172 108
Full Length Article
volume 11 , Issue1, PP: 39-52 , 2020

Title

Cryptography in Terms of Triangular Neutrosophic Numbers with Real Life Applications

Authors Names :   Ali Hamza   1     Muhammad Naveed Jafar   2     Ahtasham Habib   3     Sara Farooq   4     Ezgi Türkarslan   5  

1  Affiliation :  Department of Mathematics Lahore Garrison University, Sector-C, Av-4, DHA Phase VI 54000 Lahorer, Pakistan

    Email :  naveedjafar@lgu.edu.pk


2  Affiliation :  Department of Mathematics Lahore Garrison University, Sector-C, Av-4, DHA Phase VI 54000 Lahorer, Pakistan

    Email :  naveedjafar@lgu.edu.pk


3  Affiliation :  Department of Mathematics Lahore Garrison University, Sector-C, Av-4, DHA Phase VI 54000 Lahorer, Pakistan

    Email :  naveedjafar@lgu.edu.pk


4  Affiliation :  Department of Mathematics Lahore Garrison University, Sector-C, Av-4, DHA Phase VI 54000 Lahorer, Pakistan

    Email :  naveedjafar@lgu.edu.pk


5  Affiliation :  Department of Mathematics, TED University, Ön Cebeci, Ziya Gökalp Cd. 48/A, 06420 Çankaya/Ankara, Turkey

    Email :  ezgi.turkarslan@tedu.edu.tr



Doi   :  10.5281/zenodo.4127138

Received: Jun 04, 2020 Accepted: September 14, 2020

Abstract :

 

In this article, our main focus is to put forward the concept of Cryptography in terms of triangular neutrosophic numbers. This kind of cryptography is really reliable, manual, secure, and based on few simple steps. All the encryption and decryption are easy to proceed (mention below). As we know, Public-key cryptography as an indefatigable defender for human privacy and use as information transfer from the ages. various concepts are available with regard to cryptography e.g. Elliptic curve cryptography. TNNC (Triangular neutrosophic numbers cryptography) is familiar with basic concepts of math as well as applicable in different situations e.g. code cryptography, detailed view cryptography, and Graph cryptography encryption facilitate.

 

Keywords :

Cryptography , Triangular Neutrosphic numbers , Code Encryption , Detailed overview encryption.

References :

n