SlideShare a Scribd company logo
10 XI November 2022
https://doi.org/10.22214/ijraset.2022.47675
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue XI Nov 2022- Available at www.ijraset.com
1587
© IJRASET: All Rights are Reserved | SJImpact Factor 7.538 | ISRA Journal Impact Factor 7.894 |
An Approach of Graph Theory on Cryptography
Indhu. K1
, Rekha. S2
1
M.sc Mathematics, Department of Mathematics, Dr. SNS Rajalakshmi College of Arts and Science, Coimbatore, Tamil Nadu, India
2
Assistant Professor, Department of Mathematics, Dr.SNS Rajalakshmi college of Arts and Science, Coimbatore, Tamil Nadu, India
Abstract: In this paper, we discuss about the connection between graph theory and cryptography. We use the spanning tree
concept of graph theory to encryption the message.
Keywords: Public key, cryptography, graphs, encryption, network security.
I. INTRODUCTION
Cryptography is the art of protect information by transforming it to unreadable format called Cipher text. The process of converting
plain text to cipher text called encryption, and the process of converting cipher text on its original plain text called decryption. The
remainder of this paper is a discussion of intractable problem from graph theory keeping cryptography as the base.
Firstly we represent the given text as node of the graph. Every node represent a character of the data. Now every adjacent character
in the given text will be represented by adjacent vertices in the graph.
II. APPLICATION
Example :1
We will encrypt the text or data, say RATE , which we will be sending to the receiver on the other end.
Now we change this text into graph by converting each letter to vertices of graph.
Convert the letter to vertex(node)
To form a Cycle Graph , we link each two characters.
Further we label each edge by using the encoding table, which is followed by most researchers.
Table 1 : Encoding Table
A B C D - - - - W X Y Z
1 2 3 4 - - - - 23 24 25 26
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue XI Nov 2022- Available at www.ijraset.com
1588
© IJRASET: All Rights are Reserved | SJImpact Factor 7.538 | ISRA Journal Impact Factor 7.894 |
The label on each edge represents the distance between the connected two vertices from the encoding table. So the edge connecting
vertex C with vertex O has a label which is distance between the two characters in the encoding table.
Distance = code (A)−code (H) = 1 − 8 = −7.
Similarly we can deduce the distances of other edges. Then we label the graph containing all the plaintext letters and we get
weighted graph which is given below. After that, we keep adding edges to form a complete graph and each new added edge has a
sequential weight starting from the maximum weight in the encoding table which is 26.Therefore we can add 27,28 and so on.
cycle Graph
Weighted Graph
Then add a special character before the first character to point to the first character, say A is special character , then we get.
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue XI Nov 2022- Available at www.ijraset.com
1589
© IJRASET: All Rights are Reserved | SJImpact Factor 7.538 | ISRA Journal Impact Factor 7.894 |
Complete plain Graph
Complete plain Graph with special character
Now represent the above graph in the form of a matrix.
A1= 0 12 0 0 0
12 0 -12 27 8
0 12 0 19 28
0 27 19 0 -15
0 8 0 -15 0
We now construct a minimal spanning tree of the above graph
Minimal spanning tree
0 12 0 0 0
A2= 12 0 -12 0 0
0 -12 0 19 0
0 0 19 0 -15
0 0 0 -15 0
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue XI Nov 2022- Available at www.ijraset.com
1590
© IJRASET: All Rights are Reserved | SJImpact Factor 7.538 | ISRA Journal Impact Factor 7.894 |
A. Encryption Process
Now we store the character order in the diagonalinstead of zeroes as follows:
Table 2 :
A H A T E
0 1 2 3 4
The modified A2= 0 12 0 0 0
0 1 -12 0 0
0 -12 2 19 0
0 0 1 9 3 -15
0 0 0 -15 4
we multiply matrix A1 by A2 to form A1
.
A3 = A1A2 = 0 12 -144 0 0
0 288 -450 -267 437
0 144 505 363 -173
0 -201 -511 586 -60
0 8 -381 -45 225
We now send the encrypted data C to the receiver -37-981 637 429 -49 -837 -637 429 -337 -387 904 8 -193 892 541 1 8 -381 -45
225.
B. Decryption Process
On the receiver side, C is got from multiplying the cipher text received with the inverse of shared Key Then calculate B by
multiplying C by K−1
A3= 0 1728 2412 2112 96
0 -1809 -1293 6446 6309
0 -1103 3724 3112 4293
0 9642 11868 -14236 -10398
0 5157 5349 -10398 739
Then A2 represent the below graph, regardless of te diagonal, we use it to retrieve the original text.
Decrypted Graph
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue XI Nov 2022- Available at www.ijraset.com
1591
© IJRASET: All Rights are Reserved | SJImpact Factor 7.538 | ISRA Journal Impact Factor 7.894 |
We suppose that the vertex 0 is A, and by using encoding table
Vertex 1 = code (A) + -19 = 18, which is character R
Vertex 2 = code (H) - 7 = 1, which is character A
Vertex 3 = code (A) + 19 = 20, which is character T
Vertex 4 = code (T) + −15 = 5, which is character E
Which gives us the original text R A T E
Acknowledgement
One of the author (Dr. V. Balaji ) acknowledges University Grants Commission, SERO, Hyderabad and India for financial
assistance (No.FMRP5766/15(SERO/UGC)).
REFERENCES
[1] Corman TH, Leiserson CE, Rivest RL, Stein C. Introduction to algorithms 2nd edition, McGraw-Hill.
[2] Yamuna M, Meenal Gogia, Ashish Sikka, Md. Jazib Hayat Khan. Encryption using graph theory and linear algebra. International Journal of Computer
Application. ISSN:2250-1797, 2012.
[3] Ustimenko VA. On graph-based cryptography and symbolic computations, Serdica. Journal of Computing, 2007, 131-156.
[4] Uma Dixit,CRYPTOGRAPHY A GRAPH THEORY APPROACH, International Journalof Advance Research in Science and Engineering, 6(01), 2017,
BVCNSCS 2017.
[5] Wael Mahmoud Al Etaiwi , Encryption Algorithm Using Graph Theory, Journal of Scientific Research and Reports, 3(19), 2519-2527, 2014, Article no.
An Approach Of Graph Theory On Cryptography

