Abstract

Background/Objective: The Coronavirus Covid-19 has affected almost all the countries and millions of people got infected and more deaths have been reported everywhere. The uncertainty and fear created by the pandemic can be used by hackers to steal the data from both private and public systems. Hence, there is an urgent need to improve the security of the systems. This can be done only by building a strong cryptosystem. So many researchers started embedding different topics of mathematics like algebra, number theory, and so on in cryptography to keep the system, safe and secure. In this study, a cryptosystem using graph theory has been attempted, to strengthen the security of the system. Method: A new graph is constructed from the given graph, known as a double vertex graph. The edge labeling of this double vertex graph is used in encryption and decryption. Findings: A new cryptosystem using the amalgamation of the path, its double vertex graph and edge labeling has been proposed. From the double vertex graph of a path, we have given a method to find the original path. To hack such an encrypted key, the knowledge of graph theory is important, which makes the system stronger. Applications:The one-word encryption method will be useful in every security system that needs a password for secure communication or storage or authentication. Keywords: Double vertex graphs; path; adjacency matrix; encryption; cryptography

Highlights

  • All the communications, whether it is social, business, or any other networking are done using digital technology

  • The graph theory technique is used in cryptography to strengthen the security of data transmission, as the knowledge of graph theory is very important for the decryption of any ciphertext[2,6]

  • We first introduce an encryption algorithm based on a double vertex graph of a path

Read more

Summary

Introduction

Whether it is social, business, or any other networking are done using digital technology. The hackers have started using this unprecedented opportunity of chaos and panic to wield social, economic, and financial crises for their gain[1] Whether it is a private or public system, there is an urgent need to protect the data from these hackers, by improving the security of the systems. Cryptography is a technique used for protecting information and communications by using some secret codes so that the information is known only to the receiver and the sender It plays an important role in updating and making a system more secure. The graph theory technique is used in cryptography to strengthen the security of data transmission, as the knowledge of graph theory is very important for the decryption of any ciphertext[2,6]. A new cryptosystem using the amalgamation of paths, its double vertex graph and edge labelling has been proposed

Preliminaries
Main Results
Encryption algorithm
Decryption algorithm
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.