SlideShare a Scribd company logo
1 of 7
Download to read offline
10 XI November 2022
https://doi.org/10.22214/ijraset.2022.47675
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue XI Nov 2022- Available at www.ijraset.com
1587
© IJRASET: All Rights are Reserved | SJImpact Factor 7.538 | ISRA Journal Impact Factor 7.894 |
An Approach of Graph Theory on Cryptography
Indhu. K1
, Rekha. S2
1
M.sc Mathematics, Department of Mathematics, Dr. SNS Rajalakshmi College of Arts and Science, Coimbatore, Tamil Nadu, India
2
Assistant Professor, Department of Mathematics, Dr.SNS Rajalakshmi college of Arts and Science, Coimbatore, Tamil Nadu, India
Abstract: In this paper, we discuss about the connection between graph theory and cryptography. We use the spanning tree
concept of graph theory to encryption the message.
Keywords: Public key, cryptography, graphs, encryption, network security.
I. INTRODUCTION
Cryptography is the art of protect information by transforming it to unreadable format called Cipher text. The process of converting
plain text to cipher text called encryption, and the process of converting cipher text on its original plain text called decryption. The
remainder of this paper is a discussion of intractable problem from graph theory keeping cryptography as the base.
Firstly we represent the given text as node of the graph. Every node represent a character of the data. Now every adjacent character
in the given text will be represented by adjacent vertices in the graph.
II. APPLICATION
Example :1
We will encrypt the text or data, say RATE , which we will be sending to the receiver on the other end.
Now we change this text into graph by converting each letter to vertices of graph.
Convert the letter to vertex(node)
To form a Cycle Graph , we link each two characters.
Further we label each edge by using the encoding table, which is followed by most researchers.
Table 1 : Encoding Table
A B C D - - - - W X Y Z
1 2 3 4 - - - - 23 24 25 26
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue XI Nov 2022- Available at www.ijraset.com
1588
© IJRASET: All Rights are Reserved | SJImpact Factor 7.538 | ISRA Journal Impact Factor 7.894 |
The label on each edge represents the distance between the connected two vertices from the encoding table. So the edge connecting
vertex C with vertex O has a label which is distance between the two characters in the encoding table.
Distance = code (A)−code (H) = 1 − 8 = −7.
Similarly we can deduce the distances of other edges. Then we label the graph containing all the plaintext letters and we get
weighted graph which is given below. After that, we keep adding edges to form a complete graph and each new added edge has a
sequential weight starting from the maximum weight in the encoding table which is 26.Therefore we can add 27,28 and so on.
cycle Graph
Weighted Graph
Then add a special character before the first character to point to the first character, say A is special character , then we get.
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue XI Nov 2022- Available at www.ijraset.com
1589
© IJRASET: All Rights are Reserved | SJImpact Factor 7.538 | ISRA Journal Impact Factor 7.894 |
Complete plain Graph
Complete plain Graph with special character
Now represent the above graph in the form of a matrix.
A1= 0 12 0 0 0
12 0 -12 27 8
0 12 0 19 28
0 27 19 0 -15
0 8 0 -15 0
We now construct a minimal spanning tree of the above graph
Minimal spanning tree
0 12 0 0 0
A2= 12 0 -12 0 0
0 -12 0 19 0
0 0 19 0 -15
0 0 0 -15 0
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue XI Nov 2022- Available at www.ijraset.com
1590
© IJRASET: All Rights are Reserved | SJImpact Factor 7.538 | ISRA Journal Impact Factor 7.894 |
A. Encryption Process
Now we store the character order in the diagonalinstead of zeroes as follows:
Table 2 :
A H A T E
0 1 2 3 4
The modified A2= 0 12 0 0 0
0 1 -12 0 0
0 -12 2 19 0
0 0 1 9 3 -15
0 0 0 -15 4
we multiply matrix A1 by A2 to form A1
.
A3 = A1A2 = 0 12 -144 0 0
0 288 -450 -267 437
0 144 505 363 -173
0 -201 -511 586 -60
0 8 -381 -45 225
We now send the encrypted data C to the receiver -37-981 637 429 -49 -837 -637 429 -337 -387 904 8 -193 892 541 1 8 -381 -45
225.
B. Decryption Process
On the receiver side, C is got from multiplying the cipher text received with the inverse of shared Key Then calculate B by
multiplying C by K−1
A3= 0 1728 2412 2112 96
0 -1809 -1293 6446 6309
0 -1103 3724 3112 4293
0 9642 11868 -14236 -10398
0 5157 5349 -10398 739
Then A2 represent the below graph, regardless of te diagonal, we use it to retrieve the original text.
Decrypted Graph
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue XI Nov 2022- Available at www.ijraset.com
1591
© IJRASET: All Rights are Reserved | SJImpact Factor 7.538 | ISRA Journal Impact Factor 7.894 |
We suppose that the vertex 0 is A, and by using encoding table
Vertex 1 = code (A) + -19 = 18, which is character R
Vertex 2 = code (H) - 7 = 1, which is character A
Vertex 3 = code (A) + 19 = 20, which is character T
Vertex 4 = code (T) + −15 = 5, which is character E
Which gives us the original text R A T E
Acknowledgement
One of the author (Dr. V. Balaji ) acknowledges University Grants Commission, SERO, Hyderabad and India for financial
assistance (No.FMRP5766/15(SERO/UGC)).
REFERENCES
[1] Corman TH, Leiserson CE, Rivest RL, Stein C. Introduction to algorithms 2nd edition, McGraw-Hill.
[2] Yamuna M, Meenal Gogia, Ashish Sikka, Md. Jazib Hayat Khan. Encryption using graph theory and linear algebra. International Journal of Computer
Application. ISSN:2250-1797, 2012.
[3] Ustimenko VA. On graph-based cryptography and symbolic computations, Serdica. Journal of Computing, 2007, 131-156.
[4] Uma Dixit,CRYPTOGRAPHY A GRAPH THEORY APPROACH, International Journalof Advance Research in Science and Engineering, 6(01), 2017,
BVCNSCS 2017.
[5] Wael Mahmoud Al Etaiwi , Encryption Algorithm Using Graph Theory, Journal of Scientific Research and Reports, 3(19), 2519-2527, 2014, Article no.
An Approach Of Graph Theory On Cryptography

