SlideShare a Scribd company logo
Encryption
Algorithm
Using Random
Graphs
Ameya Meattle
United World College of South East Asia
Abstract
In this work, we propose an encryption and decryption algorithm in a computer
network, using ideas from graph theory and matrices. We attempt to simulate a
method in which data can be transferred efficiently post-encryption and study how
such an algorithm performs. Random complete graphs consisting of 250 vertices
and 31125 edges were created, with randomly chosen start and end nodes to depict
the initial source and final destination for data transferred. The algorithm harnesses
the idea of a random graph and assigns a multi-dimensional weight to each node.
These weights, along with a randomly generated path are used to build an
encryption matrix that increases the randomness in the encryption, making it a
more robust encryption algorithm. An analysis of the average time taken for which a
16-bit number was encoded, using an M1 2020 Macbook Air was just over 5
milliseconds, relatively fast for a secure algorithm. The algorithm could be improved
by having additional parameters, such as increasing the random path length, the
number of vertices or even using 3 x 3 matrices, resulting in more data to be
encrypted and a more secure system, though this may lead to a trade-off of a
longer run time.
● Matrices are a set of
elements that are
represented as R rows and C
columns to form an R × C
array.
● Matrix multiplication is
known and defined on a
square matrix, where R = C
● Matrix multiplication is non-
commutative; therefore, the
sequence of multiplication
matters. We use this
property of matrices to
generate unique encrypting
matrices for our algorithm
● Cybersecurity is the practice of
safeguarding systems against
vulnerabilities, threats and
attacks
● Cryptography is a foundational
pillar of cybersecurity. It is the
art of securing communication
through the manipulation of
data and is a process that
involves hiding or coding
information so that only the
recipient (whom the message
was intended for) can read it
Graphs and Networks Linear Algebra Cybersecurity
and
Cryptography
● A graph is a set of nodes and edges
connected to each other to represent
relationships between vertices
● Networks are practical applications of
graphs, where the edges and nodes
represent real-world relationships
between systems
Literature Review
● Cryptography is crucial in network security. Recent advanced cryptographic
algorithms have enhanced the fields of cloud computing, wireless sensor
networks, and on-chip networks, according to Sarkar, Chatterjee, and
Chakraborty’s paper, “Role of cryptography in network security”.
● To evaluate the behaviors of networks, concepts from graph theory have been
used previously. The importance of techniques like graph sampling and the
characterization of network features such as node centrality, densification, and
diameter in understanding network vulnerabilities and shifts in network behavior
over time have laid the foundations for using graph theory in the field of
cybersecurity, in Namayanja and Janeja’s paper, “Characterization of evolving
networks for cybersecurity”.
● Various key elements in network security and graph theory can be used to design
public key encryption schemes based on matrices generated from a graph or
graphical codes, according to Sen Sarma’s paper “Application of graphs in
security”. Such schemes can be used to understand and prevent attacks.
● In 2016, Namayanja and
Janeja explored the use of
analytics to model and
evaluate computer network
behavior using graph theory
concepts, focusing on
potential cyber threats, in the
paper, ”Characterization of
Evolving Networks for
Cybersecurity”.
● They highlight the
significance of techniques
like graph sampling and
characterization of network
features for understanding
network vulnerabilities.
● The paper, ”Network Security
and Types of Attacks in
Network” tackles security
issues in mobile ad-hoc
networks (MANETs) due to
node independence and
malicious activities.
● Pawar and Anuradha introduce
network security elements like
confidentiality, integrity, and
availability, classify major
attacks like spoofing, and
emphasize securing individual
computers and network
communication channels.
Cryptography
Graph Theory
Networks Network Security
● Sarkar, Chatterjee, and Chakraborty
talked about the,”Role of Cryptography in
Network Security” in 2020, exploring the
role of cryptography in network security,
focusing on encryption and decryption
techniques.
● It categorizes techniques into symmetric-
key, asymmetric-key, and authentication,
and discusses recent advanced
cryptographic algorithms for cloud
computing, wireless sensor networks, and
on-chip networks.
● The publication provides an
understanding of secure network
communication and the importance of
cryptography in maintaining data
confidentiality.
● The research paper, ”A Survey
on Cryptography Algorithms”,
published in 2018, provides a
comparative study of various
cryptography encryption and
decryption algorithms, such as
AES, DES and RSA.
● Abood and Guirguis explore
these systems by analyzing
the benefits and drawbacks of
factors such as security,
effectiveness, and time.
● We find out that symmetric
algorithms are faster than
asymmetric ones, and AES is
the most reliable algorithm in
terms of speed, decoding,
complexity, flexibility, and
more.
● The paper, ”Network Security
and Types of Attacks in
Network” tackles security
issues in mobile ad-hoc
networks (MANETs) due to
