Text Encryption with Graph Theory Based Key Generation

Authors

  • Karrar Khudhair Obayes Department of Computer Information Systems, University of Al-Qadisiyah, Iraq ,Al Diwaniyah

DOI:

https://doi.org/10.29304/jqcsm.2024.16.31650

Keywords:

encryption, decoding undirected graph, complete graph, adjacent matrix

Abstract

This work presents a new encryption technique that ensures safe communication through two distinct phases: utilizing monoalphabetic substitution ciphers that rely on agreed-upon character-swapping arrangements between authorized individuals and applying an alphabetical encryption table. In addition, the research utilizes the Kurskal technique to calculate the minimum spanning tree, which improves security by creating intricate encrypted text using a shared key based on ideas drawn from graph theory.

Downloads

Download data is not yet available.

References

C. E. Shannon, "Communication theory of secrecy systems," The Bell system technical journal, vol. 28, pp. 656--715, 1949.

S. G. Akl, "How to encrypt a graph," International Journal of Parallel, Emergent and Distributed Systems, vol. 35, pp. 668--681, 2020.

Bai, Sen and Zhou, Longfu and Yan, Mingzhu and Ji, Xiaoyong and Tao, Xuejiao, "Image cryptosystem for visually meaningful encryption based on fractal graph generating," IETE Technical Review, vol. 38, pp. 130-141, 2021.

S. A. a. A.-W. R. D. a. A. E. W. Abdul-Ghani, "Securing text messages using graph theory and steganography," Baghdad Science Journal, vol. 19, pp. 0189--0189, 2022.

F. a. R. M. K. a. L. Q. a. W. S. Monrose, "Cryptographic key generation from voice," Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, pp. 202--213, 2000.

M. a. G. M. a. S. A. a. K. M. J. H. Yamuna, "Encryption using graph theory and linear algebra," International Journal of Computer Application, vol. 5, pp. 102--107, 2012.

M. a. K. K. Yamuna, "Data transfer using bipartite graphs," International Journal of Advance Research in Science and Engineering, vol. 4, pp. 128--131, 2015.

A. S. Naji, "key generation for text encryption using graph theory," Journal of Baghdad College of Economic sciences University, vol. 18, 2023.

M. a. O. K. K. a. A. M. Alaeiyan, "Prediction nullity of graph using data mining," Results in Nonlinear Analysis, pp. 1-8, 2023.

S. a. M. D. a. O. R. Lu, "Visual cryptography on graphs," Computing and Combinatorics: 14th Annual International Conference, COCOON 2008 Dalian, China, June 27-29, 2008 Proceedings 14, pp. 225-234, 2008.

P. a. W. G. Perera, "Encryption and decryption algorithms in symmetric key cryptography using graph theory," Psychology and Education Journal, vol. 58, pp. 3420--3427, 2021.

V. A. Ustimenko, "On graph-based cryptography and symbolic computations," Serdica Journal of Computing, vol. 1, pp. 131--156, 2007.

C. Vasudev, Graph theory with applications, New Age International, 2006.

Downloads

Published

2024-09-30

How to Cite

Khudhair Obayes, K. (2024). Text Encryption with Graph Theory Based Key Generation. Journal of Al-Qadisiyah for Computer Science and Mathematics, 16(3), Math. 26–35. https://doi.org/10.29304/jqcsm.2024.16.31650

Issue

Section

Math Articles