More Related Content

Similar to An Approach Of Graph Theory On Cryptography

Design of a new metamaterial structure to enhancement the
Design of a new metamaterial structure to enhancement theDesign of a new metamaterial structure to enhancement the
Design of a new metamaterial structure to enhancement theIAEME Publication
 
ENCRYPTION USING LESTER HILL CIPHER ALGORITHM
ENCRYPTION USING LESTER HILL CIPHER ALGORITHMENCRYPTION USING LESTER HILL CIPHER ALGORITHM
ENCRYPTION USING LESTER HILL CIPHER ALGORITHMAM Publications
 
IRJET- Study of Topological Analogies of Perfect Difference Network and Compl...
IRJET- Study of Topological Analogies of Perfect Difference Network and Compl...IRJET- Study of Topological Analogies of Perfect Difference Network and Compl...
IRJET- Study of Topological Analogies of Perfect Difference Network and Compl...IRJET Journal
 
Comparative Analysis of Efficient Designs of D Latch using 32nm CMOS Technology
Comparative Analysis of Efficient Designs of D Latch using 32nm CMOS TechnologyComparative Analysis of Efficient Designs of D Latch using 32nm CMOS Technology
Comparative Analysis of Efficient Designs of D Latch using 32nm CMOS Technologyijtsrd
 
Edge tenacity in cycles and complete
Edge tenacity in cycles and completeEdge tenacity in cycles and complete
Edge tenacity in cycles and completeijfcstjournal
 
IRJET- Image Compression Technique for Quantized Encrypted Images using SVD
IRJET-  	  Image Compression Technique for Quantized Encrypted Images using SVDIRJET-  	  Image Compression Technique for Quantized Encrypted Images using SVD
IRJET- Image Compression Technique for Quantized Encrypted Images using SVDIRJET Journal
 
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...csandit
 
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...cscpconf
 
Image Steganography Based On Non Linear Chaotic Algorithm
Image Steganography Based On Non Linear Chaotic AlgorithmImage Steganography Based On Non Linear Chaotic Algorithm
Image Steganography Based On Non Linear Chaotic AlgorithmIJARIDEA Journal
 