node independence and
malicious activities.
● Pawar and Anuradha
introduce network security
elements like confidentiality,
integrity, and availability,
classify major attacks like
spoofing, and emphasize
securing individual computers
and network communication
channels.
Graphs in Security Cryptography Algorithms Network Security
● In the 2019 research paper,
”Application of Graphs in
Security’, Sensarma and Sarma
explore the concepts of
cryptography and graph theory to
design and propose two public key
encryption schemes:
1. Focuses on matrices generated
from a graph
2. Focuses on properties of
graphical codes.
● The paper by Hogan, Johnson,
and Halappanavar, ”Graph
coarsening for pathfinding in
cybersecurity graphs”,
published in 2013 employs
graph coarsening to detect
hackers using “Pass- the-
Hash Attacks” and assess
network risk by repeatedly
contracting edges to identify
high-risk paths.
● The 2017 paper discussing
the ‘Advanced Encryption
Standard Algorithm To
Encrypt and Decrypt Data’,
Abdullah explains the AES
algorithm as a symmetric
block cipher algorithm and
details the algorithm’s
process of transforming data
through a series of rounds.
● Involves applying
substitutions, permutations,
and bitwise operations to
protect sensitive information.
Graph Theory
Encryption Algorithm
Method for Path Finding in
Cybersecurity Graphs
Encryption and
Decryption of Data
● In the paper written in 2014,
”Encryption Algorithm Using
Graph Theory”, Al Eitawi proposes
a new symmetric encryption
algorithm based on graph theory
properties such as cycle graphs
and complete graphs.
● The algorithm is based on the
foundation of data being
represented as vertices, creating a
cycle graph, with weighted edges
according to an encoding table.
After that, it builds a complete
graph, determines the minimum
spanning tree, and carries out
matrix operations for encryption
and decryption.
We define the following variables:
V = Total number of vertices,
L = Path length
How do we know that 1.28 × 1019 paths in a network is secure enough? A 9-character ASCII passcode has
1289 possible combinations. According to the Cyber Security Agency of Singapore, a password of this
nature would take approximately 3 years to break into the system. Since our network exceeds the
number of possible combinations in a 9-character password threshold, we know it would take longer
than 3 years, meeting our security criteria.
To check the number of random
paths, we calculate the number of
permutations, considering the order
of selection and without repetition.
This is done by subtracting 2 from the
total vertices and the path length
since the starting and ending nodes
are already randomly assigned, and
we want to calculate the number of
ways to arrange the remaining
vertices along the path.
Number of Random Paths
Procedure: Creating
Random Graph
1. Initially, a network is created using
a complete graph of 250 nodes,
and 31125 edges between them.
2. Next, a random path is created
between two randomly chosen
nodes, with a fixed path length of
10 in the graph.
Fig 1. An example graph with 30 nodes and 100 edges
Procedure: Product Matrix
1. 250 2 × 2 predefined matrices, A1, A2, A3 … A249, A250 are put into a list. 2 × 2
matrices are chosen due to their enhanced comprehension efficiency through
the organization of data into categories, therefore being computationally less
intensive while providing an optimal level of security.
2. Based on the random path taken, a product matrix is created by choosing N
numbers of Ai from this list where i is 1 ≤ i ≤ 250, where N represents the number
of elements from the list and the number of vertices in the random path.
3. For each i that represents a node in the random path, starting from the first
node to the Nth node, we multiply the Ai in sequence to obtain the product
matrix. Together, the matrices multiplied to obtain the product matrix are
represented as the sub-keys to the encryption key.
Procedure: Encryption and Decryption
1. The user defines a input data to be a 2x2 matrix.
2. To encrypt this data, we multiply the product matrix and the input data. This
encrypted 2x2 matrix is obfuscated and original data cannot be obtained
without the decryption key.
3. The decryption algorithm takes place by multiplying the inverse of the product
matrix by the encrypted data to get back the original input data.
4. To verify that the algorithm works, we subtracted the decrypted data from the
original input data to see if the resulting matrix is a zero matrix. If this works,
the algorithm is a success.
Flow Chart
Results (Sample Output 1)
● In this sample case, the input data matrix was [-4 5] [6 5].
● A path was randomly generated, with the start and end nodes being
14 and 83 respectively. In the path, the 14th, 47th, 94th, 36th, 25th, 15th
and 83rd vertices were chosen, therefore the corresponding
predefined matrices were multiplied together in that order.
● This final product matrix is multiplied with the input data, to obtain
the encrypted data. Finally, we multiply the inverse of the final
product matrix by encrypted data to return the decrypted data.
Results (Case of Final Product Matrix = 0)
● In this output, the inputted data was also kept as [-4 5] [6 5].
● A path was randomly generated, with the start and end nodes being 44 and
18 respectively. In the path, the 44th, 61st, 12th, 51st, 3rd, 69th and 18th vertices
were chosen, therefore the corresponding predefined matrices were
multiplied together in that order.
● Since the determinant of the product matrix, add a randomly predefined
