Cryptographic Method Based on Natural-Elzaki Transform

Zill E Huma*, Jamshaid Ul Rahman**, Muhammad Suleman***, Naveed Anjum****
*-**Abdus Salam School of Mathematical Sciences (ASSMS), GCU Lahore, Pakistan.
***Department of Mathematics, Comsats University Islamabad, Pakistan.
****Department of Mathematics, Government College University, Faisalabad, Pakistan.
Periodicity:January - June'2022


Securing data in this era of technology is the most challenging task. Cryptography is a practice of different techniques and methodologies for data confidentiality, data integrity, authentication, and non-repudiation. Many mathematical techniques are being used in cryptography from ancient times. The Laplace integral transforms and its inverse forms gain significant importance to design cryptographic methods. In this work, we propose cryptography methodology based on Natural and Elzaki transform and this study comprises a unique structure that provides Laplace-Elzaki and Sumudu-Elzaki methodologies. A generalized version of Laplace and Sumudu transform is also presented.


Integral Transforms, Elzaki Transform, N-Transform, N-Elzaki Transform, Laplace-Elzaki Transform, Sumudu-Elzaki Transform.

How to Cite this Article?

Huma, Z. E., Rahman, J. U., Suleman, M., and Anjum, N. (2022). Cryptographic Method Based on Natural-Elzaki Transform. i-manager’s Journal on Mathematics, 11(1), 39-46.


[1]. Ali, A., Hussain, M., Ali, Z., Rahman, J. U., & Hussan, M. (2020). Parallel performance analysis and numerical simulation of magnetic nanoparticles transportation and blood flow pattern in capillaries. IEEE Access, 8, 195021-195029.
[2]. Cole, E., Krutz, R. L., Conley, J., Reisman, B., Ruebush, M., & Gollmann, D. (2007). Wiley Pathways Network Security Fundamentals, John Wiley & Sons.
[3]. Damico, T. M. (2009). A brief history of cryptography. Inquiries Journal, 1(11). Retrieved from
[4]. Elzaki, T. M. (2009). Existence and uniqueness of solutions for composite type equation. Journal of Science and Technology, 10(2), 215-220.
[5]. Elzaki, T. M. (2011a). The new integral transform Elzaki transform. Global Journal of Pure and Applied Mathematics, 7(1), 57-64.
[6]. Elzaki, T. M. (2011b). Application of new transform “Elzaki transform” to partial differential equations. Global Journal of Pure and Applied Mathematics, 7(1), 65-70.
[7]. Elzaki, T. M., & Ezaki, S. M. (2011a). On the connections between Laplace and ELzaki transforms. Advances in Theoretical and Applied Mathematics, 6(1), 1-10.
[8]. Elzaki, T. M., & Ezaki, S. M. (2011b). On the Elzaki transform and ordinary differential equation with variable coefficients. Advances in Theoretical and Applied Mathematics, 6(1), 41-46.
[9]. Elzaki, T. M., Kilicman, A., & Eltayeb, H. (2010). On existence and uniqueness of generalized solutions for a mixed-type differential equation. Journal of Mathematics Research, 2(4), 88-92.
[10]. Khan, W. A., Rahman, J. U., Mohammed, M., AlHussain, Z. A., & Elbashir, M. K. (2021). Topological sustainability of crop water requirements and irrigation scheduling of some main crops based on the Penman-Monteith method. Journal of Chemistry.
[11]. Khan, Z. H., & Khan, W. A. (2008). N-transform properties and applications. NUST Journal of Engineering Sciences, 1(1), 127-133.
[12]. Lu, D., Suleman, M., Ramzan, M., & Ul Rahman, J. (2021a). Numerical solutions of coupled nonlinear fractional KdV equations using He's fractional calculus. International Journal of Modern Physics B, 35(2), (pp. 2150023).
[13]. Lu, D., Suleman, M., Ul Rahman, J., Noeiaghdam, S., & Murtaza, G. (2021b). Numerical simulation of fractional Zakharov–Kuznetsov equation for description of temporal discontinuity using projected differential transform method. Complexity.
[14]. Mehmood, A., Farid, G., Javed, R., & Ahsan, M. K. (2020). A new mathematical exponential cryptology algorithm by using natural transformation. International Journal of Mathematical Analysis, 14(4), 187-193.
[15]. Mollin, R. A. (2004). Cryptography-A brief history. CUBO, A Mathematical Journal, 6(1), 23-44.
[16]. Naser, S. M. (2021). Cryptography: From the ancient history to now, it's applications and a new complete numerical model. International Journal of Mathematics and Statistics Studies, 9(3), 11-30.
[17]. Paar, C., & Pelzl, J. (2009). Understanding Cryptography: A Textbook for Students and Practitioners. Springer Science & Business Media.
[18]. Priya, D. S., Amirtha, M. A., & Kumar, S. P. (2019). Application of N-transform in cryptography. International Journal of Scientific Research and Reviews, 8(1), 2143-2147.
[19]. Shivaji, J. S., & Hiwarekar, A. P. (2021). Cryptographic method based on Laplace-Elzaki transform. Journal of the Maharaja Sayajirao University of Baroda, 55(1), 187- 191.
[20]. Stallings, W. (2006). Cryptography and Network Security: Principles and practice. 4th ed. Pearson Education India.
[21]. Singh, S. (2011). The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. Anchor Books.
[22]. Suleman, M., Elzaki, T. M., Rahman, J. U., & Wu, Q. (2016). A novel technique to solve space and time fractional telegraph equation. Journal of Computational and Theoretical Nanoscience, 13(3), 1536-1545.
[23]. Suleman, M., Elzaki, T., Wu, Q., Anjum, N., & Rahman, J. U. (2017). New application of Elzaki projected differential transform method. Journal of Computational and Theoretical Nanoscience, 14(1), 631-639.
[24]. Suleman, M., Lu, D., Yue, C., Ul Rahman, J., & Anjum, N. (2019). He–Laplace method for general nonlinear periodic solitary solution of vibration equations. Journal of Low Frequency Noise, Vibration and Active Control, 38(3-4), 1297-1304.
[25]. Ul Rahman, J., Lu, D., Suleman, M., He, J. H., & Ramzan, M. (2019). He–Elzaki method for spatial diffusion of biological population. Fractals, 27(5), 1950069.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.