More Related Content

Similar to An Approach Of Graph Theory On Cryptography

Design of a new metamaterial structure to enhancement the
Design of a new metamaterial structure to enhancement theDesign of a new metamaterial structure to enhancement the
Design of a new metamaterial structure to enhancement theIAEME Publication
 
ENCRYPTION USING LESTER HILL CIPHER ALGORITHM
ENCRYPTION USING LESTER HILL CIPHER ALGORITHMENCRYPTION USING LESTER HILL CIPHER ALGORITHM
ENCRYPTION USING LESTER HILL CIPHER ALGORITHM
AM Publications
 
IRJET- Study of Topological Analogies of Perfect Difference Network and Compl...
IRJET- Study of Topological Analogies of Perfect Difference Network and Compl...IRJET- Study of Topological Analogies of Perfect Difference Network and Compl...
IRJET- Study of Topological Analogies of Perfect Difference Network and Compl...
IRJET Journal
 
Comparative Analysis of Efficient Designs of D Latch using 32nm CMOS Technology
Comparative Analysis of Efficient Designs of D Latch using 32nm CMOS TechnologyComparative Analysis of Efficient Designs of D Latch using 32nm CMOS Technology
Comparative Analysis of Efficient Designs of D Latch using 32nm CMOS Technology
ijtsrd
 
Edge tenacity in cycles and complete
Edge tenacity in cycles and completeEdge tenacity in cycles and complete
Edge tenacity in cycles and complete
ijfcstjournal
 
