Page 25 - POSTER FYP MAC-OGOS 2025
P. 25

Faculty of Computer Science and Mathematics







                                                                                                     DATA ENCRYPTION AND DECRYPTION IN CRYPTOGRAPHY









                                                                                                                                                                                         USING KUSHARE TRANSFORM











                                                                                                                                                               PREPARED BY: NURUL FARA NABILA BINTI MOKHTAR                                                                                                                                                                                   K242/26




                                                                                                                                                                               SUPERVISOR: MISS MARDHIYAH BINTI ISMAIL



                                                                                                                                                                                                                                                 ABSTRACT










         Data security is a mechanism that guards against unauthorized access, data stealing, and corruption throughout the life cycle of digital information. Cryptography is




         the practice of securing information and communications can go to the intended person for whom the information is meant. Encryption and decryption are the



         elementary  operations  of  cryptography.  The  aim  of  this  paper  is  to  produce  crytpsystem  using  Kushare  Transform  and  to  apply  plaintext  to  the  cryptosystem




         produced, this step using Kushare Transform and Inverse Kushare Transform. The plaintext "MEET\_ME\_AT\_CAFE\_BUNGACANTIK\_AT\_FIVEPM\_BY\_TODAY" was



         encrypted  to  the  ciphertext  "MLYN\_ML\_AG\_CXTS\_BRPEIUMFPRO\_AG\_F\_BSIS\_BF\_TITTI"  to  validate  the  cryptosystem  produced.  The  decryption  process




         successfully  recovered  the  original  plaintext,  demonstrating  the  accuracy  and  reliability  of  the  scheme.  The  project  used  the  Kushare  Transform  to  produce



         encryption and decryption scheme.








                                                       PROBLEM STATEMENT                                                                                                                                                                                 OBJECTIVE                                                                                                                                RESULT AND DISCUSSION











          Digital technology is growing very fast. People can                                                                                                                                                                  To produce crytpsystem using                                                                                                                                                                        RESULT




          easily  share  information  through  social  media.  But                                                                                                                                                             Kushare Transform.                                                                                                             Develop an encryption and decryption algorithm.




          with this growth, there is also the risk of data being                                                                                                                                                               To apply plaintext to the                                                                                                      Using modulor arithmetic (mod 27).





          changed  or  stolen  by  others.  That’s  why  it  is                                                                                                                                                                cryptosystem produced.                                                                                                         The symmetric key is essential for both encryption




          important to protect our data and keep it safe. This                                                                                                                                                                               METHODOLOGY                                                                                                      and decryption.




          project  uses  the  Kushare  Transform  to  create  a                                                                                                                                                                                                                                                                                               The algorithm achieved both project objectives and




          system that keeps information secure. It is a math                                                                                                                                                                                                                                                                                                  validated the integrity of the cryptosystem.



                                                                                                                                                                                                      Transform function                                                          Apply the encryption
          method  that  helps  to  lock  (encrypt)  and  unlock                                                                                                                                                                                                                 algorithm produced to

                                                                                                                                                                                                              using Kushare

          (decrypt) information so that only the right person                                                                                                                                                      Transform                                                                        plaintext




          can  see  it.  This  new  system  will  help  make  digital





          data more secure and protect it from new threats.                                                                                                                                                                                                                             Use key obtain to

                                                                                                                                                                                                                       Key to                                                                  produce the



                                                                                                                                                                                                           cryptosystems                                                          decryption algorithm


                                                            IMPLEMENTATION                                                                                                                                   are generated                                                                   to get original





                                                                                                                                                                                                                                                                                                    plaintext




           Step 1:                                                                                                                                                                                  Step 5: Recognizing coefficient for sentense using                                                                                                                                                                                                       DISCUSSION






                                                                                                                                                                                                    Kushare  Transform
                                                                                                                                                                                                                                                                                                                                                                                                                   The  project  uses  Kushare  Transform



