SlideShare a Scribd company logo
1 of 10
Download to read offline
An Application of Graph Theory in
Cryptography
P. Amudha1
k A.C. Charles Sagayaraj2
k A.C.Shantha Sheela3
Assistant Professor
1,2
Department of Mathematics
SRM Institute of Science and Technology
Vadapalani Campus, Chennai-26, India
3
Department of Computer Science,
Sathyabama Institute of Science and Technology,
Chennai-119, India
1
Email Id: amudha.p@vdp.srmuniv.ac.in, amutha106@gmail.com
2
Email Id: charlessagayaraj.a@vdp.srmuniv.ac.in, accharlez@gmail.com
3
Email Id: shantha.jasmine@gmail.com
Abstract
The need of secure communication of messages is nothing new.
It has been present since ages. Security in todayss world is one of
the important challenges. Ciphers can be converted into graphs for
secret communication. The field of Graph Theory plays a vital role
in various fields. Especially Graph theory is widely used as a tool of
encryption, due to its various properties and its easy representation
in computers as a matrix. Various papers based on graph theory
applications have been studied and we explore the usage of Graph
theory in cryptography has been proposed here.
AMS Subject Classification: 06C20, 94C15
Keywords: Adjacency Matrix, Euler Graph, Hamiltonian circuit.
Cryptography, Encryption, Decryption, Plain text, Cipher text.
1
International Journal of Pure and Applied Mathematics
Volume 119 No. 13 2018, 375-383
ISSN: 1314-3395 (on-line version)
url: http://www.ijpam.eu
Special Issue
ijpam.eu
375
I. INTRODUCTION
Cryptography is the science of secret writing with the goal of hiding
the meaning of a message. Cryptography has long been the art of spies
and soldiers. Nowadays, it is used everyday by billions of people for secur-
ing electronic mail and payment transactions. The science of cryptography
touches on many other disciplines, both within mathematics and computer
science and in engineering. In mathematics, cryptology uses, and touches
on, algebra, number theory, graph and lattice theory, algebraic geometry
and probability and statistics. Analysis of cryptographic security leads to
using theoretical computer science especially complexity theory. The actual
implementation of cryptosystems, and the hardwork of carrying out security
analysis for specific cryptosystems falls into engineering and practical com-
puter science and computing. In this paper we have discussed and proposed
an encryption-decryption algorithm using Euler graphs.
II. PRELIMINARIES
Graph:
Conceptually, a graph is formed by vertices and edges connecting the ver-
tices. Formally, a graph is a pair of sets (V,E), where V is the set of vertices
and E is the set of edges, formed by pairs of vertices.
Simple graph:
A graph in which each edge connects two different vertices and where no two
edges connect the same pair of vertices is called a simple graph.
Adjacency matrix:
Let V = (V, E) be a graph with V = {v1, v2, ..., vn}, E = {e1, e2, ..., em}
and without parallel edges. The adjacency matrix of G is an nn symmetric
binary matrix X = [xij]
defined over the ring of integers such that xij =

1, if vivjĮĢE
0, otherwise
It is used to represent whether a pair of vertices in a given graph are connected
or not. An adjacency matrix is used to represent a finite graph. An element
in the adjacency matrix is represented by xij where i represents the row and
j represents the column in the adjacency matrix whose intersection is the
element xij.
2
International Journal of Pure and Applied Mathematics Special Issue
376
Incidence matrix:
Let G be a graph with n vertices, m edges and without self-loops. The
incidence matrix A of G is an nm matrix A = [aij]
whose n rows correspond to the n vertices and the m columns correspond to
m edges such that
aij =