A Comparative Analysis of Structure of Machine Tool Component using Fuzzy Logic
A Comparative Analysis of Structure of Machine Tool Component using Fuzzy LogicA Comparative Analysis of Structure of Machine Tool Component using Fuzzy Logic
A Comparative Analysis of Structure of Machine Tool Component using Fuzzy LogicIRJET Journal
 
H shape defected ground structure dgs- embedded square patch antenna
H shape defected ground structure  dgs- embedded square patch antennaH shape defected ground structure  dgs- embedded square patch antenna
H shape defected ground structure dgs- embedded square patch antennaIAEME Publication
 
H-SHAPE DEFECTED GROUND STRUCTURE (DGS) EMBEDDED SQUARE PATCH ANTENNA
H-SHAPE DEFECTED GROUND STRUCTURE (DGS) EMBEDDED SQUARE PATCH ANTENNAH-SHAPE DEFECTED GROUND STRUCTURE (DGS) EMBEDDED SQUARE PATCH ANTENNA
H-SHAPE DEFECTED GROUND STRUCTURE (DGS) EMBEDDED SQUARE PATCH ANTENNAIAEME Publication
 
New Design Architecture of Chaotic Secure Communication System Combined with ...
New Design Architecture of Chaotic Secure Communication System Combined with ...New Design Architecture of Chaotic Secure Communication System Combined with ...
New Design Architecture of Chaotic Secure Communication System Combined with ...ijtsrd
 
CORDIC Algorithm for WLAN
CORDIC Algorithm for WLANCORDIC Algorithm for WLAN
CORDIC Algorithm for WLANIJERA Editor
 
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...IJCNCJournal
 
Data transfer using bipartite graph
Data transfer using bipartite graphData transfer using bipartite graph
Data transfer using bipartite graphSwathiSundari
 
Ir3415981603
Ir3415981603Ir3415981603
Ir3415981603IJERA Editor
 

Similar to An Approach Of Graph Theory On Cryptography (20)

Design of a new metamaterial structure to enhancement the
Design of a new metamaterial structure to enhancement theDesign of a new metamaterial structure to enhancement the
Design of a new metamaterial structure to enhancement the
 
ENCRYPTION USING LESTER HILL CIPHER ALGORITHM
ENCRYPTION USING LESTER HILL CIPHER ALGORITHMENCRYPTION USING LESTER HILL CIPHER ALGORITHM
ENCRYPTION USING LESTER HILL CIPHER ALGORITHM
 
IRJET- Study of Topological Analogies of Perfect Difference Network and Compl...
IRJET- Study of Topological Analogies of Perfect Difference Network and Compl...IRJET- Study of Topological Analogies of Perfect Difference Network and Compl...
IRJET- Study of Topological Analogies of Perfect Difference Network and Compl...
 
Comparative Analysis of Efficient Designs of D Latch using 32nm CMOS Technology
Comparative Analysis of Efficient Designs of D Latch using 32nm CMOS TechnologyComparative Analysis of Efficient Designs of D Latch using 32nm CMOS Technology
Comparative Analysis of Efficient Designs of D Latch using 32nm CMOS Technology
 
Edge tenacity in cycles and complete
Edge tenacity in cycles and completeEdge tenacity in cycles and complete
Edge tenacity in cycles and complete
 
IRJET- Image Compression Technique for Quantized Encrypted Images using SVD
IRJET-  	  Image Compression Technique for Quantized Encrypted Images using SVDIRJET-  	  Image Compression Technique for Quantized Encrypted Images using SVD
IRJET- Image Compression Technique for Quantized Encrypted Images using SVD
 
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...
 
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...
 