matrix (in this case [1 6] [4 5]).
● This final product matrix is multiplied with the original data, to obtain the
encrypted data. Finally, we multiplying the inverse of the final product matrix
by encrypted data to return the decrypted data.
Data Analysis: Performance
An analysis of the average time
taken for the encryption and
decryption algorithm to execute for I
iterations was carried out by
repeating the 50 iteration cycle 10
times, in order to obtain a more
precise result.
The mean time taken is
approximately 5.43 milliseconds,
which is relatively fast for a secure
encryption and decryption
algorithm. In these trials, a 16 bit
number was encoded, using an M1
2020 Macbook Air.
Data Analysis:
Error and Special Cases
If during the process of obtaining the product matrix, the product of two of the predefined
matrices results in a zero matrix, then the final product matrix would be a zero matrix itself,
meaning that the encrypted data would also be a zero matrix. For such a matrix, the
inverse would not exist as it’s determinant is 0 and so, the encrypted data cannot be
decrypted.Therefore, if the product matrix is a 0 matrix, we add a random predefined 2x2
matrix to the product matrix, so that it can encrypt and decrypt. If one of the predefined
matrices is a zero matrix and the multiplication of matrices in the random path end up as
zero matrix, the random matrix chosen for addition excludes the zero matrix from the set of
total predefined matrices, so that the zero matrix is not added.
Summary and Conclusion
● In this paper, we explored the idea of using random graphs to create an effective
encryption and decryption algorithm, addressing all possible input scenarios.
● The model leverages linear algebra concepts, specifically matrices, to represent
data, bridging theoretical concepts and practical applications in encryption and
decryption.
● The success of the algorithm is proved by an efficient execution time, of just over 5
milliseconds.
● As technology advances and becomes more widely and rapidly utilized, the number
of security and data breaches has been increasing year upon year, hence the
increasing importance of cybersecurity.
● Therefore, an algorithm of this nature enhances data security and serves as a
foundation for advancement in newer encryption algorithms in the future.
Summary and Conclusion:
Improvements
● The model could be improved by including additional graph theory parameters such
as the following;
○ increasing the random path length
○ increasing the total number of vertices in the network, resulting in a more
secure system, though this may lead to a trade-off of a longer run time.
● Using 3 x 3 matrices would allow for more data to be encrypted in each run of the
algorithm.
● Exploring whether such an algorithm can have successful implementation of
securely encrypting big data.
References
G Yee. Optimal security protection for sensitive data. International Journal on Advances in Security, 11(1&2):80–90, 2018.
R.A. Kemmerer. Cybersecurity. In 25th International Conference on Software Engineering, 2003. Proceedings., pages 705–715, 2003.
VV Iashchenko. Cryptography: An Introduction: An Introduction. Number 18. American Mathematical Soc., 2002.
Chengdong Tao, Adama Diene, Shaohua Tang, and Jintai Ding. Simple matrix scheme for encryption. In Post-Quantum Cryptography:
5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings 5, pages 231–242. Springer, 2013.
Network topology matrices. https://www.tutorialspoint.com/network theory/networktheorytopology matrices.htm.
Remco Van Der Hofstad. Random graphs and complex networks. Available on http://www. win. tue. nl/rhofstad/NotesRGCN. pdf, 11:60, 2009.
Georgi E Shilov. Linear algebra. Courier Corporation, 2012.
Omar G Abood and Shawkat K Guirguis. A survey on cryptography algorithms. International Journal of Scientific and Research Publications,
8(7):495–516, 2018.
Anindita Sarkar, Swagata Roy Chatterjee, and Mohuya Chakraborty. Role of cryptography in network security. The” Essence” of Network Security:
An End-to-End Panorama, pages 103–143, 2021.
Josephine M Namayanja and Vandana P Janeja. Characterization of evolving networks for cybersecurity. Information Fusion for CyberSecurity Analytics,
pages 111–127, 2017.
Mohan V Pawar and J Anuradha. Network security and types of attacks in network. Procedia Computer Science, 48:503–506, 2015.
Debajit Sensarma and Samar Sen Sarma. Application of graphs in security. International Journal of Innovative Technology and Exploring Engineering,
8(10):2273–2279, 2019.
Emilie Hogan, John R Johnson, and Mahantesh Halappanavar. Graph coarsening for path finding in cybersecurity graphs. In Proceedings of the Eighth
Annual Cyber Security and Information Intelligence Research Workshop, pages 1–4, 2013.
Ako Muhamad Abdullah et al. Advanced encryption standard (aes) algorithm to encrypt and decrypt data. Cryptography and Network Security,
16(1):11, 2017.
Wael Mahmoud Al Etaiwi. Encryption algorithm using graph theory. Journal of scientific research and reports, 3(19):2519–2527, 2014.
P Amudha, AC Charles Sagayaraj, and AC Shantha Sheela. An application of graph theory in cryptography. International Journal of Pure and Applied
Mathematics, 119(13):375–383, 2018.
Password checker. https://www.csa.gov.sg/Tips-Resource/Interactive-Tools/Password-Checker.
Alexander Craig Aitken. Determinants and matrices. Read Books Ltd, 2017.
Naveen Kumar. Today’s importance of cybersecurity. PhD thesis, Utica College, 2014.

