SlideShare a Scribd company logo
1 of 24
Application
of
Mathematics
S.SWATHI SUNDARI, M.Sc.,M.Phil.,
Assistant Professor of Mathematics
V.V.Vanniaperumal College for Women
Virudhunagar
1
DATA TRANSFER USING BIPARTITE GRAPH
2
● ● ●
● ● ●
DATA TRANSFER IS…
Transfer of data in a secret way of using
some techniques and it’s a safety issue in
the current world.
This can be done in Cryptography.
3
CRYPTOGRAPHY IS…
The science or study of
techniques of secret writing and
message hiding.
4
Encryption Decryption
The process of converting
Plaintext into Ciphertext.
PLAINTEXT
CIPHERTEXT
The process of converting
Ciphertext into Plaintext.
CIPHERTEXT
PLAINTEXT
5
Terminology
Terminology
KEY
The secret, like a password, which is used
to encrypt and decrypt information.
6
For example
Plaintext letters : A B C ,..., Z
Ciphertext letters : C D E ,..., B
ENCRYPTION DECRYPTION
HELLO (Plaintext) JGNNQ (Ciphertext)
JGNNQ (Ciphertext) HELLO (Plaintext)
It is an example of “Secret Key Cryptography”.
7
Types of Keys
Based upon the keys, encryption and decryption
can be done by using two types of keys:
Secret key Cryptography
Public key Cryptography
8
Secret Key Cryptography:
This type of cryptography technique uses
just a single key.
Public Key Cryptography:
In this type of cryptography, one key is used to
encrypt, and a matching key is used to decrypt.
9
Mathematic Application in
Data Transfer
Graph Theory is growing as a promising field
for Data Transfer.
We propose a method of message
encryption as a graph.
10
What is…
Graph:
It consists of a pair G =(V,E), where
●V= V(G)= set of vertices.
●E= E(G)= set of edges.
Example:
Here, V={ 1,2,3} 1 ●
E= { }
G = (V,E) is a (3,2) graph. 2● ●3
11
Weighted Graph:
A number (weight) is assigned to each edge on a
graph, ( weights might represent costs, lengths or
capacities, etc., depend upon a problem)
Multigraph:
Lines joining the same points are called
“Multigraph”.
1●
2● ●3
12
12
11
10
9
Example:
Independent Sets:
An independent set is a set of vertices in a graph,
no two of which are adjacent.
Bipartite Graph:
A graph G is called a “Bigraph” or “Bipartite
Graph” if V can be patitioned into two disjoint
subsets and such that every line of G joins a
point of to a point of .
( , ) is called a “Bipartition” of G.
13
1 ● 2 ● 3 ● = {1,2,3}
={4,5,6}
Example:
4 ● 5 ● 6 ●
Construction of Encryption Table:
First we decide the number of characters (S) required for
the message encryption.
We can randomly fix the number of rows & columns of
the table, Note: The number of cells available in the table is
atleast of length of S.
Assign numbers 1,2,3…k, to the columns and numbers
k+1,k+2,…m, to the rows, where
k = number of columns k ≤ 9,
m = number of rows.
Distribute the characters in S randomly in the table.
14
Encryption Table:
For normal message, we use the 26 alphabets and blank space.
Each character in the cell receives a number value.
For Example:
A receives value 14.
U receives value 310.
Note:
The first character represents
a the column number, remaining
the row number.
15
1 2 3
4 A B C
5 D E F
6 G H I
7 J K L
8 M N O
9 P Q R
10 S T U
11 V W X
12 Y Z Space
Graph Construction from Number Sequence
Let M be the message to be encrypted of length k.
Convert each character in M into it’s corresponding
number values using Table.
Let the resulting number sequence be M1.
Let M1 be represented as .
Where,
are numbers.
16
,
We construct a graph G as follows
Vertices set of G:
Number of vertices in G = Number of distinct row
numbers + Column numbers used to generate M1.
Each vertex receive it’s corresponding row and
column value as it’s label.
Edge set of G:
Draw edges between the vertex pairs
.
Let us label these edges as
17
Number of edges in G = length of M.
and are always
independent sets. So, the graph G is always a Bipartite Graph.
Edge Weights:
Assign random numbers as
the edge weights to the edges
so that
18
Encryption Algorithm
Let M: I CAN be the message to be encrypted.
Step-1: Convert each character in M into it’s corresponding
number values using Table to generate M1.
For the message M, M1: 36 312 34 14 28
Step-2 : Construct the graph corresponding to the
sequence M1. For M1,
Vertex Set = {1, 2, 3, 4, 6, 8, 12}
Edge Set = { (3 6), (3 12), (3 4), (1 4), (2 8) }
= { }
Edge Weights = { 10, 15, 24, 56, 78 }
assigned to the edges
respectively.
19
1 2 3
4 A B C
5 D E F
6 G H I
7 J K L
8 M N O
9 P Q R
10 S T U
11 V W X
12 Y Z Space
Step - 3: Send G to the receiver.
For decrypting the message we reverse the procedure.
The resulting graph G is as follows:
20
1● 2● 3●
4● 6 ● 8● 12●
1524
10
56
78
Decryption Algorithm
Suppose the received graph is as follows:
21
2● 3●
5● 4● 7● 8● 12●
16
4420
78
65
35
92
Step -1: Arranging the edge weights in increasing order,
we generate sequence as follows:
{ 16, 20, 35, 44, 65, 78, 92}
Step -2: Picking the corresponding vertex labels from the
graph, we generate the sequence as follows:
{ 24, 25, 3 12, 34, 38, 38, 37 }
Step –3: From the table, the message is decrypted as
follows,
BE COOL
22
1 2 3
4 A B C
5 D E F
6 G H I
7 J K L
8 M N O
9 P Q R
10 S T U
11 V W X
12 Y Z Space
Applications of Data Transfer Using
Graphs
Electronic Money :
Encryption is used in electronic money
schemes to protect conventional transaction data like
account numbers, transaction amounts and digital
signatures.
Braille System :
In this system, encryption & decryption of any
message using Graph Theory and Braille numbers.
23
24

