new system will help make digital
data more secure and protect it from new threats. Use key obtain to
Key to produce the
cryptosystems decryption algorithm
IMPLEMENTATION are generated to get original
plaintext
Step 1: Step 5: Recognizing coefficient for sentense using DISCUSSION
Kushare Transform
The project uses Kushare Transform
with modular arithmetic as the basis
Step 2: Apply the encryption algorithm produced to plain for a secure encryption system.
text Maclaurin Series Kushare Transform is built using a
Chosen function step-by-step mathematical process
“MEET_ME_AT_CAFE_BUNGACANTIK_AT_FIVEPM_BY_TODAY” based on the Maclaurin Series.
Modulor arithmetic adds another
Separate word by word. The first word “MEET”_ layer of security by removing
patterns in the encrypted data.
The plain text: Key are generated uaing differences
To produce the encryption algorithm
in modulus values, so correct
decryption needs the right key.
This highlights the importance of key
management in symmetric
cryptographic systems.
Let assume: CONCLUSION
where a=1
Subtituting plaintext into numerical
values.
Applying thr Kushare Transform via
Maclaurin Series expansion.
The message “MEET_” was converted to “MLYV_” The study contributes to
cryptography research by
The key: proposing a novel approach
Step 3: Finding the key for the cryptosystem combining integral transform and
symbolic encoding for enhanced
Using modular arithmetric
data security.
Convert the ciphertext to find finite sequence of numbers. RECOMMENDATIONS
Step 4: Use key obtain to produce the decryption
algorithm to get original plain text Focus on practical implementation
in real-time systems.
Let:
Combine with other cryptographic
technique.
Broader research and application
could lead to more resilient and
f(t) is finite 13,5,5,20,0. We get original plain text adaptive cybersecurity
“MEET”. frameworks.