More Related Content

Similar to Encryption Algorithm Using Random Graphs.pptx

561 1530-1-pb (1)
561 1530-1-pb (1)561 1530-1-pb (1)
561 1530-1-pb (1)
Meetendra Singh
 
ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015Ashish Gupta
 
A new hybrid text encryption approach over mobile ad hoc network
A new hybrid text encryption approach over mobile  ad hoc network A new hybrid text encryption approach over mobile  ad hoc network
A new hybrid text encryption approach over mobile ad hoc network
IJECEIAES
 
Ijcnc050212
Ijcnc050212Ijcnc050212
Ijcnc050212
IJCNCJournal
 
Pseudo-Random Bit Generator Using Chaotic Seed for Cryptographic Algorithm in...
Pseudo-Random Bit Generator Using Chaotic Seed for Cryptographic Algorithm in...Pseudo-Random Bit Generator Using Chaotic Seed for Cryptographic Algorithm in...
Pseudo-Random Bit Generator Using Chaotic Seed for Cryptographic Algorithm in...
IJECEIAES
 
Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...
ijeei-iaes
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Medical image encryption using multi chaotic maps
Medical image encryption using multi chaotic mapsMedical image encryption using multi chaotic maps
Medical image encryption using multi chaotic maps
TELKOMNIKA JOURNAL
 
Ew4301904907
Ew4301904907Ew4301904907
Ew4301904907
IJERA Editor
 
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHYRSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
Qualcomm
 
ASCII Value Based Encryption System (AVB)
ASCII Value Based Encryption System (AVB)ASCII Value Based Encryption System (AVB)
ASCII Value Based Encryption System (AVB)
IJERA Editor
 
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERINGHYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
IJNSA Journal
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity Analysis
IJCERT
 
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 BoardIRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET Journal
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
IOSR Journals
 
User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs
IJECEIAES
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
IJECEIAES
 
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...
IAEME Publication
 
4.report (cryptography & computer network)
4.report (cryptography & computer network)4.report (cryptography & computer network)
4.report (cryptography & computer network)
JIEMS Akkalkuwa
 
Security in Manets using Cryptography Algorithms
Security in Manets using Cryptography AlgorithmsSecurity in Manets using Cryptography Algorithms
Security in Manets using Cryptography Algorithms
IRJET Journal
 