                                                                                                                                                                                                                                                                                                                                                                                                                   with modular arithmetic as the basis



         Step 2: Apply the encryption algorithm produced to plain                                                                                                                                                                                                                                                                                                                                                  for a secure encryption system.




         text                                                                                                     Maclaurin Series                                                                                                                                                                                                                                                                                 Kushare  Transform  is  built  using  a


                     Chosen function                                                                                                                                                                                                                                                                                                                                                                               step-by-step  mathematical  process






                                                                                                                                                                                                    “MEET_ME_AT_CAFE_BUNGACANTIK_AT_FIVEPM_BY_TODAY”                                                                                                                                                               based on the Maclaurin Series.

                                                                                                                                                                                                                                                                                                                                                                                                                   Modulor  arithmetic  adds  another




                                                                                                                                                                                                                                Separate word by word. The first word “MEET”_                                                                                                                                      layer                 of            security                       by            removing



                                                                                                                                                                                                                                                                                                                                                                                                                   patterns in the encrypted data.

                                                                                                                                                                                                  The plain text:                                                                                                                                                                                                  Key  are  generated  uaing  differences


                                        To produce the encryption algorithm

                                                                                                                                                                                                                                                                                                                                                                                                                   in           modulus                         values,                     so            correct



                                                                                                                                                                                                                                                                                                                                                                                                                   decryption needs the right key.



                                                                                                                                                                                                                                                                                                                                                                                                                   This highlights the importance of key



                                                                                                                                                                                                                                                                                                                                                                                                                   management                                             in                     symmetric




                                                                                                                                                                                                                                                                                                                                                                                                                   cryptographic systems.








                                                                                                                                                                                                            Let assume:                                                                                                                                                                                                                                CONCLUSION







                                                                                    where a=1
                                                                                                                                                                                                                                                                                                                                                                                                                    Subtituting plaintext into numerical



                                                                                                                                                                                                                                                                                                                                                                                                                    values.




                                                                                                                                                                                                                                                                                                                                                                                                                    Applying thr Kushare Transform via



                                                                                                                                                                                                                                                                                                                                                                                                                    Maclaurin Series expansion.

                                                                                                                                                                                                                            The message “MEET_” was converted to “MLYV_”                                                                                                                                            The                    study                         contributes                                     to






                                                                                                                                                                                                                                                                                                                                                                                                                    cryptography                                             research                                   by


                                                                                                                                                                                                                                               The key:                                                                                                                                                             proposing                              a             novel                     approach




                     Step 3: Finding the key for the cryptosystem                                                                                                                                                                                                                                                                                                                                                   combining  integral  transform  and




                                                                                                                                                                                                                                                                                                                                                                                                                    symbolic  encoding  for  enhanced

                                                               Using modular arithmetric
                                                                                                                                                                                                                                                                                                                                                                                                                    data security.





                                                                                                                                                                                                               Convert the ciphertext to find finite sequence of numbers.                                                                                                                                                                 RECOMMENDATIONS







                      Step 4: Use key obtain to produce the decryption



                      algorithm to get original plain text                                                                                                                                                                                                                                                                                                                                                            Focus  on  practical  implementation


                                                                                                                                                                                                                                                                                                                                                                                                                      in real-time systems.

                                                                                                                                                                                                                                                              Let:

                                                                                                                                                                                                                                                                                                                                                                                                                      Combine  with  other  cryptographic



                                                                                                                                                                                                                                                                                                                                                                                                                      technique.



                                                                                                                                                                                                                                                                                                                                                                                                                      Broader  research  and  application




                                                                                                                                                                                                                                                                                                                                                                                                                      could  lead  to  more  resilient  and


                                                                                                                                                                                                                                          f(t) is finite 13,5,5,20,0. We get original plain text                                                                                                                      adaptive                                                          cybersecurity




                                                                                                                                                                                                                                                                                                           “MEET”.                                                                                                    frameworks.
   20   21   22   23   24   25   26   27   28   29   30