1, if jth
edge mj is incident on ith
vertex
0, otherwise
Euler graph:
An Eulerian cycle, Eulerian circuit or Euler tour in an undirected graph is
a cycle that uses each edge exactly once. If such a cycle exists, the graph is
called Eulerian or unicursal. The term ”Eulerian graph” is also sometimes
used in a weaker sense to denote a graph where every vertex has even degree.
Hamiltonian Graph:
A Hamiltonian path or traceable path is a paththat visits each vertex of the
graph exactly once. A graph that contains a Hamiltonian path is called a
traceable graph. A graph is Hamiltonian-connected if for every pair of ver-
tices there is a Hamiltonian path between the two vertices.
Encryption:
The process of converting information or data into a code, especially to pre-
vent unauthorized access.
Decryption:
The process of converting information or data into a code, especially to pre-
vent unauthorized access.
Plain text:
It is the message or information that the sender wishes to send to the receiver.
Cipher text:
It is the encrypted or encoded message that contains the plain text in an
unreadable format.
3
International Journal of Pure and Applied Mathematics Special Issue
377
XOR:
In cryptography, the simple XOR cipher is a type of additive cipher, an en-
cryption algorithm that operates according to the following principles:
A
L
0 = A,
A
L
A = 0,
(A
L
B)
L
C = A
L
(B
L
C),
(B
L
A)
L
A = B
L
0 = B,
where
L
denotes the exclusive disjunction (XOR) operation. This operation
is sometimes called modulus 2 addition (or subtraction, which is identical).
With this logic, a string of text can be encrypted by applying the bit wise
XOR operator to every character using a given key. To decrypt the output,
merely reapplying the XOR function with the key will remove the cipher.
III. PROCEDURE TO CHECK EULER GRAPH
For a graph G(V,E) , form the incidence matrix M. Then count the number
of non zero elements that is 1
,
s in each and every row. If the count is even
then the graph G is Euler otherwise G is not Euler.
IV. PROPOSED ENCODING SYSTEMS
The message that the user wants to send, will be encrypted into an Euler
Graph by the proposed encryption technique. An Hamiltonian circuit will
be traced out from the encrypted graph. This will be used as a key for
decryption.
1. Convert each and every alphabet into its equivalent uppercase.
2. Take ASCII value of each uppercase alphabets.
3. Convert the ASCII values into binary format.
4. After the binary format of each ASCII is achieved, they are XORed
with
the binary equivalent of 32.
5. Store the resultant XORed
binary equivalent in an array M[i].
6. Count k= the number of 1
,
s in the binary equivalent from the array M[i].
7. Form an adjacency matrix A = (aij) with the count k, where aij denotes
the element in the ith
row and jth
column of the matrix. The count
represents the number of vertices of the simple graph . So the principal
diagonal elements of the matrix are 0. This adjacency matrix is symmetric,
so aij = aji .
4
International Journal of Pure and Applied Mathematics Special Issue
378
8. Now count the number of 0
,
s following the 1 for every element in the
array and put aij = aji = number of 0
,
s + 1. For example if 10 is in the
array the aji = 2, if 1000 is in the array then aji = 4.
9. The above process is repeated till the Hamiltonian circuit tracing reaches
the end vertex.
10. Upon reaching the last element of the array as 1 that is the binary
stream ends with a 1, then make a1j = 1 where j = k.
11. If the binary stream ends with a 1 and is followed by L number of 0
,
s ,
then put a1k = L + 1.
12. The adjacency matrix is sent to the receiver.
V. PROPOSED DECODING TECHNIQUE
1. The adjacency matrix is received.
2. The elements of the adjacency matrix are stored in a temporary array
Z[p].
3. We will traverse and take into consideration either the upper triangular
matrix or the lower triangular matrix along the main diagonal. This is
because of the symmetric nature of the adjacency matrix.
4. To build the binary stream, the elements of the Z[p] are expanded.
5. To get back the original message, the operations used in the encoding
