Please use this identifier to cite or link to this item: http://repository.kln.ac.lk/handle/123456789/27171
Title: An application of graph theory in asymmetric key cryptography
Authors: Fernando, K.K.N.
Wijesiri, G.S.
Keywords: Asymmetric Cryptography, Cipher text, Cryptography, Decryption, Encryption
Issue Date: 2023
Publisher: Faculty of Science, University of Kelaniya Sri Lanka
Citation: Fernando K.K.N.; Wijesiri G.S., (2023), An application of graph theory in asymmetric key cryptography, proceedings of the postgraduate institute of Science Research Congress, postgraduate institute of Science Research Congress, Sri Lanka,
Abstract: The development of digital communication in many facets of our everyday lives significantly impacts the evolving world we live in today. The rapid growth and evolution of digital communication have become the backbone of how we interact with other people. Therefore, it is imperative to protect information and data from unauthorised activities, such as accessing, using, exposing, damaging, modifying, copying, or deleting them. Safeguarding data from these invalid operations is crucial to ensure its integrity, confidentiality, and availability. Cryptography plays a pivotal role in ensuring the security and privacy of information in various contexts, such as online banking, e-commerce transactions, and communication between governments, military organisations, and businesses. Various types of mathematical techniques are available for application in modern cryptology. The application of graph theory is widely utilised in the field of cryptography due to its straightforward representation in computers as a matrix. In this study, we propose a novel asymmetric key cryptography scheme for secure message transmission using graph theory and matrices. The proposed scheme consists of four algorithms. The key generation algorithm on the receiver side is based on the properties of matrices, which enables us to establish the relationship between private key and public key through matrix operations. On the sender-side graph generation algorithm, a graph theory approach is applied to encrypt the original message, and the message is converted into a splitting graph and its minimum spanning tree. Then, the sender-side encryption algorithm is used to generate a complex final ciphertext using the receiver’s public key. The decryption algorithm follows the same process in reverse order, employing the receiver’s private key. This system will provide better security while storing data in the financial retail industry and sharing passwords in transactions.
URI: http://repository.kln.ac.lk/handle/123456789/27171
Appears in Collections:Mathematics

Files in This Item:
File Description SizeFormat 
S 7.pdf356.54 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.