Image Steganography Based On Non Linear Chaotic Algorithm
Image Steganography Based On Non Linear Chaotic AlgorithmImage Steganography Based On Non Linear Chaotic Algorithm
Image Steganography Based On Non Linear Chaotic Algorithm
 
A Comparative Analysis of Structure of Machine Tool Component using Fuzzy Logic
A Comparative Analysis of Structure of Machine Tool Component using Fuzzy LogicA Comparative Analysis of Structure of Machine Tool Component using Fuzzy Logic
A Comparative Analysis of Structure of Machine Tool Component using Fuzzy Logic
 
Au33270273
Au33270273Au33270273
Au33270273
 
Au33270273
Au33270273Au33270273
Au33270273
 
H shape defected ground structure dgs- embedded square patch antenna
H shape defected ground structure  dgs- embedded square patch antennaH shape defected ground structure  dgs- embedded square patch antenna
H shape defected ground structure dgs- embedded square patch antenna
 
H-SHAPE DEFECTED GROUND STRUCTURE (DGS) EMBEDDED SQUARE PATCH ANTENNA
H-SHAPE DEFECTED GROUND STRUCTURE (DGS) EMBEDDED SQUARE PATCH ANTENNAH-SHAPE DEFECTED GROUND STRUCTURE (DGS) EMBEDDED SQUARE PATCH ANTENNA
H-SHAPE DEFECTED GROUND STRUCTURE (DGS) EMBEDDED SQUARE PATCH ANTENNA
 
New Design Architecture of Chaotic Secure Communication System Combined with ...
New Design Architecture of Chaotic Secure Communication System Combined with ...New Design Architecture of Chaotic Secure Communication System Combined with ...
New Design Architecture of Chaotic Secure Communication System Combined with ...
 
CORDIC Algorithm for WLAN
CORDIC Algorithm for WLANCORDIC Algorithm for WLAN
CORDIC Algorithm for WLAN
 
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
 
Data transfer using bipartite graph
Data transfer using bipartite graphData transfer using bipartite graph
Data transfer using bipartite graph
 
40120130406011 2-3
40120130406011 2-340120130406011 2-3
40120130406011 2-3
 
Ir3415981603
Ir3415981603Ir3415981603
Ir3415981603
 

More from Cynthia Velynne

Free Cool Alphabet Letter Designs, Download Free Cool Alphabet Letter
Free Cool Alphabet Letter Designs, Download Free Cool Alphabet LetterFree Cool Alphabet Letter Designs, Download Free Cool Alphabet Letter
Free Cool Alphabet Letter Designs, Download Free Cool Alphabet LetterCynthia Velynne
 
Analytical Writing Sample. GRE GRE Analytical Writing Samp
Analytical Writing Sample. GRE GRE Analytical Writing SampAnalytical Writing Sample. GRE GRE Analytical Writing Samp
Analytical Writing Sample. GRE GRE Analytical Writing SampCynthia Velynne
 
Biography Writing Template Biography Template, Writin
Biography Writing Template Biography Template, WritinBiography Writing Template Biography Template, Writin
Biography Writing Template Biography Template, WritinCynthia Velynne
 
Writing A Good Personal Reflective Essay - How To
Writing A Good Personal Reflective Essay - How ToWriting A Good Personal Reflective Essay - How To
Writing A Good Personal Reflective Essay - How ToCynthia Velynne
 
Learn How To Write A Truly Impressive Sc
Learn How To Write A Truly Impressive ScLearn How To Write A Truly Impressive Sc
Learn How To Write A Truly Impressive ScCynthia Velynne
 
Embossed Letter Sheets Set Of 50 Stationery Shee
Embossed Letter Sheets Set Of 50 Stationery SheeEmbossed Letter Sheets Set Of 50 Stationery Shee
Embossed Letter Sheets Set Of 50 Stationery SheeCynthia Velynne
 
Erianto OngkoS Briefcase Menulis Menjalin Persatua
Erianto OngkoS Briefcase Menulis Menjalin PersatuaErianto OngkoS Briefcase Menulis Menjalin Persatua
Erianto OngkoS Briefcase Menulis Menjalin PersatuaCynthia Velynne
 
Does Money Buy Happiness -
Does Money Buy Happiness -Does Money Buy Happiness -
Does Money Buy Happiness -Cynthia Velynne
 
Examples Of Science Paper Abs
Examples Of Science Paper AbsExamples Of Science Paper Abs
Examples Of Science Paper AbsCynthia Velynne
 
Explanatory Essay Short Write With Notes, Organize
Explanatory Essay Short Write With Notes, OrganizeExplanatory Essay Short Write With Notes, Organize
Explanatory Essay Short Write With Notes, OrganizeCynthia Velynne
 