Similar to Encryption Algorithm Using Random Graphs.pptx (20)

561 1530-1-pb (1)
561 1530-1-pb (1)561 1530-1-pb (1)
561 1530-1-pb (1)
 
ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015
 
A new hybrid text encryption approach over mobile ad hoc network
A new hybrid text encryption approach over mobile  ad hoc network A new hybrid text encryption approach over mobile  ad hoc network
A new hybrid text encryption approach over mobile ad hoc network
 
Ijcnc050212
Ijcnc050212Ijcnc050212
Ijcnc050212
 
Pseudo-Random Bit Generator Using Chaotic Seed for Cryptographic Algorithm in...
Pseudo-Random Bit Generator Using Chaotic Seed for Cryptographic Algorithm in...Pseudo-Random Bit Generator Using Chaotic Seed for Cryptographic Algorithm in...
Pseudo-Random Bit Generator Using Chaotic Seed for Cryptographic Algorithm in...
 
Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Medical image encryption using multi chaotic maps
Medical image encryption using multi chaotic mapsMedical image encryption using multi chaotic maps
Medical image encryption using multi chaotic maps
 
Ew4301904907
Ew4301904907Ew4301904907
Ew4301904907
 
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHYRSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
 
ASCII Value Based Encryption System (AVB)
ASCII Value Based Encryption System (AVB)ASCII Value Based Encryption System (AVB)
ASCII Value Based Encryption System (AVB)
 
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERINGHYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity Analysis
 
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 BoardIRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
 
User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
 
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...
 
4.report (cryptography & computer network)
4.report (cryptography & computer network)4.report (cryptography & computer network)
4.report (cryptography & computer network)
 
Security in Manets using Cryptography Algorithms
Security in Manets using Cryptography AlgorithmsSecurity in Manets using Cryptography Algorithms
Security in Manets using Cryptography Algorithms
 

Recently uploaded

06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
Timothy Spann
 
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
John Andrews
 
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
axoqas
 
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdfSample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Linda486226
 
Opendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptxOpendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptx
Opendatabay
 
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
nscud
 
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
pchutichetpong
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
slg6lamcq
 
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
vcaxypu
 
Machine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptxMachine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptx
balafet
 
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
AbhimanyuSinha9
 
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
mbawufebxi
 
Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)
TravisMalana
 
The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...
jerlynmaetalle
 
My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.
rwarrenll
 
standardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghhstandardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghh
ArpitMalhotra16
 
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
slg6lamcq
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
Timothy Spann
 
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
axoqas
 
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Subhajit Sahu
 

Recently uploaded (20)

06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
 
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
 
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
 
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdfSample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
 
Opendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptxOpendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptx
 
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
 
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
 
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
 
Machine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptxMachine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptx
 
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
 
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
 
Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)
 
The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...
 
My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.
 
standardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghhstandardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghh
 
