Text Encryption with Graph Theory Based Key Generation
DOI:
https://doi.org/10.29304/jqcsm.2024.16.31650Keywords:
encryption, decoding undirected graph, complete graph, adjacent matrixAbstract
This work presents a new encryption technique that ensures safe communication through two distinct phases: utilizing monoalphabetic substitution ciphers that rely on agreed-upon character-swapping arrangements between authorized individuals and applying an alphabetical encryption table. In addition, the research utilizes the Kurskal technique to calculate the minimum spanning tree, which improves security by creating intricate encrypted text using a shared key based on ideas drawn from graph theory.
Downloads
References
C. E. Shannon, "Communication theory of secrecy systems," The Bell system technical journal, vol. 28, pp. 656--715, 1949.
S. G. Akl, "How to encrypt a graph," International Journal of Parallel, Emergent and Distributed Systems, vol. 35, pp. 668--681, 2020.
Bai, Sen and Zhou, Longfu and Yan, Mingzhu and Ji, Xiaoyong and Tao, Xuejiao, "Image cryptosystem for visually meaningful encryption based on fractal graph generating," IETE Technical Review, vol. 38, pp. 130-141, 2021.
S. A. a. A.-W. R. D. a. A. E. W. Abdul-Ghani, "Securing text messages using graph theory and steganography," Baghdad Science Journal, vol. 19, pp. 0189--0189, 2022.
F. a. R. M. K. a. L. Q. a. W. S. Monrose, "Cryptographic key generation from voice," Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, pp. 202--213, 2000.
M. a. G. M. a. S. A. a. K. M. J. H. Yamuna, "Encryption using graph theory and linear algebra," International Journal of Computer Application, vol. 5, pp. 102--107, 2012.
M. a. K. K. Yamuna, "Data transfer using bipartite graphs," International Journal of Advance Research in Science and Engineering, vol. 4, pp. 128--131, 2015.
A. S. Naji, "key generation for text encryption using graph theory," Journal of Baghdad College of Economic sciences University, vol. 18, 2023.
M. a. O. K. K. a. A. M. Alaeiyan, "Prediction nullity of graph using data mining," Results in Nonlinear Analysis, pp. 1-8, 2023.
S. a. M. D. a. O. R. Lu, "Visual cryptography on graphs," Computing and Combinatorics: 14th Annual International Conference, COCOON 2008 Dalian, China, June 27-29, 2008 Proceedings 14, pp. 225-234, 2008.
P. a. W. G. Perera, "Encryption and decryption algorithms in symmetric key cryptography using graph theory," Psychology and Education Journal, vol. 58, pp. 3420--3427, 2021.
V. A. Ustimenko, "On graph-based cryptography and symbolic computations," Serdica Journal of Computing, vol. 1, pp. 131--156, 2007.
C. Vasudev, Graph theory with applications, New Age International, 2006.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Karrar Khudhair Obayes
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.