system are applied backwards.
VI. RESULT
Let our plain text be GRAPH. Convert each alphabet in the plain text into
binary strings. Then XOR each alphabet with 32 bit binary string. We get
the following:
Alphabet ASCII Code Binary Number XORed
G 71 1000111 1100111
R 82 1010010 1110010
A 65 1000001 1100001
P 80 1010000 1110000
H 72 1001000 1101000
Using encryption algorithm and Euler graph, the adjacency matrix of each
alphabet is constructed and shown below:
5
International Journal of Pure and Applied Mathematics Special Issue
379
For the alphabet G, there are five 1
,
s , therefore the graph for the alphabet
G has 5 vertices and hence its adjacency matrix is of 5x5 order which is
given below.
G =
īŖĢ
īŖŦ
īŖŦ
īŖŦ
īŖŦ
īŖŦ
īŖŦ
īŖ­
0 1 0 0 1
1 0 3 0 0
1 3 0 1 0
0 0 1 0 1
1 0 0 1 0
īŖļ
īŖˇ
īŖˇ
īŖˇ
īŖˇ
īŖˇ
īŖˇ
īŖ¸
Similarly for the other alphabets, we get
R =
īŖĢ
īŖŦ
īŖŦ
īŖŦ
īŖ­
0 1 0 2
1 0 1 0
0 1 0 3
2 0 3 0
īŖļ
īŖˇ
īŖˇ
īŖˇ
īŖ¸
, A =
īŖĢ
īŖŦ
īŖ­
0 1 1
1 0 5
1 5 0
īŖļ
īŖˇ
īŖ¸ , P =
īŖĢ
īŖŦ
īŖ­
1 0 5
1 0 1
5 1 0
īŖļ
īŖˇ
īŖ¸ , H =
īŖĢ
īŖŦ
īŖ­
0 1 4
1 0 2
4 2 0
īŖļ
īŖˇ
īŖ¸
All these matrices are sent to the receiver one by one.
For the first matrix the receiver receives [1 3 1 1 1]
For the second matrix the receiver receives [1 1 3 2]
For the 3rd matrix the he receives [1 5 1]
For the 4th matrix the he receives [1 1 5]
For the 5th matrix the he receives [1 2 4] .
By expanding these matrices the receiver gets
13111 = 1100111
1132 = 1110010
151 = 1100001
115 = 1110000
124 = 1101000
Using encoding technique in reverse order
1100111 gives G
1110010 gives R
1100001 gives A
1110000 gives P
1101000 gives H
Hence the receiver receives the plain text which was originally sent by the
sender.
6
International Journal of Pure and Applied Mathematics Special Issue
380
VII. CONCLUSION
The cryptography is an algorithm which provides secure communication. In
this paper we proposed a technique where each character of the data will be
encrypted into an Euler Graph. Hamiltonian Circuit is used as key to
secure the data. Thus, decryption is practically incomprehensible unless the
Hamiltonian circuit and the encoding plan is known.
In this cryptography technique, the complexity and the uncertainty of the
decryption and interpretation of the actual message is very high and
difficult as each graph represents a character of the message. This
algorithm ensures the safety of the data.
VII. REFERENCES
[1]. Narsingh Deo, Graph Theory with Applications to Engineering and
Computer Science, Prentice Hall, 2010.
[2] Mahantesh Gawannavar, Payal Mandulkar, R. Thandeeswaran, N.
Jeyanthi, Office in cloud: Approach to Authentication and Authorization,
Recent Advances in Communications and Networking Technology, Bentham
sciences, Vol.4, No.1, 2015, pp.49-55.
[3] F.Amounas. 2015. ”Enhanced Elliptic Curve Encryption Approach of
Amazigh alphabet with Braille representation”, International Journal of
Computer Science and Network Solutions, vol 3, No 8, pp. 1-9.
[4] Siva Kishore.B, Siva Theja Reddy.J, N.Jeyanthi, 2013, Three Phase
Power Management Algorithms for Green Cloud Computing ”,
International Journal of Applied Engineering Research Vol. 8, No.14, pp.
1725-1736.
[5] N. Jeyanthi, R. Thandeeswaran, J. Vinithra, 2014, RQA Based
Approach to Detect and Prevent DDoS Attacks in VoIP Networks,
Cybernetics and Information Technologies, Vol.14, No.1, pp. 11-24.
[6] Amrutha, R. Thandeeswaran, N. Jeyanthi, 2014, Cloud based VoIP
Application in Aircraft Data Networks, International Journal of Grid
Distribution Computing, Vol.7, No.6 (2014) December, pp.11- 18.
7
International Journal of Pure and Applied Mathematics Special Issue
381
[7] Connections between graph theory and cryptography Natalia Tokareva
G2C2: Graphs and Groups, Cycles and Coverings September, 2426, 2014.
Novosibirsk, Russia.
[8] Rishi Pal Singh, Vandana , Application of Graph Theory in Computer
Science and Engineerin International Journal of Computer Applications
(0975 8887) Volume 104 No.1, October 2014.
[9] N.Koblitz, Algebraic Aspects of Cryptography, Springer-Verlag, Berlin
1998.
8
International Journal of Pure and Applied Mathematics Special Issue
382
383
384