More Related Content

What's hot

Raster scan and random scan
Raster scan and random scanRaster scan and random scan
Raster scan and random scan
KABILESH RAMAR
 
U-Netpresentation.pptx
U-Netpresentation.pptxU-Netpresentation.pptx
U-Netpresentation.pptx
NoorUlHaq47
 
An introduction to Machine Learning
An introduction to Machine LearningAn introduction to Machine Learning
An introduction to Machine Learning
butest
 
automatic water level controlling using gsm system
automatic water level controlling using gsm systemautomatic water level controlling using gsm system
automatic water level controlling using gsm system
pavan kumar
 
discrete wavelet transform
discrete wavelet transformdiscrete wavelet transform
discrete wavelet transform
piyush_11
 

What's hot (20)

Visual CryptoGraphy
Visual CryptoGraphyVisual CryptoGraphy
Visual CryptoGraphy
 
MCA_UNIT-4_Computer Oriented Numerical Statistical Methods
MCA_UNIT-4_Computer Oriented Numerical Statistical MethodsMCA_UNIT-4_Computer Oriented Numerical Statistical Methods
MCA_UNIT-4_Computer Oriented Numerical Statistical Methods
 
Smart Data Slides: Machine Learning - Case Studies
Smart Data Slides: Machine Learning - Case StudiesSmart Data Slides: Machine Learning - Case Studies
Smart Data Slides: Machine Learning - Case Studies
 
Diabetes prediction with r(using knn)
Diabetes prediction with r(using knn)Diabetes prediction with r(using knn)
Diabetes prediction with r(using knn)
 
Raster scan and random scan
Raster scan and random scanRaster scan and random scan
Raster scan and random scan
 
scan conversion of point , line and circle
scan conversion of point , line and circlescan conversion of point , line and circle
scan conversion of point , line and circle
 
U-Netpresentation.pptx
U-Netpresentation.pptxU-Netpresentation.pptx
U-Netpresentation.pptx
 
topological features
topological featurestopological features
topological features
 
An introduction to Machine Learning
An introduction to Machine LearningAn introduction to Machine Learning
An introduction to Machine Learning
 
automatic water level controlling using gsm system
automatic water level controlling using gsm systemautomatic water level controlling using gsm system
automatic water level controlling using gsm system
 
4 bit counter
4 bit counter4 bit counter
4 bit counter
 
Dda algorithm
Dda algorithmDda algorithm
Dda algorithm
 
Object detection and Instance Segmentation
Object detection and Instance SegmentationObject detection and Instance Segmentation
Object detection and Instance Segmentation
 