IRJET- Image Compression Technique for Quantized Encrypted Images using SVD
IRJET-  	  Image Compression Technique for Quantized Encrypted Images using SVDIRJET-  	  Image Compression Technique for Quantized Encrypted Images using SVD
IRJET- Image Compression Technique for Quantized Encrypted Images using SVD
IRJET Journal
 
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...
csandit
 
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...
cscpconf
 
Image Steganography Based On Non Linear Chaotic Algorithm
Image Steganography Based On Non Linear Chaotic AlgorithmImage Steganography Based On Non Linear Chaotic Algorithm
Image Steganography Based On Non Linear Chaotic Algorithm
IJARIDEA Journal
 
A Comparative Analysis of Structure of Machine Tool Component using Fuzzy Logic
A Comparative Analysis of Structure of Machine Tool Component using Fuzzy LogicA Comparative Analysis of Structure of Machine Tool Component using Fuzzy Logic
A Comparative Analysis of Structure of Machine Tool Component using Fuzzy Logic
IRJET Journal
 
Au33270273
Au33270273Au33270273
Au33270273
IJERA Editor
 
Au33270273
Au33270273Au33270273
Au33270273
IJERA Editor
 
H shape defected ground structure dgs- embedded square patch antenna
H shape defected ground structure  dgs- embedded square patch antennaH shape defected ground structure  dgs- embedded square patch antenna
H shape defected ground structure dgs- embedded square patch antenna
IAEME Publication
 
H-SHAPE DEFECTED GROUND STRUCTURE (DGS) EMBEDDED SQUARE PATCH ANTENNA
H-SHAPE DEFECTED GROUND STRUCTURE (DGS) EMBEDDED SQUARE PATCH ANTENNAH-SHAPE DEFECTED GROUND STRUCTURE (DGS) EMBEDDED SQUARE PATCH ANTENNA
H-SHAPE DEFECTED GROUND STRUCTURE (DGS) EMBEDDED SQUARE PATCH ANTENNA
IAEME Publication
 
New Design Architecture of Chaotic Secure Communication System Combined with ...
New Design Architecture of Chaotic Secure Communication System Combined with ...New Design Architecture of Chaotic Secure Communication System Combined with ...
New Design Architecture of Chaotic Secure Communication System Combined with ...
ijtsrd
 
CORDIC Algorithm for WLAN
CORDIC Algorithm for WLANCORDIC Algorithm for WLAN
CORDIC Algorithm for WLAN
IJERA Editor
 
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
IJCNCJournal
 
Data transfer using bipartite graph
Data transfer using bipartite graphData transfer using bipartite graph
Data transfer using bipartite graph
SwathiSundari
 
Ir3415981603
Ir3415981603Ir3415981603
Ir3415981603
IJERA Editor
 

Similar to An Approach Of Graph Theory On Cryptography (20)

Design of a new metamaterial structure to enhancement the
Design of a new metamaterial structure to enhancement theDesign of a new metamaterial structure to enhancement the
Design of a new metamaterial structure to enhancement the
 
ENCRYPTION USING LESTER HILL CIPHER ALGORITHM
ENCRYPTION USING LESTER HILL CIPHER ALGORITHMENCRYPTION USING LESTER HILL CIPHER ALGORITHM
ENCRYPTION USING LESTER HILL CIPHER ALGORITHM
 
IRJET- Study of Topological Analogies of Perfect Difference Network and Compl...
IRJET- Study of Topological Analogies of Perfect Difference Network and Compl...IRJET- Study of Topological Analogies of Perfect Difference Network and Compl...
IRJET- Study of Topological Analogies of Perfect Difference Network and Compl...
 