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
 
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
 
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
 

Encryption Algorithm Using Random Graphs.pptx

  • 2. Abstract In this work, we propose an encryption and decryption algorithm in a computer network, using ideas from graph theory and matrices. We attempt to simulate a method in which data can be transferred efficiently post-encryption and study how such an algorithm performs. Random complete graphs consisting of 250 vertices and 31125 edges were created, with randomly chosen start and end nodes to depict the initial source and final destination for data transferred. The algorithm harnesses the idea of a random graph and assigns a multi-dimensional weight to each node. These weights, along with a randomly generated path are used to build an encryption matrix that increases the randomness in the encryption, making it a more robust encryption algorithm. An analysis of the average time taken for which a 16-bit number was encoded, using an M1 2020 Macbook Air was just over 5 milliseconds, relatively fast for a secure algorithm. The algorithm could be improved by having additional parameters, such as increasing the random path length, the number of vertices or even using 3 x 3 matrices, resulting in more data to be encrypted and a more secure system, though this may lead to a trade-off of a longer run time.
  • 3. ● Matrices are a set of elements that are represented as R rows and C columns to form an R × C array. ● Matrix multiplication is known and defined on a square matrix, where R = C ● Matrix multiplication is non- commutative; therefore, the sequence of multiplication matters. We use this property of matrices to generate unique encrypting matrices for our algorithm ● Cybersecurity is the practice of safeguarding systems against vulnerabilities, threats and attacks ● Cryptography is a foundational pillar of cybersecurity. It is the art of securing communication through the manipulation of data and is a process that involves hiding or coding information so that only the recipient (whom the message was intended for) can read it Graphs and Networks Linear Algebra Cybersecurity and Cryptography ● A graph is a set of nodes and edges connected to each other to represent relationships between vertices ● Networks are practical applications of graphs, where the edges and nodes represent real-world relationships between systems
  • 4. Literature Review ● Cryptography is crucial in network security. Recent advanced cryptographic algorithms have enhanced the fields of cloud computing, wireless sensor networks, and on-chip networks, according to Sarkar, Chatterjee, and Chakraborty’s paper, “Role of cryptography in network security”. ● To evaluate the behaviors of networks, concepts from graph theory have been used previously. The importance of techniques like graph sampling and the characterization of network features such as node centrality, densification, and diameter in understanding network vulnerabilities and shifts in network behavior over time have laid the foundations for using graph theory in the field of cybersecurity, in Namayanja and Janeja’s paper, “Characterization of evolving networks for cybersecurity”. ● Various key elements in network security and graph theory can be used to design public key encryption schemes based on matrices generated from a graph or graphical codes, according to Sen Sarma’s paper “Application of graphs in security”. Such schemes can be used to understand and prevent attacks.
  • 5. ● In 2016, Namayanja and Janeja explored the use of analytics to model and evaluate computer network behavior using graph theory concepts, focusing on potential cyber threats, in the paper, ”Characterization of Evolving Networks for Cybersecurity”. ● They highlight the significance of techniques like graph sampling and characterization of network features for understanding network vulnerabilities. ● The paper, ”Network Security and Types of Attacks in Network” tackles security issues in mobile ad-hoc networks (MANETs) due to node independence and malicious activities. ● Pawar and Anuradha introduce network security elements like confidentiality, integrity, and availability, classify major attacks like spoofing, and emphasize securing individual computers and network communication channels. Cryptography Graph Theory Networks Network Security ● Sarkar, Chatterjee, and Chakraborty talked about the,”Role of Cryptography in Network Security” in 2020, exploring the role of cryptography in network security, focusing on encryption and decryption techniques. ● It categorizes techniques into symmetric- key, asymmetric-key, and authentication, and discusses recent advanced cryptographic algorithms for cloud computing, wireless sensor networks, and on-chip networks. ● The publication provides an understanding of secure network communication and the importance of cryptography in maintaining data confidentiality.