Loan Default Prediction with Machine Learning
Loan Default Prediction with Machine LearningLoan Default Prediction with Machine Learning
Loan Default Prediction with Machine Learning
 
discrete wavelet transform
discrete wavelet transformdiscrete wavelet transform
discrete wavelet transform
 
Industrial training ppt
Industrial training pptIndustrial training ppt
Industrial training ppt
 
Focal loss for dense object detection
Focal loss for dense object detectionFocal loss for dense object detection
Focal loss for dense object detection
 
Pixel Relationships Examples
Pixel Relationships ExamplesPixel Relationships Examples
Pixel Relationships Examples
 
Computer Vision image classification
Computer Vision image classificationComputer Vision image classification
Computer Vision image classification
 
DDA algorithm
DDA algorithmDDA algorithm
DDA algorithm
 

Similar to Data transfer using bipartite graph

Comparative Report Ed098
Comparative Report Ed098Comparative Report Ed098
Comparative Report Ed098
mikebrowl
 

Similar to Data transfer using bipartite graph (20)

International journal of computer science and innovation vol 2015-n2-paper5
International journal of computer science and innovation  vol 2015-n2-paper5International journal of computer science and innovation  vol 2015-n2-paper5
International journal of computer science and innovation vol 2015-n2-paper5
 
parameterized complexity for graph Motif
parameterized complexity for graph Motifparameterized complexity for graph Motif
parameterized complexity for graph Motif
 
An ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
An ElGamal Encryption Scheme of Adjacency Matrix and Finite MachinesAn ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
An ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
 
Learning multifractal structure in large networks (KDD 2014)
Learning multifractal structure in large networks (KDD 2014)Learning multifractal structure in large networks (KDD 2014)
Learning multifractal structure in large networks (KDD 2014)
 
graph theory
graph theorygraph theory
graph theory
 
Graph Theory,Graph Terminologies,Planar Graph & Graph Colouring
Graph Theory,Graph Terminologies,Planar Graph & Graph ColouringGraph Theory,Graph Terminologies,Planar Graph & Graph Colouring
Graph Theory,Graph Terminologies,Planar Graph & Graph Colouring
 
G029037043
G029037043G029037043
G029037043
 
Metric dimesion of circulsnt graphs
Metric dimesion of circulsnt graphsMetric dimesion of circulsnt graphs
Metric dimesion of circulsnt graphs
 
Rsa Signature: Behind The Scenes
Rsa Signature: Behind The Scenes Rsa Signature: Behind The Scenes
Rsa Signature: Behind The Scenes
 
Lego like spheres and tori, enumeration and drawings
Lego like spheres and tori, enumeration and drawingsLego like spheres and tori, enumeration and drawings
Lego like spheres and tori, enumeration and drawings
 
Ki2518101816
Ki2518101816Ki2518101816
Ki2518101816
 
Ki2518101816
Ki2518101816Ki2518101816
Ki2518101816
 
Exhaustive Combinatorial Enumeration
Exhaustive Combinatorial EnumerationExhaustive Combinatorial Enumeration
Exhaustive Combinatorial Enumeration
 
Novel encryption algorithm and software development ecc and rsa
Novel encryption algorithm and software development ecc and rsaNovel encryption algorithm and software development ecc and rsa
Novel encryption algorithm and software development ecc and rsa
 
Convolution presentation
Convolution presentationConvolution presentation
Convolution presentation
 
12_Graph.pptx
12_Graph.pptx12_Graph.pptx
12_Graph.pptx
 
Comparative Report Ed098
Comparative Report Ed098Comparative Report Ed098
Comparative Report Ed098
 
Triggering patterns of topology changes in dynamic attributed graphs
Triggering patterns of topology changes in dynamic attributed graphsTriggering patterns of topology changes in dynamic attributed graphs
Triggering patterns of topology changes in dynamic attributed graphs
 
Traveling Salesman Problem in Distributed Environment
Traveling Salesman Problem in Distributed EnvironmentTraveling Salesman Problem in Distributed Environment
Traveling Salesman Problem in Distributed Environment
 
TRAVELING SALESMAN PROBLEM IN DISTRIBUTED ENVIRONMENT
TRAVELING SALESMAN PROBLEM IN DISTRIBUTED ENVIRONMENTTRAVELING SALESMAN PROBLEM IN DISTRIBUTED ENVIRONMENT
TRAVELING SALESMAN PROBLEM IN DISTRIBUTED ENVIRONMENT
 

