Applying Graph Theory to Secure Data by Cryptography
Journal: International Journal of Linguistics and Computational Applications (Vol.8, No. 1)Publication Date: 2021-03-30
Authors : Gurusharan Kaur Namrata Tripathi;
Page : 1-3
Keywords : Cryptography; Substitution; Transposition; Adjacent Matrix; Sparse; Symmetric; Asymmetric.;
Abstract
Graph Theory is one of the significant and important areas in Mathematics, which is used in Network Security. Cryptography is art of science to achieving security by encoding message to make it non-readable (secretive) to unintended users. Many techniques are presents to encrypt plain text and convert it to the cipher text [2]. Any cryptographic scheme is secure if and only if it is unbreakable in reasonable time, using feasible resources in spite of the intruder's being aware of the encryption and decryption algorithm and size of the key. In the proposed algorithm, adjacent matrix of graph can be used to obtain key for encryption and decryption which is safer compared to other keys.
Other Latest Articles
- Literature as the Foundation of Life and its Values
- Social Challenges of Young Adults in Rainbow Rowell’s “Eleanor and Park”
- Enhancing Cloud Scaling by Reducing Slow Data Migrations using Supervised Learning Approach
- A Comparative Study of Analysis and Investigation using Digital Forensics
- BLAPD: Biometric Liveness Authentication on Personalized Devices
Last modified: 2021-06-06 02:29:58