Optimizing Cryptographic Security through Innovative Utilization of the K-Transform Algorithm
DOI:
https://doi.org/10.64229/7q0dbc20Keywords:
Cryptography, Caesar cipher, Encryption, Decryption, K-TransformAbstract
This paper addresses the relatively limited research concerning the use of integral transforms in cryptographic systems. It introduces a new method for encryption and decryption, one that's based on the K-Transform and its inverse. The proposed method begins by converting plaintext messages into numerical sequences. These are then represented as polynomials. The K-Transform is applied to these polynomials; this, along with modular arithmetic, then produces the ciphertext. Decryption involves reversing the modular operation and applying the inverse K-Transform. This guarantees the accurate and complete recovery of the original message. To support this methodological framework, we provide practical examples and visual illustrations. These offer direct insight into how the transformation process behaves and can be reversed. Experimental results demonstrate that this technique maintains data integrity, reversibility, and computational efficiency. Consequently, it's particularly well-suited for resource-constrained environments, such as IoT devices and embedded systems. Ultimately, this study positions the K-Transform as a viable alternative to traditional cryptographic primitives, establishing a foundational framework for further exploration in transform-based encryption. The work opens new avenues for enhancing security mechanisms in modern secure communication systems.
References
[1]Stanoyevitch A. Introduction to cryptography with mathematical foundations and computer implementations. CRC Press, 2010.
[2]Stallings W. Cryptography and network security (4th ed.). Prentice Hall, 2005.
[3]Lakshmi GN, Kumar BR, Sekhar AC. A cryptographic scheme of Laplace transforms. International Journal of Mathematical Archive, 2011, 2, 2515-2519.
[4]Grewal BS. Higher Engineering Mathematics. 2002, Khanna Publishers, New Delhi, 1996.
[5]Hiwarekar AP. A new method of cryptography using Laplace transform. International Journal of Mathematical Archive, 2012, 3(3), 1193-1197.
[6]Buchmann JA. Introduction to Cryptography, 4th Edn., Indian Reprint, Berlin, Germany: Springer, DOI: 10.1007/978-1-4684-0496-8
[7]Elzaki TM. The new integral transform Elzaki transform. Global Journal of Pure and Applied Mathematics, 2011, 7(1), 57-64.
[8]Mahgoub MMA. The new integral transform mahgoub transform. Advances in Theoretical and Applied Mathematics, 2016, 11(4), 391-398.
[9]Aboodh KS. The new integral transform aboodh transform. Global Journal of Pure and Applied Mathematics, 2013, 9(1), 35-43.
[10]Salim SJ, Ashruji MG. Application of Elzaki transform in cryptography. International Journal of Modern Sciences and Engineering Technology, 2016, 3(3), 46-48.
[11]Rosen KH, Krithivasan K. Discrete mathematics and its applications. New York: McGraw-hill, 1999.
[12]Kharde UD. An Application of the Elzaki transform in cryptography. Journal for Advanced Research in Applied Sciences, 2017, 4(5), 86-89.
[13]Dhingra S, Savalgi AA, Jain S. Laplace transformation based cryptographic technique in network security. International Journal of Computer Applications, 2016, 136(7), 975-8887.
[14]Kashuri Artion, Fundo A. A new integral transform. Advances in Theoretical and Applied Mathematics, 2013, 8(1), 27-43.
[15]Idowu AE, Saheed A, Adekola OR, Omofa FE. An application of integral transform based method in cryptograph. Asian Journal of Pure and Applied Mathematics, 2021, 3(1), 13-18.
[16]Mansour EA, Kuffi EA, Mehdi SA. Applying SEE integral transform in cryptography. Samarra Journal of Pure and Applied Science, 2022, 217-222.
[17]Kuffi EA, Mehdi SA, Mansour EA. Color image encryption based on new integral transform SEE. Journal of Physics: Conference Series. IOP Publishing, 2022, 2322(1), 012016. DOI: 10.1088/1742-6596/2322/1/012016
[18]Gupta R, Gupta R. Securing data transmission by cryptography using Rohit integral transform. International Journal of Engineering and Technology, 2023, 12(2),109-111.