Sample Scientific Method Paper Write Up
Sample Scientific Method Paper Write UpSample Scientific Method Paper Write Up
Sample Scientific Method Paper Write UpCynthia Velynne
 
How To Write A Good Conclusion To An Academic Essay - In Summary 10
How To Write A Good Conclusion To An Academic Essay - In Summary 10How To Write A Good Conclusion To An Academic Essay - In Summary 10
How To Write A Good Conclusion To An Academic Essay - In Summary 10Cynthia Velynne
 
Application Example College Essay College Essay Hoo
Application Example College Essay College Essay HooApplication Example College Essay College Essay Hoo
Application Example College Essay College Essay HooCynthia Velynne
 
Template For Briefing Paper How To Write A Briefing
Template For Briefing Paper How To Write A BriefingTemplate For Briefing Paper How To Write A Briefing
Template For Briefing Paper How To Write A BriefingCynthia Velynne
 
Case Study Template
Case Study TemplateCase Study Template
Case Study TemplateCynthia Velynne
 
Research Integrity On Twitter Avoidi
Research Integrity On Twitter AvoidiResearch Integrity On Twitter Avoidi
Research Integrity On Twitter AvoidiCynthia Velynne
 
Home Essay Writer, Essay,
Home Essay Writer, Essay,Home Essay Writer, Essay,
Home Essay Writer, Essay,Cynthia Velynne
 
College Essay Essay On Importance Of Education In
College Essay Essay On Importance Of Education InCollege Essay Essay On Importance Of Education In
College Essay Essay On Importance Of Education InCynthia Velynne
 

More from Cynthia Velynne (20)

Free Cool Alphabet Letter Designs, Download Free Cool Alphabet Letter
Free Cool Alphabet Letter Designs, Download Free Cool Alphabet LetterFree Cool Alphabet Letter Designs, Download Free Cool Alphabet Letter
Free Cool Alphabet Letter Designs, Download Free Cool Alphabet Letter
 
Analytical Writing Sample. GRE GRE Analytical Writing Samp
Analytical Writing Sample. GRE GRE Analytical Writing SampAnalytical Writing Sample. GRE GRE Analytical Writing Samp
Analytical Writing Sample. GRE GRE Analytical Writing Samp
 
Biography Writing Template Biography Template, Writin
Biography Writing Template Biography Template, WritinBiography Writing Template Biography Template, Writin
Biography Writing Template Biography Template, Writin
 
Writing A Good Personal Reflective Essay - How To
Writing A Good Personal Reflective Essay - How ToWriting A Good Personal Reflective Essay - How To
Writing A Good Personal Reflective Essay - How To
 
Learn How To Write A Truly Impressive Sc
Learn How To Write A Truly Impressive ScLearn How To Write A Truly Impressive Sc
Learn How To Write A Truly Impressive Sc
 
Embossed Letter Sheets Set Of 50 Stationery Shee
Embossed Letter Sheets Set Of 50 Stationery SheeEmbossed Letter Sheets Set Of 50 Stationery Shee
Embossed Letter Sheets Set Of 50 Stationery Shee
 
Erianto OngkoS Briefcase Menulis Menjalin Persatua
Erianto OngkoS Briefcase Menulis Menjalin PersatuaErianto OngkoS Briefcase Menulis Menjalin Persatua
Erianto OngkoS Briefcase Menulis Menjalin Persatua
 
Does Money Buy Happiness -
Does Money Buy Happiness -Does Money Buy Happiness -
Does Money Buy Happiness -
 
Examples Of Science Paper Abs
Examples Of Science Paper AbsExamples Of Science Paper Abs
Examples Of Science Paper Abs
 
Pin On English
Pin On EnglishPin On English
Pin On English
 
Explanatory Essay Short Write With Notes, Organize
Explanatory Essay Short Write With Notes, OrganizeExplanatory Essay Short Write With Notes, Organize
Explanatory Essay Short Write With Notes, Organize
 
Sample Scientific Method Paper Write Up
Sample Scientific Method Paper Write UpSample Scientific Method Paper Write Up
Sample Scientific Method Paper Write Up
 