Comparative Analysis of Efficient Designs of D Latch using 32nm CMOS Technology
Comparative Analysis of Efficient Designs of D Latch using 32nm CMOS TechnologyComparative Analysis of Efficient Designs of D Latch using 32nm CMOS Technology
Comparative Analysis of Efficient Designs of D Latch using 32nm CMOS Technology
 
Edge tenacity in cycles and complete
Edge tenacity in cycles and completeEdge tenacity in cycles and complete
Edge tenacity in cycles and complete
 
IRJET- Image Compression Technique for Quantized Encrypted Images using SVD
IRJET-  	  Image Compression Technique for Quantized Encrypted Images using SVDIRJET-  	  Image Compression Technique for Quantized Encrypted Images using SVD
IRJET- Image Compression Technique for Quantized Encrypted Images using SVD
 
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...
 
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...
 
Image Steganography Based On Non Linear Chaotic Algorithm
Image Steganography Based On Non Linear Chaotic AlgorithmImage Steganography Based On Non Linear Chaotic Algorithm
Image Steganography Based On Non Linear Chaotic Algorithm
 
A Comparative Analysis of Structure of Machine Tool Component using Fuzzy Logic
A Comparative Analysis of Structure of Machine Tool Component using Fuzzy LogicA Comparative Analysis of Structure of Machine Tool Component using Fuzzy Logic
A Comparative Analysis of Structure of Machine Tool Component using Fuzzy Logic
 
Au33270273
Au33270273Au33270273
Au33270273
 
Au33270273
Au33270273Au33270273
Au33270273
 
H shape defected ground structure dgs- embedded square patch antenna
H shape defected ground structure  dgs- embedded square patch antennaH shape defected ground structure  dgs- embedded square patch antenna
H shape defected ground structure dgs- embedded square patch antenna
 
H-SHAPE DEFECTED GROUND STRUCTURE (DGS) EMBEDDED SQUARE PATCH ANTENNA
H-SHAPE DEFECTED GROUND STRUCTURE (DGS) EMBEDDED SQUARE PATCH ANTENNAH-SHAPE DEFECTED GROUND STRUCTURE (DGS) EMBEDDED SQUARE PATCH ANTENNA
H-SHAPE DEFECTED GROUND STRUCTURE (DGS) EMBEDDED SQUARE PATCH ANTENNA
 
New Design Architecture of Chaotic Secure Communication System Combined with ...
New Design Architecture of Chaotic Secure Communication System Combined with ...New Design Architecture of Chaotic Secure Communication System Combined with ...
New Design Architecture of Chaotic Secure Communication System Combined with ...
 
CORDIC Algorithm for WLAN
CORDIC Algorithm for WLANCORDIC Algorithm for WLAN
CORDIC Algorithm for WLAN
 
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
 
Data transfer using bipartite graph
Data transfer using bipartite graphData transfer using bipartite graph
Data transfer using bipartite graph
 
40120130406011 2-3
40120130406011 2-340120130406011 2-3
40120130406011 2-3
 
Ir3415981603
Ir3415981603Ir3415981603
Ir3415981603
 

More from Cynthia Velynne

Free Cool Alphabet Letter Designs, Download Free Cool Alphabet Letter
Free Cool Alphabet Letter Designs, Download Free Cool Alphabet LetterFree Cool Alphabet Letter Designs, Download Free Cool Alphabet Letter
Free Cool Alphabet Letter Designs, Download Free Cool Alphabet Letter
Cynthia Velynne
 
Analytical Writing Sample. GRE GRE Analytical Writing Samp
Analytical Writing Sample. GRE GRE Analytical Writing SampAnalytical Writing Sample. GRE GRE Analytical Writing Samp
Analytical Writing Sample. GRE GRE Analytical Writing Samp
Cynthia Velynne
 
Biography Writing Template Biography Template, Writin
Biography Writing Template Biography Template, WritinBiography Writing Template Biography Template, Writin
Biography Writing Template Biography Template, Writin
Cynthia Velynne
 
Writing A Good Personal Reflective Essay - How To
Writing A Good Personal Reflective Essay - How ToWriting A Good Personal Reflective Essay - How To
Writing A Good Personal Reflective Essay - How To
Cynthia Velynne
 
