ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Applying Graph Theory to Secure Data by Cryptography

Journal: International Journal of Linguistics and Computational Applications (Vol.8, No. 1)

Publication Date:

Authors : ;

Page : 1-3

Keywords : Cryptography; Substitution; Transposition; Adjacent Matrix; Sparse; Symmetric; Asymmetric.;

Source : Downloadexternal Find it from : Google Scholarexternal


Graph Theory is one of the significant and important areas in Mathematics, which is used in Network Security. Cryptography is art of science to achieving security by encoding message to make it non-readable (secretive) to unintended users. Many techniques are presents to encrypt plain text and convert it to the cipher text [2]. Any cryptographic scheme is secure if and only if it is unbreakable in reasonable time, using feasible resources in spite of the intruder's being aware of the encryption and decryption algorithm and size of the key. In the proposed algorithm, adjacent matrix of graph can be used to obtain key for encryption and decryption which is safer compared to other keys.

Last modified: 2021-06-06 02:29:58