How To Write A Good Conclusion To An Academic Essay - In Summary 10
How To Write A Good Conclusion To An Academic Essay - In Summary 10How To Write A Good Conclusion To An Academic Essay - In Summary 10
How To Write A Good Conclusion To An Academic Essay - In Summary 10
 
Pin On AVID
Pin On AVIDPin On AVID
Pin On AVID
 
Application Example College Essay College Essay Hoo
Application Example College Essay College Essay HooApplication Example College Essay College Essay Hoo
Application Example College Essay College Essay Hoo
 
Template For Briefing Paper How To Write A Briefing
Template For Briefing Paper How To Write A BriefingTemplate For Briefing Paper How To Write A Briefing
Template For Briefing Paper How To Write A Briefing
 
Case Study Template
Case Study TemplateCase Study Template
Case Study Template
 
Research Integrity On Twitter Avoidi
Research Integrity On Twitter AvoidiResearch Integrity On Twitter Avoidi
Research Integrity On Twitter Avoidi
 
Home Essay Writer, Essay,
Home Essay Writer, Essay,Home Essay Writer, Essay,
Home Essay Writer, Essay,
 
College Essay Essay On Importance Of Education In
College Essay Essay On Importance Of Education InCollege Essay Essay On Importance Of Education In
College Essay Essay On Importance Of Education In
 

Recently uploaded

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 

Recently uploaded (20)

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
CĂłdigo Creativo y Arte de Software | Unidad 1
CĂłdigo Creativo y Arte de Software | Unidad 1CĂłdigo Creativo y Arte de Software | Unidad 1
CĂłdigo Creativo y Arte de Software | Unidad 1
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 