Learn How To Write A Truly Impressive Sc
Learn How To Write A Truly Impressive ScLearn How To Write A Truly Impressive Sc
Learn How To Write A Truly Impressive Sc
Cynthia Velynne
 
Embossed Letter Sheets Set Of 50 Stationery Shee
Embossed Letter Sheets Set Of 50 Stationery SheeEmbossed Letter Sheets Set Of 50 Stationery Shee
Embossed Letter Sheets Set Of 50 Stationery Shee
Cynthia Velynne
 
Erianto OngkoS Briefcase Menulis Menjalin Persatua
Erianto OngkoS Briefcase Menulis Menjalin PersatuaErianto OngkoS Briefcase Menulis Menjalin Persatua
Erianto OngkoS Briefcase Menulis Menjalin Persatua
Cynthia Velynne
 
Does Money Buy Happiness -
Does Money Buy Happiness -Does Money Buy Happiness -
Does Money Buy Happiness -
Cynthia Velynne
 
Examples Of Science Paper Abs
Examples Of Science Paper AbsExamples Of Science Paper Abs
Examples Of Science Paper Abs
Cynthia Velynne
 
Pin On English
Pin On EnglishPin On English
Pin On English
Cynthia Velynne
 
Explanatory Essay Short Write With Notes, Organize
Explanatory Essay Short Write With Notes, OrganizeExplanatory Essay Short Write With Notes, Organize
Explanatory Essay Short Write With Notes, Organize
Cynthia Velynne
 
Sample Scientific Method Paper Write Up
Sample Scientific Method Paper Write UpSample Scientific Method Paper Write Up
Sample Scientific Method Paper Write Up
Cynthia Velynne
 
How To Write A Good Conclusion To An Academic Essay - In Summary 10
How To Write A Good Conclusion To An Academic Essay - In Summary 10How To Write A Good Conclusion To An Academic Essay - In Summary 10
How To Write A Good Conclusion To An Academic Essay - In Summary 10
Cynthia Velynne
 
Pin On AVID
Pin On AVIDPin On AVID
Pin On AVID
Cynthia Velynne
 
Application Example College Essay College Essay Hoo
Application Example College Essay College Essay HooApplication Example College Essay College Essay Hoo
Application Example College Essay College Essay Hoo
Cynthia Velynne
 
Template For Briefing Paper How To Write A Briefing
Template For Briefing Paper How To Write A BriefingTemplate For Briefing Paper How To Write A Briefing
Template For Briefing Paper How To Write A Briefing
Cynthia Velynne
 
Case Study Template
Case Study TemplateCase Study Template
Case Study Template
Cynthia Velynne
 
Research Integrity On Twitter Avoidi
Research Integrity On Twitter AvoidiResearch Integrity On Twitter Avoidi
Research Integrity On Twitter Avoidi
Cynthia Velynne
 
Home Essay Writer, Essay,
Home Essay Writer, Essay,Home Essay Writer, Essay,
Home Essay Writer, Essay,
Cynthia Velynne
 
College Essay Essay On Importance Of Education In
College Essay Essay On Importance Of Education InCollege Essay Essay On Importance Of Education In
College Essay Essay On Importance Of Education In
Cynthia Velynne
 

More from Cynthia Velynne (20)

Free Cool Alphabet Letter Designs, Download Free Cool Alphabet Letter
Free Cool Alphabet Letter Designs, Download Free Cool Alphabet LetterFree Cool Alphabet Letter Designs, Download Free Cool Alphabet Letter
Free Cool Alphabet Letter Designs, Download Free Cool Alphabet Letter
 
Analytical Writing Sample. GRE GRE Analytical Writing Samp
Analytical Writing Sample. GRE GRE Analytical Writing SampAnalytical Writing Sample. GRE GRE Analytical Writing Samp
Analytical Writing Sample. GRE GRE Analytical Writing Samp
 