  • 6. ● The research paper, ”A Survey on Cryptography Algorithms”, published in 2018, provides a comparative study of various cryptography encryption and decryption algorithms, such as AES, DES and RSA. ● Abood and Guirguis explore these systems by analyzing the benefits and drawbacks of factors such as security, effectiveness, and time. ● We find out that symmetric algorithms are faster than asymmetric ones, and AES is the most reliable algorithm in terms of speed, decoding, complexity, flexibility, and more. ● The paper, ”Network Security and Types of Attacks in Network” tackles security issues in mobile ad-hoc networks (MANETs) due to node independence and malicious activities. ● Pawar and Anuradha introduce network security elements like confidentiality, integrity, and availability, classify major attacks like spoofing, and emphasize securing individual computers and network communication channels. Graphs in Security Cryptography Algorithms Network Security ● In the 2019 research paper, ”Application of Graphs in Security’, Sensarma and Sarma explore the concepts of cryptography and graph theory to design and propose two public key encryption schemes: 1. Focuses on matrices generated from a graph 2. Focuses on properties of graphical codes.
  • 7. ● The paper by Hogan, Johnson, and Halappanavar, ”Graph coarsening for pathfinding in cybersecurity graphs”, published in 2013 employs graph coarsening to detect hackers using “Pass- the- Hash Attacks” and assess network risk by repeatedly contracting edges to identify high-risk paths. ● The 2017 paper discussing the ‘Advanced Encryption Standard Algorithm To Encrypt and Decrypt Data’, Abdullah explains the AES algorithm as a symmetric block cipher algorithm and details the algorithm’s process of transforming data through a series of rounds. ● Involves applying substitutions, permutations, and bitwise operations to protect sensitive information. Graph Theory Encryption Algorithm Method for Path Finding in Cybersecurity Graphs Encryption and Decryption of Data ● In the paper written in 2014, ”Encryption Algorithm Using Graph Theory”, Al Eitawi proposes a new symmetric encryption algorithm based on graph theory properties such as cycle graphs and complete graphs. ● The algorithm is based on the foundation of data being represented as vertices, creating a cycle graph, with weighted edges according to an encoding table. After that, it builds a complete graph, determines the minimum spanning tree, and carries out matrix operations for encryption and decryption.
  • 8. We define the following variables: V = Total number of vertices, L = Path length How do we know that 1.28 × 1019 paths in a network is secure enough? A 9-character ASCII passcode has 1289 possible combinations. According to the Cyber Security Agency of Singapore, a password of this nature would take approximately 3 years to break into the system. Since our network exceeds the number of possible combinations in a 9-character password threshold, we know it would take longer than 3 years, meeting our security criteria. To check the number of random paths, we calculate the number of permutations, considering the order of selection and without repetition. This is done by subtracting 2 from the total vertices and the path length since the starting and ending nodes are already randomly assigned, and we want to calculate the number of ways to arrange the remaining vertices along the path. Number of Random Paths
  • 9. Procedure: Creating Random Graph 1. Initially, a network is created using a complete graph of 250 nodes, and 31125 edges between them. 2. Next, a random path is created between two randomly chosen nodes, with a fixed path length of 10 in the graph. Fig 1. An example graph with 30 nodes and 100 edges
  • 10. Procedure: Product Matrix 1. 250 2 × 2 predefined matrices, A1, A2, A3 … A249, A250 are put into a list. 2 × 2 matrices are chosen due to their enhanced comprehension efficiency through the organization of data into categories, therefore being computationally less intensive while providing an optimal level of security. 2. Based on the random path taken, a product matrix is created by choosing N numbers of Ai from this list where i is 1 ≤ i ≤ 250, where N represents the number of elements from the list and the number of vertices in the random path. 3. For each i that represents a node in the random path, starting from the first node to the Nth node, we multiply the Ai in sequence to obtain the product matrix. Together, the matrices multiplied to obtain the product matrix are represented as the sub-keys to the encryption key.
  • 11. Procedure: Encryption and Decryption 1. The user defines a input data to be a 2x2 matrix. 2. To encrypt this data, we multiply the product matrix and the input data. This encrypted 2x2 matrix is obfuscated and original data cannot be obtained without the decryption key. 3. The decryption algorithm takes place by multiplying the inverse of the product matrix by the encrypted data to get back the original input data. 4. To verify that the algorithm works, we subtracted the decrypted data from the original input data to see if the resulting matrix is a zero matrix. If this works, the algorithm is a success.
  • 13. Results (Sample Output 1) ● In this sample case, the input data matrix was [-4 5] [6 5]. ● A path was randomly generated, with the start and end nodes being 14 and 83 respectively. In the path, the 14th, 47th, 94th, 36th, 25th, 15th and 83rd vertices were chosen, therefore the corresponding predefined matrices were multiplied together in that order. ● This final product matrix is multiplied with the input data, to obtain the encrypted data. Finally, we multiply the inverse of the final product matrix by encrypted data to return the decrypted data.
  • 14. Results (Case of Final Product Matrix = 0) ● In this output, the inputted data was also kept as [-4 5] [6 5]. ● A path was randomly generated, with the start and end nodes being 44 and 18 respectively. In the path, the 44th, 61st, 12th, 51st, 3rd, 69th and 18th vertices were chosen, therefore the corresponding predefined matrices were multiplied together in that order. ● Since the determinant of the product matrix, add a randomly predefined matrix (in this case [1 6] [4 5]). ● This final product matrix is multiplied with the original data, to obtain the encrypted data. Finally, we multiplying the inverse of the final product matrix by encrypted data to return the decrypted data.
