Download PDFOpen PDF in browserA Review Paper on Cryptography Using Automata TheoryEasyChair Preprint 76617 pages•Date: March 29, 2022AbstractCryptography's two most important aspects are encryption and decryption. The primary goal of both systems is to protect data. To convert ordinary text to ciphertext, we used encryption. In the opposite direction of encryption, decryption is the process of transforming encrypted text into plain text. The devised encryption solution assures data secrecy for secure communication by utilizing a finite state machine and the LU decomposition approach. We also use lower and upper triangular matrices, which are created by decomposing a square matrix, in our proposed method. The key will be a lower triangular matrix modulated by a prime number in the encryption process, and an upper triangular matrix modulated by a prime number in the decryption process. The strategy is advantageous.In industries where sensitive data must be supplied, such as banking and military services, this strategy is advantageous. Keyphrases: Decryption, Encryption, LU decomposition., Turing machine, finite automata
|