An Approach Of Graph Theory On Cryptography

  • 1. 10 XI November 2022 https://doi.org/10.22214/ijraset.2022.47675
  • 2. International Journal for Research in Applied Science & Engineering Technology (IJRASET) ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538 Volume 10 Issue XI Nov 2022- Available at www.ijraset.com 1587 © IJRASET: All Rights are Reserved | SJImpact Factor 7.538 | ISRA Journal Impact Factor 7.894 | An Approach of Graph Theory on Cryptography Indhu. K1 , Rekha. S2 1 M.sc Mathematics, Department of Mathematics, Dr. SNS Rajalakshmi College of Arts and Science, Coimbatore, Tamil Nadu, India 2 Assistant Professor, Department of Mathematics, Dr.SNS Rajalakshmi college of Arts and Science, Coimbatore, Tamil Nadu, India Abstract: In this paper, we discuss about the connection between graph theory and cryptography. We use the spanning tree concept of graph theory to encryption the message. Keywords: Public key, cryptography, graphs, encryption, network security. I. INTRODUCTION Cryptography is the art of protect information by transforming it to unreadable format called Cipher text. The process of converting plain text to cipher text called encryption, and the process of converting cipher text on its original plain text called decryption. The remainder of this paper is a discussion of intractable problem from graph theory keeping cryptography as the base. Firstly we represent the given text as node of the graph. Every node represent a character of the data. Now every adjacent character in the given text will be represented by adjacent vertices in the graph. II. APPLICATION Example :1 We will encrypt the text or data, say RATE , which we will be sending to the receiver on the other end. Now we change this text into graph by converting each letter to vertices of graph. Convert the letter to vertex(node) To form a Cycle Graph , we link each two characters. Further we label each edge by using the encoding table, which is followed by most researchers. Table 1 : Encoding Table A B C D - - - - W X Y Z 1 2 3 4 - - - - 23 24 25 26
  • 3. International Journal for Research in Applied Science & Engineering Technology (IJRASET) ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538 Volume 10 Issue XI Nov 2022- Available at www.ijraset.com 1588 © IJRASET: All Rights are Reserved | SJImpact Factor 7.538 | ISRA Journal Impact Factor 7.894 | The label on each edge represents the distance between the connected two vertices from the encoding table. So the edge connecting vertex C with vertex O has a label which is distance between the two characters in the encoding table. Distance = code (A)−code (H) = 1 − 8 = −7. Similarly we can deduce the distances of other edges. Then we label the graph containing all the plaintext letters and we get weighted graph which is given below. After that, we keep adding edges to form a complete graph and each new added edge has a sequential weight starting from the maximum weight in the encoding table which is 26.Therefore we can add 27,28 and so on. cycle Graph Weighted Graph Then add a special character before the first character to point to the first character, say A is special character , then we get.
  • 4. International Journal for Research in Applied Science & Engineering Technology (IJRASET) ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538 Volume 10 Issue XI Nov 2022- Available at www.ijraset.com 1589 © IJRASET: All Rights are Reserved | SJImpact Factor 7.538 | ISRA Journal Impact Factor 7.894 | Complete plain Graph Complete plain Graph with special character Now represent the above graph in the form of a matrix. A1= 0 12 0 0 0 12 0 -12 27 8 0 12 0 19 28 0 27 19 0 -15 0 8 0 -15 0 We now construct a minimal spanning tree of the above graph Minimal spanning tree 0 12 0 0 0 A2= 12 0 -12 0 0 0 -12 0 19 0 0 0 19 0 -15 0 0 0 -15 0
  • 5. International Journal for Research in Applied Science & Engineering Technology (IJRASET) ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538 Volume 10 Issue XI Nov 2022- Available at www.ijraset.com 1590 © IJRASET: All Rights are Reserved | SJImpact Factor 7.538 | ISRA Journal Impact Factor 7.894 | A. Encryption Process Now we store the character order in the diagonalinstead of zeroes as follows: Table 2 : A H A T E 0 1 2 3 4 The modified A2= 0 12 0 0 0 0 1 -12 0 0 0 -12 2 19 0 0 0 1 9 3 -15 0 0 0 -15 4 we multiply matrix A1 by A2 to form A1 . A3 = A1A2 = 0 12 -144 0 0 0 288 -450 -267 437 0 144 505 363 -173 0 -201 -511 586 -60 0 8 -381 -45 225 We now send the encrypted data C to the receiver -37-981 637 429 -49 -837 -637 429 -337 -387 904 8 -193 892 541 1 8 -381 -45 225. B. Decryption Process On the receiver side, C is got from multiplying the cipher text received with the inverse of shared Key Then calculate B by multiplying C by K−1 A3= 0 1728 2412 2112 96 0 -1809 -1293 6446 6309 0 -1103 3724 3112 4293 0 9642 11868 -14236 -10398 0 5157 5349 -10398 739 Then A2 represent the below graph, regardless of te diagonal, we use it to retrieve the original text. Decrypted Graph
  • 6. International Journal for Research in Applied Science & Engineering Technology (IJRASET) ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538 Volume 10 Issue XI Nov 2022- Available at www.ijraset.com 1591 © IJRASET: All Rights are Reserved | SJImpact Factor 7.538 | ISRA Journal Impact Factor 7.894 | We suppose that the vertex 0 is A, and by using encoding table Vertex 1 = code (A) + -19 = 18, which is character R Vertex 2 = code (H) - 7 = 1, which is character A Vertex 3 = code (A) + 19 = 20, which is character T Vertex 4 = code (T) + −15 = 5, which is character E Which gives us the original text R A T E Acknowledgement One of the author (Dr. V. Balaji ) acknowledges University Grants Commission, SERO, Hyderabad and India for financial assistance (No.FMRP5766/15(SERO/UGC)). REFERENCES [1] Corman TH, Leiserson CE, Rivest RL, Stein C. Introduction to algorithms 2nd edition, McGraw-Hill. [2] Yamuna M, Meenal Gogia, Ashish Sikka, Md. Jazib Hayat Khan. Encryption using graph theory and linear algebra. International Journal of Computer Application. ISSN:2250-1797, 2012. [3] Ustimenko VA. On graph-based cryptography and symbolic computations, Serdica. Journal of Computing, 2007, 131-156. [4] Uma Dixit,CRYPTOGRAPHY A GRAPH THEORY APPROACH, International Journalof Advance Research in Science and Engineering, 6(01), 2017, BVCNSCS 2017. [5] Wael Mahmoud Al Etaiwi , Encryption Algorithm Using Graph Theory, Journal of Scientific Research and Reports, 3(19), 2519-2527, 2014, Article no.