{"title":"Text encryption with singular values","authors":"Mohammed Abdul-Hameed","doi":"10.47974/jim-1608","DOIUrl":null,"url":null,"abstract":"In this paper, we will talk about how text is encrypted. Generally, this is done through a number of processes that spread out the later values in a matrix, which is A through remittances are linear and the use of svd enters, including one key where work will start on the application process. New matrices B1 and B2 of the original text matrix are generated in a compound, and the key is entered. The second step of the dispersion involves utilizing SVD on the final matrices and switching the S matrix between the two spectra for the new matrices C1 and C2, which signifies inserting the matrix of the encoded text as correlative F = [C1 C2]. To determine the accuracy of the work, we calculated the matrix of the absolute value of the difference between the matrix of numbers for the original text characters lettering before encryption and the matrix of numbers for text characters after decryption, which resulted in a zero matrix, as well as the calculation of the average values of this matrix which resulted in a zero matrix.","PeriodicalId":46278,"journal":{"name":"JOURNAL OF INTERDISCIPLINARY MATHEMATICS","volume":null,"pages":null},"PeriodicalIF":1.1000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"JOURNAL OF INTERDISCIPLINARY MATHEMATICS","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47974/jim-1608","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"MATHEMATICS","Score":null,"Total":0}
引用次数: 0
Abstract
In this paper, we will talk about how text is encrypted. Generally, this is done through a number of processes that spread out the later values in a matrix, which is A through remittances are linear and the use of svd enters, including one key where work will start on the application process. New matrices B1 and B2 of the original text matrix are generated in a compound, and the key is entered. The second step of the dispersion involves utilizing SVD on the final matrices and switching the S matrix between the two spectra for the new matrices C1 and C2, which signifies inserting the matrix of the encoded text as correlative F = [C1 C2]. To determine the accuracy of the work, we calculated the matrix of the absolute value of the difference between the matrix of numbers for the original text characters lettering before encryption and the matrix of numbers for text characters after decryption, which resulted in a zero matrix, as well as the calculation of the average values of this matrix which resulted in a zero matrix.
期刊介绍:
The Journal of Interdisciplinary Mathematics (JIM) is a world leading journal publishing high quality, rigorously peer-reviewed original research in mathematical applications to different disciplines, and to the methodological and theoretical role of mathematics in underpinning all scientific disciplines. The scope is intentionally broad, but papers must make a novel contribution to the fields covered in order to be considered for publication. Topics include, but are not limited, to the following: • Interface of Mathematics with other Disciplines • Theoretical Role of Mathematics • Methodological Role of Mathematics • Interface of Statistics with other Disciplines • Cognitive Sciences • Applications of Mathematics • Industrial Mathematics • Dynamical Systems • Mathematical Biology • Fuzzy Mathematics The journal considers original research articles, survey articles, and book reviews for publication. Responses to articles and correspondence will also be considered at the Editor-in-Chief’s discretion. Special issue proposals in cutting-edge and timely areas of research in interdisciplinary mathematical research are encouraged – please contact the Editor-in-Chief in the first instance.