Authors:
Bipanchy Buzarbarua,Parismita Phukan,Mridusmita Das,Bikash Barman,DOI NO:
https://doi.org/10.26782/jmcms.2024.09.00002Keywords:
Cryptography,Decryption,Encryption,Star Graph,Abstract
With the advancement of technology, maintaining secrecy is a crucial concern that requires a variety of skills. A scientific method for protecting communication against unauthenticated access is cryptography. In cryptography, there are several encryption techniques for data security. It has been suggested that new nonstandard encryption techniques are needed to shield communication from conventional threats. This work presents a method that uses graphs together with some algebraic features to provide some new encryption techniques for safe message transfer. The transmission of secret communications will be safer because of the suggested encryption techniques.Refference:
I. Baizhu N., Rabiha Q., Shafiqur R., and Ghulam F., : “Some Graph-Based EncryptionSchemes”, Journal of Mathematics, vol. 2021, no. 6, 2021, 10.1155/2021/6614172.
II. Burton D.M. Elementary Number Theory, 6th Edition, New Delhi:Tata McGraw-Hill Publishing Company Limited, 2007.
III. Chandrasekaran V. M., Praba B., Manimaran A. and Kailash G., : “Data transfer using complete bipartite graph.” IOP Conf. Ser.: Mater. Sci. Eng.,vol. 263, no 4, 2017, 10.1088/1757-899X/263/4/042120.
IV. Charles D. X., Lauter K. E., and Goren E. Z., : “Cryptographic Hash Functionsfrom Expander Graphs.” J Cryptol, vol. 22, 2009, 10.1007/s00145-007-9002-x
V. Harary F. Graph theory, Addison-Wesley Publishing Company, Inc., Reading, Mass., 1969.
VI. Hu J., Liang J., and Dong S., : “A bipartite graph propagation approach for mobile advertising fraud detection.” Mobile Information Systems, vol. 2017, pp. 12, 2017.
VII. Priyadarsini P.L.K., : “A Survey on some Applications of Graph Theory in Cryptography”. Journal of Discrete Mathematical Sciences and Cryptography, vol. 18, 2015, 18. 209-217. 10.1080/09720529.2013.878819.
VIII. Rosen K. H., Elementary Number theory and its Applications, 5th edition, USA, AddisonWesley, 2005.
IX. Selim G. A., : “How to encrypt a graph, International Journal of Parallel.” Emergent and Distributed Systems, vol. 35(6) pp. 668–681, 2020, 10.1080/09720529.2013.878819
X. Sharma A. K. and Mittal S. K., : “Cryptography & Network Security Hash Function Applications, Attacks and Advances: A Review.” Third International Conference on Inventive Systems and Control (ICISC), Coimbatore, India, 2019, pp. 177-188. 10.1109/ICISC44355.2019.9036448.
XI. Sinha D. and Sethi A., “Encryption using network and matrices through signed graphs.” International Journal of Computer Applications, vol. 138(4) pp. 6–13, 2016. 10.5120/ijca2016908780