More Related Content

Similar to An Application Of Graph Theory In Cryptography

On algorithmic problems concerning graphs of higher degree of symmetry
On algorithmic problems concerning graphs of higher degree of symmetryOn algorithmic problems concerning graphs of higher degree of symmetry
On algorithmic problems concerning graphs of higher degree of symmetry
graphhoc
 

Similar to An Application Of Graph Theory In Cryptography (20)

Mathematics Research Paper - Mathematics of Computer Networking - Final Draft
Mathematics Research Paper - Mathematics of Computer Networking - Final DraftMathematics Research Paper - Mathematics of Computer Networking - Final Draft
Mathematics Research Paper - Mathematics of Computer Networking - Final Draft
 
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRY
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRYON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRY
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRY
 
Low Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyLow Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve Cryptography
 
Low Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyLow Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve Cryptography
 
On algorithmic problems concerning graphs of higher degree of symmetry
On algorithmic problems concerning graphs of higher degree of symmetryOn algorithmic problems concerning graphs of higher degree of symmetry
On algorithmic problems concerning graphs of higher degree of symmetry
 
25 28 may17 22may 16019 new approach(edit)nww
25 28 may17 22may 16019 new approach(edit)nww25 28 may17 22may 16019 new approach(edit)nww
25 28 may17 22may 16019 new approach(edit)nww
 
8 neural network representation
8 neural network representation8 neural network representation
8 neural network representation
 
CRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLING
CRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLINGCRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLING
CRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLING
 
Odd Harmonious Labelings of Cyclic Snakes
Odd Harmonious Labelings of Cyclic SnakesOdd Harmonious Labelings of Cyclic Snakes
Odd Harmonious Labelings of Cyclic Snakes
 
Introduction to Graph Theory
Introduction to Graph TheoryIntroduction to Graph Theory
Introduction to Graph Theory
 
ODD HARMONIOUS LABELINGS OF CYCLIC SNAKES
ODD HARMONIOUS LABELINGS OF CYCLIC SNAKESODD HARMONIOUS LABELINGS OF CYCLIC SNAKES
ODD HARMONIOUS LABELINGS OF CYCLIC SNAKES
 
Lec12
Lec12Lec12
Lec12
 
Digit Factorial Chains .(Euler Problem -74) (Matlab Programming Solution)
Digit Factorial Chains .(Euler Problem -74) (Matlab Programming Solution)Digit Factorial Chains .(Euler Problem -74) (Matlab Programming Solution)
Digit Factorial Chains .(Euler Problem -74) (Matlab Programming Solution)
 
Design a cryptosystem using elliptic curves cryptography and Vigenère symmetr...
Design a cryptosystem using elliptic curves cryptography and Vigenère symmetr...Design a cryptosystem using elliptic curves cryptography and Vigenère symmetr...
Design a cryptosystem using elliptic curves cryptography and Vigenère symmetr...
 
Applications Section 1.3
Applications   Section 1.3Applications   Section 1.3
Applications Section 1.3
 
Lecture50
Lecture50Lecture50
Lecture50
 
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTSA SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
 
Cryptography Baby Step Giant Step
Cryptography Baby Step Giant StepCryptography Baby Step Giant Step
Cryptography Baby Step Giant Step
 
Traveling Salesman Problem in Distributed Environment
Traveling Salesman Problem in Distributed EnvironmentTraveling Salesman Problem in Distributed Environment
Traveling Salesman Problem in Distributed Environment
 
TRAVELING SALESMAN PROBLEM IN DISTRIBUTED ENVIRONMENT
TRAVELING SALESMAN PROBLEM IN DISTRIBUTED ENVIRONMENTTRAVELING SALESMAN PROBLEM IN DISTRIBUTED ENVIRONMENT
TRAVELING SALESMAN PROBLEM IN DISTRIBUTED ENVIRONMENT
 

More from Lori Mitchell

More from Lori Mitchell (20)

Expository Essay Reflection Paper In. Online assignment writing service.
Expository Essay Reflection Paper In. Online assignment writing service.Expository Essay Reflection Paper In. Online assignment writing service.
Expository Essay Reflection Paper In. Online assignment writing service.
 
