Applying Graph Theory to Secure Data by CryptographyJournal: International Journal of Linguistics and Computational Applications (Vol.8, No. 1)
Publication Date: 2021-03-30
Authors : Gurusharan Kaur Namrata Tripathi;
Page : 1-3
Keywords : Cryptography; Substitution; Transposition; Adjacent Matrix; Sparse; Symmetric; Asymmetric.;
Graph Theory is one of the significant and important areas in Mathematics, which is used in Network Security. Cryptography is art of science to achieving security by encoding message to make it non-readable (secretive) to unintended users. Many techniques are presents to encrypt plain text and convert it to the cipher text . Any cryptographic scheme is secure if and only if it is unbreakable in reasonable time, using feasible resources in spite of the intruder's being aware of the encryption and decryption algorithm and size of the key. In the proposed algorithm, adjacent matrix of graph can be used to obtain key for encryption and decryption which is safer compared to other keys.
Other Latest Articles
Last modified: 2021-06-06 02:29:58