Optimized Integral Transform and Modular Arithmetic Encryption for Efficient Security in Digital Supply Networks

Authors

  • Prabakaran Raghavendran Department of Mathematics, Vel Tech Rangarajan Dr. Sagunthala RD Institute of Science and Technology, Chennai, Tamil Nadu, India Author
  • Tharmalingam Gunasekar Department of Mathematics, Vel Tech Rangarajan Dr. Sagunthala RD Institute of Science and Technology, Chennai, Tamil Nadu, India Author

DOI:

https://doi.org/10.63623/0swt9s83

Keywords:

Cryptography, Caesar cipher, Encryption, Decryption, R-Transform

Abstract

This study presents a new form of encryption technique combining the R-transform with modular arithmetic to suit secure data exchange in digital supply chain operations. Moving away from the conventional approach to cryptography, this study looks at how this potent combination could be used to transform the supply chain’s sensitive data, thus keeping them impervious to cyber threats while allowing secure digital communication between nodes. It underlines the remarkable ability of the R-transform to make the data confidential and integrity of the supply chain network through an exhaustive analysis of the collaboration. Stringent experiments and analysis point toward a new kind of cryptographic method that would keep confidential supply chain information, creating trust and robustness in this digital era.

References

[1] Stallings W. Cryptography and network security: Principles and practice, 7th ed.; Pearson: London, England, 2020.

[2] Singh S. The code book: The science of secrecy from ancient Egypt to quantum cryptography. Doubleday: New York, United States, 1999.

[3] Shannon CE. Communication theory of secrecy systems. The Bell System Technical Journal, 1949, 28(4), 656-715

[4] Rivest RL, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 1978, 21(2), 120-1266

[5] Daemen J, Rijmen V. The design of rijndael: AES - The advanced encryption standard, 1st ed. Springer Berlin: Heidelberg, Germany, 2002.

[6] Debnath L, Bhatta D. Integral transforms and their applications. 2nd ed. Chapman and Hall/CRC: New York, United States, 2016.

[7] OppenheimAV, Schafer RW. Discrete-Time signal processing, 2nd ed. Prentice Hall: New Jersey, United States, 1999.

[8] Hiwarekar AP. New mathematical modeling for cryptography. Journal of Information Assurance and Security, 2014, 9(2014), 27-33.

[9] Sasirekha N, Hemalatha M. An enhanced code encryption approach with HNT transformations for software security. International Journal of Computer Applications, 2012, 53(10).

[10] Donald EK. The art of computer programming, Volume 2: Seminumerical Algorithms, 3rd ed. Addison-Wesley: Boston, United States, 1997.

[11] Koblitz N. Elliptic curve cryptosystems. Mathematics of Computation, 1987, 48(177), 203-209. DOI: 10.1090/S0025-5718-1987-0866109-5

[12] Gunasekar T, Raghavendran P. Applications of the R-Transform for advancing cryptographic security. In Driving Transformative Technology Trends With Cloud Computing, 2024, 208-223. DOI: 10.4018/979-8-3693-2869-9.ch011

[13] Prabakaran R, Gunasekar T. Advancing cryptographic security with kushare transform Integration. In Driving Transformative Technology Trends With Cloud Computing, 2024, 224-242. DOI: DOI: 10.4018/979-8-3693-2869-9.ch012

[14] Akanni GA. Enhanced residue number system based encryption algorithms and their comparative assessment for data protection in the era of digitization. Doctoral Dissertation, Kwara State University, Nigeria, 2024.