Handwriting Without Tears Paper WITH Picture Han
Handwriting Without Tears Paper WITH Picture HanHandwriting Without Tears Paper WITH Picture Han
Handwriting Without Tears Paper WITH Picture Han
 
My Mother Childhood Essay. Essay On My Mot
My Mother Childhood Essay. Essay On My MotMy Mother Childhood Essay. Essay On My Mot
My Mother Childhood Essay. Essay On My Mot
 
Stephen King Quote If You Want To Be A Writer, You Must Do Two Things
Stephen King Quote If You Want To Be A Writer, You Must Do Two ThingsStephen King Quote If You Want To Be A Writer, You Must Do Two Things
Stephen King Quote If You Want To Be A Writer, You Must Do Two Things
 
500 Word Essay - Example, Length And Writing Tips At
500 Word Essay - Example, Length And Writing Tips At500 Word Essay - Example, Length And Writing Tips At
500 Word Essay - Example, Length And Writing Tips At
 
Pin On Educational Purposes. Online assignment writing service.
Pin On Educational Purposes. Online assignment writing service.Pin On Educational Purposes. Online assignment writing service.
Pin On Educational Purposes. Online assignment writing service.
 
English Essay Form 1 - JerryldOneal. Online assignment writing service.
English Essay Form 1 - JerryldOneal. Online assignment writing service.English Essay Form 1 - JerryldOneal. Online assignment writing service.
English Essay Form 1 - JerryldOneal. Online assignment writing service.
 
Nurse Practitioner Personal Statement Sample That Can
Nurse Practitioner Personal Statement Sample That CanNurse Practitioner Personal Statement Sample That Can
Nurse Practitioner Personal Statement Sample That Can
 
As An English Teacher, Writin. Online assignment writing service.
As An English Teacher, Writin. Online assignment writing service.As An English Teacher, Writin. Online assignment writing service.
As An English Teacher, Writin. Online assignment writing service.
 
How To Write An Good Literature Essays Online
How To Write An Good Literature Essays OnlineHow To Write An Good Literature Essays Online
How To Write An Good Literature Essays Online
 
EDEXCEL Imaginative Writing Questions Teachin
EDEXCEL Imaginative Writing Questions TeachinEDEXCEL Imaginative Writing Questions Teachin
EDEXCEL Imaginative Writing Questions Teachin
 
College Essay Essay In High School. Online assignment writing service.
College Essay Essay In High School. Online assignment writing service.College Essay Essay In High School. Online assignment writing service.
College Essay Essay In High School. Online assignment writing service.
 
Cheap Essay Writing Services - Avail Best Essay Help AuthorST
Cheap Essay Writing Services - Avail Best Essay Help AuthorSTCheap Essay Writing Services - Avail Best Essay Help AuthorST
Cheap Essay Writing Services - Avail Best Essay Help AuthorST
 
Scientific Research Paper Format Template - Writinght
Scientific Research Paper Format Template - WritinghtScientific Research Paper Format Template - Writinght
Scientific Research Paper Format Template - Writinght
 
Tips For Writing A Research Paper Research4Life
Tips For Writing A Research Paper Research4LifeTips For Writing A Research Paper Research4Life
Tips For Writing A Research Paper Research4Life
 
Printable Birthday Stationary Pics BirthdayStationary
Printable Birthday Stationary Pics BirthdayStationaryPrintable Birthday Stationary Pics BirthdayStationary
Printable Birthday Stationary Pics BirthdayStationary
 
Samples Of Persuasive Essays For High School St
Samples Of Persuasive Essays For High School StSamples Of Persuasive Essays For High School St
Samples Of Persuasive Essays For High School St
 
The Elements Of Writing A Song Songwriting Basics,
The Elements Of Writing A Song Songwriting Basics,The Elements Of Writing A Song Songwriting Basics,
The Elements Of Writing A Song Songwriting Basics,
 
If They Give You Lined Paper, Write Sideways. By Daniel Quinn
If They Give You Lined Paper, Write Sideways. By Daniel QuinnIf They Give You Lined Paper, Write Sideways. By Daniel Quinn
If They Give You Lined Paper, Write Sideways. By Daniel Quinn
 