  • 15. Data Analysis: Performance An analysis of the average time taken for the encryption and decryption algorithm to execute for I iterations was carried out by repeating the 50 iteration cycle 10 times, in order to obtain a more precise result. The mean time taken is approximately 5.43 milliseconds, which is relatively fast for a secure encryption and decryption algorithm. In these trials, a 16 bit number was encoded, using an M1 2020 Macbook Air.
  • 16. Data Analysis: Error and Special Cases If during the process of obtaining the product matrix, the product of two of the predefined matrices results in a zero matrix, then the final product matrix would be a zero matrix itself, meaning that the encrypted data would also be a zero matrix. For such a matrix, the inverse would not exist as it’s determinant is 0 and so, the encrypted data cannot be decrypted.Therefore, if the product matrix is a 0 matrix, we add a random predefined 2x2 matrix to the product matrix, so that it can encrypt and decrypt. If one of the predefined matrices is a zero matrix and the multiplication of matrices in the random path end up as zero matrix, the random matrix chosen for addition excludes the zero matrix from the set of total predefined matrices, so that the zero matrix is not added.
  • 17. Summary and Conclusion ● In this paper, we explored the idea of using random graphs to create an effective encryption and decryption algorithm, addressing all possible input scenarios. ● The model leverages linear algebra concepts, specifically matrices, to represent data, bridging theoretical concepts and practical applications in encryption and decryption. ● The success of the algorithm is proved by an efficient execution time, of just over 5 milliseconds. ● As technology advances and becomes more widely and rapidly utilized, the number of security and data breaches has been increasing year upon year, hence the increasing importance of cybersecurity. ● Therefore, an algorithm of this nature enhances data security and serves as a foundation for advancement in newer encryption algorithms in the future.
  • 18. Summary and Conclusion: Improvements ● The model could be improved by including additional graph theory parameters such as the following; ○ increasing the random path length ○ increasing the total number of vertices in the network, resulting in a more secure system, though this may lead to a trade-off of a longer run time. ● Using 3 x 3 matrices would allow for more data to be encrypted in each run of the algorithm. ● Exploring whether such an algorithm can have successful implementation of securely encrypting big data.
  • 19. References G Yee. Optimal security protection for sensitive data. International Journal on Advances in Security, 11(1&2):80–90, 2018. R.A. Kemmerer. Cybersecurity. In 25th International Conference on Software Engineering, 2003. Proceedings., pages 705–715, 2003. VV Iashchenko. Cryptography: An Introduction: An Introduction. Number 18. American Mathematical Soc., 2002. Chengdong Tao, Adama Diene, Shaohua Tang, and Jintai Ding. Simple matrix scheme for encryption. In Post-Quantum Cryptography: 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings 5, pages 231–242. Springer, 2013. Network topology matrices. https://www.tutorialspoint.com/network theory/networktheorytopology matrices.htm. Remco Van Der Hofstad. Random graphs and complex networks. Available on http://www. win. tue. nl/rhofstad/NotesRGCN. pdf, 11:60, 2009. Georgi E Shilov. Linear algebra. Courier Corporation, 2012. Omar G Abood and Shawkat K Guirguis. A survey on cryptography algorithms. International Journal of Scientific and Research Publications, 8(7):495–516, 2018. Anindita Sarkar, Swagata Roy Chatterjee, and Mohuya Chakraborty. Role of cryptography in network security. The” Essence” of Network Security: An End-to-End Panorama, pages 103–143, 2021. Josephine M Namayanja and Vandana P Janeja. Characterization of evolving networks for cybersecurity. Information Fusion for CyberSecurity Analytics, pages 111–127, 2017. Mohan V Pawar and J Anuradha. Network security and types of attacks in network. Procedia Computer Science, 48:503–506, 2015. Debajit Sensarma and Samar Sen Sarma. Application of graphs in security. International Journal of Innovative Technology and Exploring Engineering, 8(10):2273–2279, 2019. Emilie Hogan, John R Johnson, and Mahantesh Halappanavar. Graph coarsening for path finding in cybersecurity graphs. In Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, pages 1–4, 2013. Ako Muhamad Abdullah et al. Advanced encryption standard (aes) algorithm to encrypt and decrypt data. Cryptography and Network Security, 16(1):11, 2017. Wael Mahmoud Al Etaiwi. Encryption algorithm using graph theory. Journal of scientific research and reports, 3(19):2519–2527, 2014. P Amudha, AC Charles Sagayaraj, and AC Shantha Sheela. An application of graph theory in cryptography. International Journal of Pure and Applied Mathematics, 119(13):375–383, 2018. Password checker. https://www.csa.gov.sg/Tips-Resource/Interactive-Tools/Password-Checker. Alexander Craig Aitken. Determinants and matrices. Read Books Ltd, 2017. Naveen Kumar. Today’s importance of cybersecurity. PhD thesis, Utica College, 2014.