Published April 30, 2024
| Version CC BY-NC-ND 4.0
Journal article
Open
Some Algorithms of Graph Theory in Cryptology
- 1. Department of Mathematics and Statistics, Mohan Lal Sukhadia University, Udaipur (Rajasthan) India.
Description
Abstract: The inventive use of concepts from Graph Theory plays a significant role in hiding the original Plain-text for resulting in a significantly safe data transfer. In this work, the tree traversal algorithms like Inorder, Preorder, Postorder, Kruskal’s algorithm for making minimal spanning tree and the modified graph labelling scheme of graceful labelling allowing repetition of exactly one vertex label for certain graphs, have been employed to create highly hidden Cipher-texts. Encryption and decryption algorithms for all these methods are being presented in this work.
Files
A116704010424.pdf
Files
(592.3 kB)
Name | Size | Download all |
---|---|---|
md5:8168eaef5e2ae9129975ef25e7391b72
|
592.3 kB | Preview Download |
Additional details
Identifiers
- DOI
- 10.54105/ijam.A1167.04010424
- EISSN
- 2582-8932
Dates
- Accepted
-
2024-04-15Manuscript received on 27 February 2024 | Revised Manuscript received on 06 March 2024 | Manuscript Accepted on 15 April 2024 | Manuscript published on 30 April 2024
References
- Kolman B., Busby R.C. and Ross S.C. (2002) Discrete Mathematical Structures, Pearson Education India, Delhi, India.
- Katz J, (2003), "Binary Tree Encryption: Constructions and Applications", International Conference on Information Security and Cryptology – ICISC 2003, Part of the Lecture Notes in Computer Science book series, 1-11, Springer Link. https://doi.org/10.1007/978- 3-540-24691-6_1
- Auparajita Krishnaa and M.S. Dulawat (2011), "Study of the Effect of the Repeated Vertex Labels", Ultra Scientist of Physical Sciences, 23 (1), 176-180.
- Shoba M Shanmugam (2017), "Cryptographic Techniques using Binary Tree and Tree Traversal", International Journal of Scientific Research in Science and Technology, Vol 3, Issue 1, 175-180
- Sivakumar T., Humshavarthini K, Jayasree M and Eswaran M (2017), "Data Encryption Using Binary Tree Traversal (DEBTT)",
- International Journal of Advanced Technology in Engineering and Scince, vol 5, issue no. 04, 353-362.
- Aupaarajita Krishnaa (2019) "Inner magic and inner antimagic graphs in cryptography", Journal of Discrete Mathematical Sciences and Cryptography, 22 (4), 1057-1066, https://doi.org/10.1080/09720529.2019.1675298
- Auparajita Krishnaa (2021), "Certain Specific Graphs in Cryptography", Advances and Applications in Discrete Mathematics, 26(2), 157-177.. https://doi.org/10.17654/DM026020157
- Auparajita Krishnaa (2022), "Lattices in Cryptology", Aryabhatta Journal of Mathematics and Informatics, 14(1), 111-124. https://doi.org/10.5958/2394-9309.2022.00063.4
- Auparajita Krishnaa and Dharmendra Kumar Gurjar (2023), "The Concept of Basic Cipher Text for Enhancing Security in the Algorithms of Cryptography Applications Using Labelled Graphs", International Journal of Scientific Research in Mathematical and Statistical Sciences,10(3), 09-13.