Robot Writing Paper - 3 Styles By Pink Posy Paperi
Robot Writing Paper - 3 Styles By Pink Posy PaperiRobot Writing Paper - 3 Styles By Pink Posy Paperi
Robot Writing Paper - 3 Styles By Pink Posy Paperi
 

Recently uploaded

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Recently uploaded (20)

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 

An Application Of Graph Theory In Cryptography

  • 1. An Application of Graph Theory in Cryptography P. Amudha1 k A.C. Charles Sagayaraj2 k A.C.Shantha Sheela3 Assistant Professor 1,2 Department of Mathematics SRM Institute of Science and Technology Vadapalani Campus, Chennai-26, India 3 Department of Computer Science, Sathyabama Institute of Science and Technology, Chennai-119, India 1 Email Id: amudha.p@vdp.srmuniv.ac.in, amutha106@gmail.com 2 Email Id: charlessagayaraj.a@vdp.srmuniv.ac.in, accharlez@gmail.com 3 Email Id: shantha.jasmine@gmail.com Abstract The need of secure communication of messages is nothing new. It has been present since ages. Security in todayss world is one of the important challenges. Ciphers can be converted into graphs for secret communication. The field of Graph Theory plays a vital role in various fields. Especially Graph theory is widely used as a tool of encryption, due to its various properties and its easy representation in computers as a matrix. Various papers based on graph theory applications have been studied and we explore the usage of Graph theory in cryptography has been proposed here. AMS Subject Classification: 06C20, 94C15 Keywords: Adjacency Matrix, Euler Graph, Hamiltonian circuit. Cryptography, Encryption, Decryption, Plain text, Cipher text. 1 International Journal of Pure and Applied Mathematics Volume 119 No. 13 2018, 375-383 ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu Special Issue ijpam.eu 375
  • 2. I. INTRODUCTION Cryptography is the science of secret writing with the goal of hiding the meaning of a message. Cryptography has long been the art of spies and soldiers. Nowadays, it is used everyday by billions of people for secur- ing electronic mail and payment transactions. The science of cryptography touches on many other disciplines, both within mathematics and computer science and in engineering. In mathematics, cryptology uses, and touches on, algebra, number theory, graph and lattice theory, algebraic geometry and probability and statistics. Analysis of cryptographic security leads to using theoretical computer science especially complexity theory. The actual implementation of cryptosystems, and the hardwork of carrying out security analysis for specific cryptosystems falls into engineering and practical com- puter science and computing. In this paper we have discussed and proposed an encryption-decryption algorithm using Euler graphs. II. PRELIMINARIES Graph: Conceptually, a graph is formed by vertices and edges connecting the ver- tices. Formally, a graph is a pair of sets (V,E), where V is the set of vertices and E is the set of edges, formed by pairs of vertices. Simple graph: A graph in which each edge connects two different vertices and where no two edges connect the same pair of vertices is called a simple graph. Adjacency matrix: Let V = (V, E) be a graph with V = {v1, v2, ..., vn}, E = {e1, e2, ..., em} and without parallel edges. The adjacency matrix of G is an nn symmetric binary matrix X = [xij] defined over the ring of integers such that xij = 1, if vivjĮĢE 0, otherwise It is used to represent whether a pair of vertices in a given graph are connected or not. An adjacency matrix is used to represent a finite graph. An element in the adjacency matrix is represented by xij where i represents the row and j represents the column in the adjacency matrix whose intersection is the element xij. 2 International Journal of Pure and Applied Mathematics Special Issue 376