More from SwathiSundari

Analytical Geometry in three dimension
Analytical Geometry in three dimensionAnalytical Geometry in three dimension
Analytical Geometry in three dimension
SwathiSundari
 

More from SwathiSundari (17)

Time and Distance.ppt
Time and Distance.pptTime and Distance.ppt
Time and Distance.ppt
 
Calender.ppt
Calender.pptCalender.ppt
Calender.ppt
 
Allied maths ii
Allied maths iiAllied maths ii
Allied maths ii
 
Z transform
Z transformZ transform
Z transform
 
Cone
ConeCone
Cone
 
Boolean Algebra
Boolean AlgebraBoolean Algebra
Boolean Algebra
 
Application of graph theory in Traffic Management
Application of graph theory in Traffic ManagementApplication of graph theory in Traffic Management
Application of graph theory in Traffic Management
 
The instant insanity game
The instant insanity game The instant insanity game
The instant insanity game
 
Kirchoff''s matrix tree theorem
Kirchoff''s matrix tree theoremKirchoff''s matrix tree theorem
Kirchoff''s matrix tree theorem
 
Fuzzy sets
Fuzzy setsFuzzy sets
Fuzzy sets
 
Statistics
StatisticsStatistics
Statistics
 
Ancillary maths ii
Ancillary maths iiAncillary maths ii
Ancillary maths ii
 
Analytical Geometry in three dimension
Analytical Geometry in three dimensionAnalytical Geometry in three dimension
Analytical Geometry in three dimension
 
Operations Research
Operations ResearchOperations Research
Operations Research
 
Operation Research
Operation ResearchOperation Research
Operation Research
 
Theory of Equation
Theory of EquationTheory of Equation
Theory of Equation
 
Game theory
Game theoryGame theory
Game theory
 

Recently uploaded

Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts ServiceCall Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Vip Model Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
Vip Model  Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...Vip Model  Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
Vip Model Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
shivangimorya083
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
amitlee9823
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
JohnnyPlasten
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
amitlee9823
 

Recently uploaded (20)

Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
Data-Analysis for Chicago Crime Data 2023
Data-Analysis for Chicago Crime Data  2023Data-Analysis for Chicago Crime Data  2023
Data-Analysis for Chicago Crime Data 2023
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts ServiceCall Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFx
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
 
Vip Model Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
Vip Model  Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...Vip Model  Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
Vip Model Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFx
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptx
 
Sampling (random) method and Non random.ppt
Sampling (random) method and Non random.pptSampling (random) method and Non random.ppt
Sampling (random) method and Non random.ppt
 
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxBPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
 
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfAccredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysis
 

