Mathematics

Permanent URI for this collectionhttp://repository.kln.ac.lk/handle/123456789/2408

Browse

Search Results

Now showing 1 - 2 of 2
  • Thumbnail Image
    Item
    Maximal embedding genus of 3-edge connected harary graphs
    (Faculty of Science, University of Kelaniya Sri Lanka, 2023) Withanaarachchi, W.A.K.D.H.; Almeida, S.V.A.; Wijesiri, G.S.
    One of the most prominent problems of topological graph theory is to determine the type of surface a nonplanar graph can be embedded. Almost complete results have been obtained for 4-edge connected graphs. The methods that were used to obtain specific results (finding the maximum and minimum genus embedding) for 4-edge connected graphs do not generalise for 3-edge connected graphs. Graph embedding is an important representational technique that aims to maintain the structure of a graph while learning low-dimensional representations of its vertices. The aim of this research project was to study the embedding of 3-edge connected Harary graphs H3,n. Specifically to complete the problem of maximal embeddings of 3-edge connected Harary graphs. The result is proved using Jungerman’s study, which showed that for any graph, is upper-embeddable if and only if it has a spanning tree T such that has at most one component with an odd number of edges. More specifically, a spanning tree for each graph was observed by dividing all 3-edge connected Harary graphs into two groups: odd number of vertices and even number of vertices. The pattern of a set of deleting edges and corresponding spanning trees was generalised in both cases. It was proved that H3,n is upper-embeddable, and the maximum genus of H3,n is given by for each n, by analysing the odd components of the complement of the corresponding spanning trees.
  • Thumbnail Image
    Item
    An application of graph theory in asymmetric key cryptography
    (Faculty of Science, University of Kelaniya Sri Lanka, 2023) Fernando, K.K.N.; Wijesiri, G.S.
    The development of digital communication in many facets of our everyday lives significantly impacts the evolving world we live in today. The rapid growth and evolution of digital communication have become the backbone of how we interact with other people. Therefore, it is imperative to protect information and data from unauthorised activities, such as accessing, using, exposing, damaging, modifying, copying, or deleting them. Safeguarding data from these invalid operations is crucial to ensure its integrity, confidentiality, and availability. Cryptography plays a pivotal role in ensuring the security and privacy of information in various contexts, such as online banking, e-commerce transactions, and communication between governments, military organisations, and businesses. Various types of mathematical techniques are available for application in modern cryptology. The application of graph theory is widely utilised in the field of cryptography due to its straightforward representation in computers as a matrix. In this study, we propose a novel asymmetric key cryptography scheme for secure message transmission using graph theory and matrices. The proposed scheme consists of four algorithms. The key generation algorithm on the receiver side is based on the properties of matrices, which enables us to establish the relationship between private key and public key through matrix operations. On the sender-side graph generation algorithm, a graph theory approach is applied to encrypt the original message, and the message is converted into a splitting graph and its minimum spanning tree. Then, the sender-side encryption algorithm is used to generate a complex final ciphertext using the receiver’s public key. The decryption algorithm follows the same process in reverse order, employing the receiver’s private key. This system will provide better security while storing data in the financial retail industry and sharing passwords in transactions.