Biography Writing Template Biography Template, Writin
Biography Writing Template Biography Template, WritinBiography Writing Template Biography Template, Writin
Biography Writing Template Biography Template, Writin
 
Writing A Good Personal Reflective Essay - How To
Writing A Good Personal Reflective Essay - How ToWriting A Good Personal Reflective Essay - How To
Writing A Good Personal Reflective Essay - How To
 
Learn How To Write A Truly Impressive Sc
Learn How To Write A Truly Impressive ScLearn How To Write A Truly Impressive Sc
Learn How To Write A Truly Impressive Sc
 
Embossed Letter Sheets Set Of 50 Stationery Shee
Embossed Letter Sheets Set Of 50 Stationery SheeEmbossed Letter Sheets Set Of 50 Stationery Shee
Embossed Letter Sheets Set Of 50 Stationery Shee
 
Erianto OngkoS Briefcase Menulis Menjalin Persatua
Erianto OngkoS Briefcase Menulis Menjalin PersatuaErianto OngkoS Briefcase Menulis Menjalin Persatua
Erianto OngkoS Briefcase Menulis Menjalin Persatua
 
Does Money Buy Happiness -
Does Money Buy Happiness -Does Money Buy Happiness -
Does Money Buy Happiness -
 
Examples Of Science Paper Abs
Examples Of Science Paper AbsExamples Of Science Paper Abs
Examples Of Science Paper Abs
 
Pin On English
Pin On EnglishPin On English
Pin On English
 
Explanatory Essay Short Write With Notes, Organize
Explanatory Essay Short Write With Notes, OrganizeExplanatory Essay Short Write With Notes, Organize
Explanatory Essay Short Write With Notes, Organize
 
Sample Scientific Method Paper Write Up
Sample Scientific Method Paper Write UpSample Scientific Method Paper Write Up
Sample Scientific Method Paper Write Up
 
How To Write A Good Conclusion To An Academic Essay - In Summary 10
How To Write A Good Conclusion To An Academic Essay - In Summary 10How To Write A Good Conclusion To An Academic Essay - In Summary 10
How To Write A Good Conclusion To An Academic Essay - In Summary 10
 
Pin On AVID
Pin On AVIDPin On AVID
Pin On AVID
 
Application Example College Essay College Essay Hoo
Application Example College Essay College Essay HooApplication Example College Essay College Essay Hoo
Application Example College Essay College Essay Hoo
 
Template For Briefing Paper How To Write A Briefing
Template For Briefing Paper How To Write A BriefingTemplate For Briefing Paper How To Write A Briefing
Template For Briefing Paper How To Write A Briefing
 
Case Study Template
Case Study TemplateCase Study Template
Case Study Template
 
Research Integrity On Twitter Avoidi
Research Integrity On Twitter AvoidiResearch Integrity On Twitter Avoidi
Research Integrity On Twitter Avoidi
 
Home Essay Writer, Essay,
Home Essay Writer, Essay,Home Essay Writer, Essay,
Home Essay Writer, Essay,
 
College Essay Essay On Importance Of Education In
College Essay Essay On Importance Of Education InCollege Essay Essay On Importance Of Education In
College Essay Essay On Importance Of Education In
 

Recently uploaded

Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Lapbook sobre os Regimes TotalitĂĄrios.pdf
Lapbook sobre os Regimes TotalitĂĄrios.pdfLapbook sobre os Regimes TotalitĂĄrios.pdf
Lapbook sobre os Regimes TotalitĂĄrios.pdf
Jean Carlos Nunes PaixĂŁo
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
BÀI TáșŹP BỔ TRỹ TIáșŸNG ANH GLOBAL SUCCESS LỚP 3 - Cáșą NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TáșŹP BỔ TRỹ TIáșŸNG ANH GLOBAL SUCCESS LỚP 3 - Cáșą NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TáșŹP BỔ TRỹ TIáșŸNG ANH GLOBAL SUCCESS LỚP 3 - Cáșą NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TáșŹP BỔ TRỹ TIáșŸNG ANH GLOBAL SUCCESS LỚP 3 - Cáșą NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 