[19]Sallman NK. Integral transform of three parameters with its applications. Kurdish Studies, 2024, 12(1), 3743-3752. DOI:10.58262/ks.v12i1.267
[20]Issa A, Kuffi EA. On The double integral transform (complex EE Transform) and their properties and applications. Ibn AL-Haitham Journal For Pure and Applied Sciences, 2024, 37(1), 429-441. DOI: 10.30526/37.1.3329
[21]Raghavendran P, Gunasekar T. A mathematical approach to enhance cybersecurity in AI-driven healthcare diagnostics using J-Transform. AI-Driven Healthcare Cybersecurity and Privacy. IGI Global Scientific Publishing, 2025, 245-266. DOI: 10.4018/979-8-3373-2827-0.ch009
[22]Gunasekar T, Raghavendran P. Applications of the R-Transform for advancing cryptographic security. Driving Transformative Technology Trends With Cloud Computing. IGI Global, 2024, 208-223. DOI: 10.4018/979-8-3693-2869-9.ch011
[23]Prabakaran R, Gunasekar T. Advancing cryptographic security with kushare transform Integration. Driving Transformative Technology Trends With Cloud Computing. IGI Global, 2024: 224-242. DOI: 10.4018/979-8-3693-2869-9.ch012
[24]Abudalou M. Enhancing data security through advanced cryptographic techniques. International Journal of Computer Science and Mobile Computing, 2024, 13(1), 88-92. DOI: 10.47760/ijcsmc.2024.v13i01.007
[25]Tajudeen KO, Ameen AO, Adeniyi AE. A systematic review on advanced encryption standard cryptography to enhance message security. Multimedia Tools and Applications, 2025, 1-26. DOI: 10.1007/s11042-025-21041-4
[26]Ramakrishna D, Shaik MA. A comprehensive analysis of cryptographic algorithms: evaluating security, efficiency, and future challenges. IEEE Access, 2024, 13, 11576-11593. DOI: 10.1109/ACCESS.2024.3518533
[27]Victor M, Praveenraj DDW, Alkhayyat A, Shakhzoda A. Cryptography: Advances in secure communication and data protection. E3S web of conferences. EDP Sciences, 2023, 399: 07010. DOI: 10.1051/e3sconf/202339907010
[28]Bachiphale PM, Zulpe NS. A comprehensive review of visual cryptography for enhancing high-security applications. Multimedia Tools and Applications, 2025, 84(26), 31023-31045. DOI: 10.1007/s11042-024-20426-1
[29]Taherdoost H, Le TV, Slimani K. Cryptographic techniques in artificial intelligence security: A bibliometric review. Cryptography, 2025, 9(1), 17. DOI: 10.3390/cryptography9010017
[30]Mendoza C, Herrera J. Enhancing security and privacy in advanced computing systems: A comprehensive analysis. Journal of Advanced Computing Systems, 2023, 3(12), 1-9.
[31]Mansour EA, Kuffi EA. The mayan transform: a novel integral transform of complex power parameters and applications to neutrosophic functions. International Journal of Neutrosophic Science, 2023, 23(1), 323-334. DOI: 10.54216/IJNS.230127
[32]Ali N, Haider MT, Ahmad M, Irfan M, Qureshi MI, Siddiqui HMA. Applications of graph transformations in cryptography: A secure encoding framework for data communication. Global Integrated Mathematics, 2025, 1(1), 28-43. DOI: 10.63623/9917ce44
[33]Aftab MH, Rehman S. Applications of Fourier Transformation with the help of cryptography. Punjab University Journal of Mathematics, 2024, 56(6), 230-250. DOI: 10.52280/pujm.2024.56(6)01
Downloads
Published
Issue
Section
License
Copyright (c) 2026 Prabakaran Raghavendran, Tharmalingam Gunasekar (Author)

This work is licensed under a Creative Commons Attribution 4.0 International License.