[15] Alohali MA, Aljebreen M, Al-Mutiri F, Othman M, Motwakel A, et al. Blockchain-driven image encryption process with arithmetic optimization algorithm for security in emerging virtual environments. Sustainability. 2023, 15(6), 5133. DOI: 10.3390/su15065133

[16] Xia Z, Yang X, Li A, Liu Y, He S. Research on information security transmission of port multi-thread equipment based on advanced encryption standard and preprocessing optimization. Applied Sciences, 2024, 14(24), 11887. DOI: 10.3390/app142411887

[17] Lin Y, Lin Y. NSEA: A resilient ERP framework integrating quantum-safe cryptography and neuro-symbolic reasoning for industrial adaptability. IEEE Access, 2025, 13, 77686-77695. DOI: 10.1109/ACCESS.2025.3562739

[18] Wang Z, Tabassum M. A Holistic secure communication mechanism using a multilayered cryptographic protocol to enhanced security. Computers, Materials & Continua, 2024, 78(3). DOI: 10.32604/cmc.2024.046797

[19] Muhammad AU, Özkaynak F. SIEA: secure image encryption algorithm based on chaotic systems optimization algorithms and PUFs. Symmetry, 2021, 13(5):824. DOI: 10.3390/sym13050824

[20] Gao J, Zhang X, Zhong S. Data security and access control method of blockchain with revocable attribute encryption in steel supply chain. Peer-to-Peer Networking and Applications, 2025, 18(4), 1-28. DOI: 10.1007/s12083-025-01985-y

[21] Thabit F, Can O, Aljahdali AO, Al-Gaphari GH, Alkhzaimi HA. Cryptography algorithms for enhancing IoT security. Internet of Things, 2023, 22, 100759. DOI: 10.1016/j.iot.2023.100759

[22] Robert W, Denis A, Thomas A, Samuel A, Kabiito SP. A comprehensive review on cryptographic techniques for securing internet of medical things: A state-of-the-art, applications, security attacks, mitigation measures, and future research direction. Mesopotamian Journal of Artificial Intelligence in Healthcare, 2024, 135-169. DOI: 10.58496/MJAIH/2024/016

[23] Ismail NA, Khadra SA, Attiya GM, Abdulrahman SES. Optimizing SIKE for blockchain-based IoT ecosystems with resource constraints. The Journal of Supercomputing, 2025, 81(3), 1-44. DOI: 10.1007/s11227-024-06906-z

[24] Sun M, Yuan J, Li X, Liu D. Chaotic CS encryption: An efficient image encryption algorithm based on chebyshev chaotic system and compressive sensing. Computers, Materials & Continua, 2024, 79(2), 1-10. DOI:10.32604/cmc.2024.050337

[25] Asante M, Epiphaniou G, Maple C, Al-Khateeb H, Bottarelli M, et al. Distributed ledger technologies in supply chain security management: A comprehensive survey. IEEE Transactions on Engineering Management, 2021, 70(2), 713-739. DOI: 10.1109/TEM.2021.3053655

[26] Kareem SR. Encryption of audio signals using the elzaki transformation and the lorenz chaotic system lorenz chaotic system. arXiv preprint arXiv:2409.14092, 2024. DOI: 10.48550/arXiv.2409.14092

[27] Chinnaperumal S, Raju SK, Alharbi AH, Kannan S, Khafaga DS, et al. Decentralized energy optimization using blockchain with battery storage and electric vehicle networks.Scientific Reports, 2025, 15(1), 5940. DOI: 10.1038/s41598-025-86775-5

[28] Zafir EI, Akter A, Islam MN, Hasib SA, Islam T, et al.Enhancing security of internet of robotic things: A review of recent trends, practices, and recommendations with encryption and blockchain techniques. Internet of Things, 2024, 28, 101357. DOI: 10.1016/j.iot.2024.101357

[29] Vignesh E, Jeyanthy PA. Efficient and secure integration of renewable energy sources in smart grids using hybrid fuzzy neural network and improved Diffie-Hellman key management. Computers and Electrical Engineering, 2025, 123, 110206. DOI: 10.1016/j.compeleceng.2025.110206

[30] Nguyen H, Huda S, Nogami Y, Nguyen TT. Security in post-quantum era: A comprehensive survey on lattice-based algorithms. IEEE Access, 2025, 13, 89003-89024. DOI: 10.1109/ACCESS.2025.3571307

[31] Demir, ED, Bilgin B, Onbasli, MC. Performance analysis and industry deployment of post-quantum cryptography algorithms. arXiv preprint arXiv:2503.12952, 2025. DOI: 10.48550/arXiv.2503.12952

Downloads

Published

2025-06-04

Issue

Section

Articles