  • 3. Incidence matrix: Let G be a graph with n vertices, m edges and without self-loops. The incidence matrix A of G is an nm matrix A = [aij] whose n rows correspond to the n vertices and the m columns correspond to m edges such that aij = 1, if jth edge mj is incident on ith vertex 0, otherwise Euler graph: An Eulerian cycle, Eulerian circuit or Euler tour in an undirected graph is a cycle that uses each edge exactly once. If such a cycle exists, the graph is called Eulerian or unicursal. The term ”Eulerian graph” is also sometimes used in a weaker sense to denote a graph where every vertex has even degree. Hamiltonian Graph: A Hamiltonian path or traceable path is a paththat visits each vertex of the graph exactly once. A graph that contains a Hamiltonian path is called a traceable graph. A graph is Hamiltonian-connected if for every pair of ver- tices there is a Hamiltonian path between the two vertices. Encryption: The process of converting information or data into a code, especially to pre- vent unauthorized access. Decryption: The process of converting information or data into a code, especially to pre- vent unauthorized access. Plain text: It is the message or information that the sender wishes to send to the receiver. Cipher text: It is the encrypted or encoded message that contains the plain text in an unreadable format. 3 International Journal of Pure and Applied Mathematics Special Issue 377
  • 4. XOR: In cryptography, the simple XOR cipher is a type of additive cipher, an en- cryption algorithm that operates according to the following principles: A L 0 = A, A L A = 0, (A L B) L C = A L (B L C), (B L A) L A = B L 0 = B, where L denotes the exclusive disjunction (XOR) operation. This operation is sometimes called modulus 2 addition (or subtraction, which is identical). With this logic, a string of text can be encrypted by applying the bit wise XOR operator to every character using a given key. To decrypt the output, merely reapplying the XOR function with the key will remove the cipher. III. PROCEDURE TO CHECK EULER GRAPH For a graph G(V,E) , form the incidence matrix M. Then count the number of non zero elements that is 1 , s in each and every row. If the count is even then the graph G is Euler otherwise G is not Euler. IV. PROPOSED ENCODING SYSTEMS The message that the user wants to send, will be encrypted into an Euler Graph by the proposed encryption technique. An Hamiltonian circuit will be traced out from the encrypted graph. This will be used as a key for decryption. 1. Convert each and every alphabet into its equivalent uppercase. 2. Take ASCII value of each uppercase alphabets. 3. Convert the ASCII values into binary format. 4. After the binary format of each ASCII is achieved, they are XORed with the binary equivalent of 32. 5. Store the resultant XORed binary equivalent in an array M[i]. 6. Count k= the number of 1 , s in the binary equivalent from the array M[i]. 7. Form an adjacency matrix A = (aij) with the count k, where aij denotes the element in the ith row and jth column of the matrix. The count represents the number of vertices of the simple graph . So the principal diagonal elements of the matrix are 0. This adjacency matrix is symmetric, so aij = aji . 4 International Journal of Pure and Applied Mathematics Special Issue 378
  • 5. 8. Now count the number of 0 , s following the 1 for every element in the array and put aij = aji = number of 0 , s + 1. For example if 10 is in the array the aji = 2, if 1000 is in the array then aji = 4. 9. The above process is repeated till the Hamiltonian circuit tracing reaches the end vertex. 10. Upon reaching the last element of the array as 1 that is the binary stream ends with a 1, then make a1j = 1 where j = k. 11. If the binary stream ends with a 1 and is followed by L number of 0 , s , then put a1k = L + 1. 12. The adjacency matrix is sent to the receiver. V. PROPOSED DECODING TECHNIQUE 1. The adjacency matrix is received. 2. The elements of the adjacency matrix are stored in a temporary array Z[p]. 3. We will traverse and take into consideration either the upper triangular matrix or the lower triangular matrix along the main diagonal. This is because of the symmetric nature of the adjacency matrix. 4. To build the binary stream, the elements of the Z[p] are expanded. 5. To get back the original message, the operations used in the encoding system are applied backwards. VI. RESULT Let our plain text be GRAPH. Convert each alphabet in the plain text into binary strings. Then XOR each alphabet with 32 bit binary string. We get the following: Alphabet ASCII Code Binary Number XORed G 71 1000111 1100111 R 82 1010010 1110010 A 65 1000001 1100001 P 80 1010000 1110000 H 72 1001000 1101000 Using encryption algorithm and Euler graph, the adjacency matrix of each alphabet is constructed and shown below: 5 International Journal of Pure and Applied Mathematics Special Issue 379
