Skip to main content

Generated Graph for Text Encryption Algorithm Based on BRHC Curve

  • Conference paper
  • First Online:
Proceedings of Second International Conference on Intelligent System (ICIS 2023)

Part of the book series: Algorithms for Intelligent Systems ((AIS))

Included in the following conference series:

  • 43 Accesses

Abstract

Recently with the increased usages of Internet and other digital communication tools, cryptography became a major area of research and development in order to facilitate the secure flow of data between two or more entities, particularly when the data being communicated are considered to be vital or essential. Even though there are a large number of available encryption, there is a growing demand for non-standard encryption techniques to prevent any conventional data espionage methods. Using concepts from graph theory, the proposed method is a one-of-a-kind encryption algorithm that can securely encrypt and decrypt the data. Combining the principles of cycle graph, full graph, and spanning tree, the innovative symmetric encryption approach generates a complex ciphertext with a shared secret key.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Corman, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms, 2nd edn. McGraw-Hill

    Google Scholar 

  2. Yamuna, M., Gogia, M., Sikka, A., Khan, M.J.H.: Encryption using graph theory and linear algebra. Int. J. Comput. Appl. (2012). ISSN: 2250-1797

    Google Scholar 

  3. Ustimenko, V.A.: On graph-based cryptography and symbolic computations. Serdica J. Comput. 131–156 (2007)

    Google Scholar 

  4. Paszkiewicz, A., et al.: Proposals of graph based ciphers, theory and implementations. ResearchGate

    Google Scholar 

  5. Lu, S., Ostrovsky, R., Manchala, D.: Visual cryptography on graphs. In: CiteSeerx, COCOON, p. 225 (2008)

    Google Scholar 

  6. Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)

    Article  MathSciNet  Google Scholar 

  7. ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469–472 (1985)

    Article  MathSciNet  Google Scholar 

  8. Al Etaiwi, W.M.: Encryption algorithm using graph theory. J. Sci. Res. Rep. 2519–2527 (2014)

    Google Scholar 

  9. Agarwal, S., Uniyal, A.S.: Prime weighted graph in cryptographic system for secure communication. Int. J. Pure Appl. Math. 105(3), 325–338 (2015)

    Google Scholar 

  10. Shen, A., Tong, R., Deng, Y.: Application of classification models on credit card fraud detection. In: 2007 International Conference on Service Systems and Service Management, pp. 1–4 (2007)

    Google Scholar 

  11. Aljamaly, K., Ajeena, R.: Undirected complete graph to design new public key cryptosystem. J. Phys. Conf. Ser. 1897(1) (2021). IOP Publishing

    Google Scholar 

  12. Jasim, T.H., Abed, S.A., Ghazi, A.: Concepts of bi-supra topological space via graph theory. Wasit J. Comput. Math. Sci. 1(2) (2022)

    Google Scholar 

  13. Kalaivani, N., Rahman, K.F.U., Obaid, A.J.: GSβ-compactness of topological spaces with grills. In: Peng, S.L., Lin, C.K., Pal, S. (eds.) Proceedings of 2nd International Conference on Mathematical Modeling and Computational Science. Advances in Intelligent Systems and Computing, vol. 1422. Springer, Singapore (2022). https://doi.org/10.1007/978-981-19-0182-9_56

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ruma Kareem K. Ajeena .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

AlKfari, B.H.A., Ajeena, R.K.K. (2024). Generated Graph for Text Encryption Algorithm Based on BRHC Curve. In: Tavares, J.M.R.S., Pal, S., Gerogiannis, V.C., Hung, B.T. (eds) Proceedings of Second International Conference on Intelligent System. ICIS 2023. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-99-8976-8_6

Download citation

Publish with us

Policies and ethics