Recently uploaded (20)

Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Lapbook sobre os Regimes TotalitĂĄrios.pdf
Lapbook sobre os Regimes TotalitĂĄrios.pdfLapbook sobre os Regimes TotalitĂĄrios.pdf
Lapbook sobre os Regimes TotalitĂĄrios.pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
BÀI TáșŹP BỔ TRỹ TIáșŸNG ANH GLOBAL SUCCESS LỚP 3 - Cáșą NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TáșŹP BỔ TRỹ TIáșŸNG ANH GLOBAL SUCCESS LỚP 3 - Cáșą NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TáșŹP BỔ TRỹ TIáșŸNG ANH GLOBAL SUCCESS LỚP 3 - Cáșą NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TáșŹP BỔ TRỹ TIáșŸNG ANH GLOBAL SUCCESS LỚP 3 - Cáșą NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 

An Approach Of Graph Theory On Cryptography

  • 1. 10 XI November 2022 https://doi.org/10.22214/ijraset.2022.47675
  • 2. International Journal for Research in Applied Science & Engineering Technology (IJRASET) ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538 Volume 10 Issue XI Nov 2022- Available at www.ijraset.com 1587 © IJRASET: All Rights are Reserved | SJImpact Factor 7.538 | ISRA Journal Impact Factor 7.894 | An Approach of Graph Theory on Cryptography Indhu. K1 , Rekha. S2 1 M.sc Mathematics, Department of Mathematics, Dr. SNS Rajalakshmi College of Arts and Science, Coimbatore, Tamil Nadu, India 2 Assistant Professor, Department of Mathematics, Dr.SNS Rajalakshmi college of Arts and Science, Coimbatore, Tamil Nadu, India Abstract: In this paper, we discuss about the connection between graph theory and cryptography. We use the spanning tree concept of graph theory to encryption the message. Keywords: Public key, cryptography, graphs, encryption, network security. I. INTRODUCTION Cryptography is the art of protect information by transforming it to unreadable format called Cipher text. The process of converting plain text to cipher text called encryption, and the process of converting cipher text on its original plain text called decryption. The remainder of this paper is a discussion of intractable problem from graph theory keeping cryptography as the base. Firstly we represent the given text as node of the graph. Every node represent a character of the data. Now every adjacent character in the given text will be represented by adjacent vertices in the graph. II. APPLICATION Example :1 We will encrypt the text or data, say RATE , which we will be sending to the receiver on the other end. Now we change this text into graph by converting each letter to vertices of graph. Convert the letter to vertex(node) To form a Cycle Graph , we link each two characters. Further we label each edge by using the encoding table, which is followed by most researchers. Table 1 : Encoding Table A B C D - - - - W X Y Z 1 2 3 4 - - - - 23 24 25 26
  • 3. International Journal for Research in Applied Science & Engineering Technology (IJRASET) ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538 Volume 10 Issue XI Nov 2022- Available at www.ijraset.com 1588 © IJRASET: All Rights are Reserved | SJImpact Factor 7.538 | ISRA Journal Impact Factor 7.894 | The label on each edge represents the distance between the connected two vertices from the encoding table. So the edge connecting vertex C with vertex O has a label which is distance between the two characters in the encoding table. Distance = code (A)−code (H) = 1 − 8 = −7. Similarly we can deduce the distances of other edges. Then we label the graph containing all the plaintext letters and we get weighted graph which is given below. After that, we keep adding edges to form a complete graph and each new added edge has a sequential weight starting from the maximum weight in the encoding table which is 26.Therefore we can add 27,28 and so on. cycle Graph Weighted Graph Then add a special character before the first character to point to the first character, say A is special character , then we get.