  • 6. For the alphabet G, there are five 1 , s , therefore the graph for the alphabet G has 5 vertices and hence its adjacency matrix is of 5x5 order which is given below. G = īŖĢ īŖŦ īŖŦ īŖŦ īŖŦ īŖŦ īŖŦ īŖ­ 0 1 0 0 1 1 0 3 0 0 1 3 0 1 0 0 0 1 0 1 1 0 0 1 0 īŖļ īŖˇ īŖˇ īŖˇ īŖˇ īŖˇ īŖˇ īŖ¸ Similarly for the other alphabets, we get R = īŖĢ īŖŦ īŖŦ īŖŦ īŖ­ 0 1 0 2 1 0 1 0 0 1 0 3 2 0 3 0 īŖļ īŖˇ īŖˇ īŖˇ īŖ¸ , A = īŖĢ īŖŦ īŖ­ 0 1 1 1 0 5 1 5 0 īŖļ īŖˇ īŖ¸ , P = īŖĢ īŖŦ īŖ­ 1 0 5 1 0 1 5 1 0 īŖļ īŖˇ īŖ¸ , H = īŖĢ īŖŦ īŖ­ 0 1 4 1 0 2 4 2 0 īŖļ īŖˇ īŖ¸ All these matrices are sent to the receiver one by one. For the first matrix the receiver receives [1 3 1 1 1] For the second matrix the receiver receives [1 1 3 2] For the 3rd matrix the he receives [1 5 1] For the 4th matrix the he receives [1 1 5] For the 5th matrix the he receives [1 2 4] . By expanding these matrices the receiver gets 13111 = 1100111 1132 = 1110010 151 = 1100001 115 = 1110000 124 = 1101000 Using encoding technique in reverse order 1100111 gives G 1110010 gives R 1100001 gives A 1110000 gives P 1101000 gives H Hence the receiver receives the plain text which was originally sent by the sender. 6 International Journal of Pure and Applied Mathematics Special Issue 380
  • 7. VII. CONCLUSION The cryptography is an algorithm which provides secure communication. In this paper we proposed a technique where each character of the data will be encrypted into an Euler Graph. Hamiltonian Circuit is used as key to secure the data. Thus, decryption is practically incomprehensible unless the Hamiltonian circuit and the encoding plan is known. In this cryptography technique, the complexity and the uncertainty of the decryption and interpretation of the actual message is very high and difficult as each graph represents a character of the message. This algorithm ensures the safety of the data. VII. REFERENCES [1]. Narsingh Deo, Graph Theory with Applications to Engineering and Computer Science, Prentice Hall, 2010. [2] Mahantesh Gawannavar, Payal Mandulkar, R. Thandeeswaran, N. Jeyanthi, Office in cloud: Approach to Authentication and Authorization, Recent Advances in Communications and Networking Technology, Bentham sciences, Vol.4, No.1, 2015, pp.49-55. [3] F.Amounas. 2015. ”Enhanced Elliptic Curve Encryption Approach of Amazigh alphabet with Braille representation”, International Journal of Computer Science and Network Solutions, vol 3, No 8, pp. 1-9. [4] Siva Kishore.B, Siva Theja Reddy.J, N.Jeyanthi, 2013, Three Phase Power Management Algorithms for Green Cloud Computing ”, International Journal of Applied Engineering Research Vol. 8, No.14, pp. 1725-1736. [5] N. Jeyanthi, R. Thandeeswaran, J. Vinithra, 2014, RQA Based Approach to Detect and Prevent DDoS Attacks in VoIP Networks, Cybernetics and Information Technologies, Vol.14, No.1, pp. 11-24. [6] Amrutha, R. Thandeeswaran, N. Jeyanthi, 2014, Cloud based VoIP Application in Aircraft Data Networks, International Journal of Grid Distribution Computing, Vol.7, No.6 (2014) December, pp.11- 18. 7 International Journal of Pure and Applied Mathematics Special Issue 381
  • 8. [7] Connections between graph theory and cryptography Natalia Tokareva G2C2: Graphs and Groups, Cycles and Coverings September, 2426, 2014. Novosibirsk, Russia. [8] Rishi Pal Singh, Vandana , Application of Graph Theory in Computer Science and Engineerin International Journal of Computer Applications (0975 8887) Volume 104 No.1, October 2014. [9] N.Koblitz, Algebraic Aspects of Cryptography, Springer-Verlag, Berlin 1998. 8 International Journal of Pure and Applied Mathematics Special Issue 382
  • 9. 383
  • 10. 384