Next-Generation Systems and Secure Computing
by Subhabrata Barman, Santanu Koley, Subhankar Joardar
4Transmit Texts Covertly Using Trigonometric Functions and Pythagorean Theorem
Nagadevi Bala Nagaram*, R. Narmada Devi and S. Karpagam
Department of Mathematics, Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, Avadi, Chennai, Tamil Nadu, India
Abstract
Cryptography is the technique of encrypting messages in order to provide secrecy to information security. Information can be obtained through cryptography by being changed into a format that only those who understand the process of encoding can decipher. The initial information is referred to as plaintext, while the encoded version is referred to as ciphertext. The method by which plaintext is transformed into ciphertext is known as encryption. The calculation or code used to do so is referred to as an algorithm. Decryption is a reverse of encryption, which converts ciphertext back to plaintext. An article titled “A mathematical theory of cryptography” was written by Shannon who had considered the inventor of cryptography while he was a long-time employee at Bell Labs. The Egyptians employed hieroglyphic writing to send messages to one another around 4,000 years ago. Only the scribes, who used to send communications on the kings’ behalf, were aware of this code’s existence. Someone must understand the information or know how to convert it back to plain text in order to decode it. Decoding often includes both the algorithm and a key. Every day, people and organizations use cryptography to safeguard ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access