  • 4. International Journal for Research in Applied Science & Engineering Technology (IJRASET) ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538 Volume 10 Issue XI Nov 2022- Available at www.ijraset.com 1589 © IJRASET: All Rights are Reserved | SJImpact Factor 7.538 | ISRA Journal Impact Factor 7.894 | Complete plain Graph Complete plain Graph with special character Now represent the above graph in the form of a matrix. A1= 0 12 0 0 0 12 0 -12 27 8 0 12 0 19 28 0 27 19 0 -15 0 8 0 -15 0 We now construct a minimal spanning tree of the above graph Minimal spanning tree 0 12 0 0 0 A2= 12 0 -12 0 0 0 -12 0 19 0 0 0 19 0 -15 0 0 0 -15 0
  • 5. International Journal for Research in Applied Science & Engineering Technology (IJRASET) ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538 Volume 10 Issue XI Nov 2022- Available at www.ijraset.com 1590 © IJRASET: All Rights are Reserved | SJImpact Factor 7.538 | ISRA Journal Impact Factor 7.894 | A. Encryption Process Now we store the character order in the diagonalinstead of zeroes as follows: Table 2 : A H A T E 0 1 2 3 4 The modified A2= 0 12 0 0 0 0 1 -12 0 0 0 -12 2 19 0 0 0 1 9 3 -15 0 0 0 -15 4 we multiply matrix A1 by A2 to form A1 . A3 = A1A2 = 0 12 -144 0 0 0 288 -450 -267 437 0 144 505 363 -173 0 -201 -511 586 -60 0 8 -381 -45 225 We now send the encrypted data C to the receiver -37-981 637 429 -49 -837 -637 429 -337 -387 904 8 -193 892 541 1 8 -381 -45 225. B. Decryption Process On the receiver side, C is got from multiplying the cipher text received with the inverse of shared Key Then calculate B by multiplying C by K−1 A3= 0 1728 2412 2112 96 0 -1809 -1293 6446 6309 0 -1103 3724 3112 4293 0 9642 11868 -14236 -10398 0 5157 5349 -10398 739 Then A2 represent the below graph, regardless of te diagonal, we use it to retrieve the original text. Decrypted Graph
  • 6. International Journal for Research in Applied Science & Engineering Technology (IJRASET) ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538 Volume 10 Issue XI Nov 2022- Available at www.ijraset.com 1591 © IJRASET: All Rights are Reserved | SJImpact Factor 7.538 | ISRA Journal Impact Factor 7.894 | We suppose that the vertex 0 is A, and by using encoding table Vertex 1 = code (A) + -19 = 18, which is character R Vertex 2 = code (H) - 7 = 1, which is character A Vertex 3 = code (A) + 19 = 20, which is character T Vertex 4 = code (T) + −15 = 5, which is character E Which gives us the original text R A T E Acknowledgement One of the author (Dr. V. Balaji ) acknowledges University Grants Commission, SERO, Hyderabad and India for financial assistance (No.FMRP5766/15(SERO/UGC)). REFERENCES [1] Corman TH, Leiserson CE, Rivest RL, Stein C. Introduction to algorithms 2nd edition, McGraw-Hill. [2] Yamuna M, Meenal Gogia, Ashish Sikka, Md. Jazib Hayat Khan. Encryption using graph theory and linear algebra. International Journal of Computer Application. ISSN:2250-1797, 2012. [3] Ustimenko VA. On graph-based cryptography and symbolic computations, Serdica. Journal of Computing, 2007, 131-156. [4] Uma Dixit,CRYPTOGRAPHY A GRAPH THEORY APPROACH, International Journalof Advance Research in Science and Engineering, 6(01), 2017, BVCNSCS 2017. [5] Wael Mahmoud Al Etaiwi , Encryption Algorithm Using Graph Theory, Journal of Scientific Research and Reports, 3(19), 2519-2527, 2014, Article no.