Digital Repository

Symmetric key encryption and decryption using graph theory

Show simple item record

dc.contributor.author Fernando, K. K. N.
dc.contributor.author Wijesiri, G. S.
dc.date.accessioned 2023-11-08T05:09:45Z
dc.date.available 2023-11-08T05:09:45Z
dc.date.issued 2023
dc.identifier.citation Fernando K. K. N.; Wijesiri G. S. (2023) Symmetric key encryption and decryption using graph theory, Proceedings of the International Conference on Applied and Pure Sciences (ICAPS 2023-Kelaniya) Volume 3, Faculty of Science, University of Kelaniya Sri Lanka. Page 100. en_US
dc.identifier.uri http://repository.kln.ac.lk/handle/123456789/26935
dc.description.abstract In the twenty-first century, mathematical proficiency is crucial due to the widespread exchange of data and efficient communication across diverse fields. Data security employs encryption and various mathematical techniques to protect information systems. It safeguards against unwanted access, use, and damage. Graph theory is widely applied in the field of cryptography because a graph can be easily represented as a matrix on computers. The goal of this study is to make a novel connection between private key cryptography and graph theory principles that will safeguard data from unauthorized parties. In the encryption process, the original texts are converted into ciphertext by representing a splitting graph and using a minimum spanning tree, then computed into an adjacency matrix of ciphertext and partitioned it into a block matrix. Finally, obtained the resultant ciphertext using the receiver’s private key. The decryption process follows a similar stage in reverse order. This suggested encryption algorithm demonstrates a new scheme for more complexity and security. The resulting ciphertext size is larger than the plaintext size and checked its validity. en_US
dc.publisher Faculty of Science, University of Kelaniya Sri Lanka en_US
dc.subject Cryptography, Decryption, Encryption, Graph Theory, Symmetric key Cryptography. en_US
dc.title Symmetric key encryption and decryption using graph theory en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search Digital Repository


Browse

My Account