Data transfer using bipartite graph

  • 1. Application of Mathematics S.SWATHI SUNDARI, M.Sc.,M.Phil., Assistant Professor of Mathematics V.V.Vanniaperumal College for Women Virudhunagar 1
  • 2. DATA TRANSFER USING BIPARTITE GRAPH 2 ● ● ● ● ● ●
  • 3. DATA TRANSFER IS… Transfer of data in a secret way of using some techniques and it’s a safety issue in the current world. This can be done in Cryptography. 3
  • 4. CRYPTOGRAPHY IS… The science or study of techniques of secret writing and message hiding. 4
  • 5. Encryption Decryption The process of converting Plaintext into Ciphertext. PLAINTEXT CIPHERTEXT The process of converting Ciphertext into Plaintext. CIPHERTEXT PLAINTEXT 5 Terminology
  • 6. Terminology KEY The secret, like a password, which is used to encrypt and decrypt information. 6
  • 7. For example Plaintext letters : A B C ,..., Z Ciphertext letters : C D E ,..., B ENCRYPTION DECRYPTION HELLO (Plaintext) JGNNQ (Ciphertext) JGNNQ (Ciphertext) HELLO (Plaintext) It is an example of “Secret Key Cryptography”. 7
  • 8. Types of Keys Based upon the keys, encryption and decryption can be done by using two types of keys: Secret key Cryptography Public key Cryptography 8
  • 9. Secret Key Cryptography: This type of cryptography technique uses just a single key. Public Key Cryptography: In this type of cryptography, one key is used to encrypt, and a matching key is used to decrypt. 9
  • 10. Mathematic Application in Data Transfer Graph Theory is growing as a promising field for Data Transfer. We propose a method of message encryption as a graph. 10
  • 11. What is… Graph: It consists of a pair G =(V,E), where ●V= V(G)= set of vertices. ●E= E(G)= set of edges. Example: Here, V={ 1,2,3} 1 ● E= { } G = (V,E) is a (3,2) graph. 2● ●3 11
  • 12. Weighted Graph: A number (weight) is assigned to each edge on a graph, ( weights might represent costs, lengths or capacities, etc., depend upon a problem) Multigraph: Lines joining the same points are called “Multigraph”. 1● 2● ●3 12 12 11 10 9 Example:
  • 13. Independent Sets: An independent set is a set of vertices in a graph, no two of which are adjacent. Bipartite Graph: A graph G is called a “Bigraph” or “Bipartite Graph” if V can be patitioned into two disjoint subsets and such that every line of G joins a point of to a point of . ( , ) is called a “Bipartition” of G. 13 1 ● 2 ● 3 ● = {1,2,3} ={4,5,6} Example: 4 ● 5 ● 6 ●
  • 14. Construction of Encryption Table: First we decide the number of characters (S) required for the message encryption. We can randomly fix the number of rows & columns of the table, Note: The number of cells available in the table is atleast of length of S. Assign numbers 1,2,3…k, to the columns and numbers k+1,k+2,…m, to the rows, where k = number of columns k ≤ 9, m = number of rows. Distribute the characters in S randomly in the table. 14
  • 15. Encryption Table: For normal message, we use the 26 alphabets and blank space. Each character in the cell receives a number value. For Example: A receives value 14. U receives value 310. Note: The first character represents a the column number, remaining the row number. 15 1 2 3 4 A B C 5 D E F 6 G H I 7 J K L 8 M N O 9 P Q R 10 S T U 11 V W X 12 Y Z Space
  • 16. Graph Construction from Number Sequence Let M be the message to be encrypted of length k. Convert each character in M into it’s corresponding number values using Table. Let the resulting number sequence be M1. Let M1 be represented as . Where, are numbers. 16 ,
  • 17. We construct a graph G as follows Vertices set of G: Number of vertices in G = Number of distinct row numbers + Column numbers used to generate M1. Each vertex receive it’s corresponding row and column value as it’s label. Edge set of G: Draw edges between the vertex pairs . Let us label these edges as 17
  • 18. Number of edges in G = length of M. and are always independent sets. So, the graph G is always a Bipartite Graph. Edge Weights: Assign random numbers as the edge weights to the edges so that 18
  • 19. Encryption Algorithm Let M: I CAN be the message to be encrypted. Step-1: Convert each character in M into it’s corresponding number values using Table to generate M1. For the message M, M1: 36 312 34 14 28 Step-2 : Construct the graph corresponding to the sequence M1. For M1, Vertex Set = {1, 2, 3, 4, 6, 8, 12} Edge Set = { (3 6), (3 12), (3 4), (1 4), (2 8) } = { } Edge Weights = { 10, 15, 24, 56, 78 } assigned to the edges respectively. 19 1 2 3 4 A B C 5 D E F 6 G H I 7 J K L 8 M N O 9 P Q R 10 S T U 11 V W X 12 Y Z Space
  • 20. Step - 3: Send G to the receiver. For decrypting the message we reverse the procedure. The resulting graph G is as follows: 20 1● 2● 3● 4● 6 ● 8● 12● 1524 10 56 78
  • 21. Decryption Algorithm Suppose the received graph is as follows: 21 2● 3● 5● 4● 7● 8● 12● 16 4420 78 65 35 92
  • 22. Step -1: Arranging the edge weights in increasing order, we generate sequence as follows: { 16, 20, 35, 44, 65, 78, 92} Step -2: Picking the corresponding vertex labels from the graph, we generate the sequence as follows: { 24, 25, 3 12, 34, 38, 38, 37 } Step –3: From the table, the message is decrypted as follows, BE COOL 22 1 2 3 4 A B C 5 D E F 6 G H I 7 J K L 8 M N O 9 P Q R 10 S T U 11 V W X 12 Y Z Space
  • 23. Applications of Data Transfer Using Graphs Electronic Money : Encryption is used in electronic money schemes to protect conventional transaction data like account numbers, transaction amounts and digital signatures. Braille System : In this system, encryption & decryption of any message using Graph Theory and Braille numbers. 23
  • 24. 24