scispace - formally typeset
Journal ArticleDOI

Fundamental circuits and cut-sets used in cryptography

R. Selvakumar, +1 more
- 01 Jul 2012 - 
- Vol. 15, pp 287-301
TLDR
This paper presents an innovative algorithm for encryption and decryption using connected graphs, which leads to more secure data transfer.
Abstract
Many network applications involve data transfer; therefore there is a need to have a secure network, which can be achieved through the use of cryptography In this paper, we present an innovative algorithm for encryption and decryption using connected graphs Message represented by a connected graph can be encrypted by using a spanning tree of the graph Any message represented in the graph is either on a branch or on a chord with respect to the spanning tree Depending whether it is a branch or a chord graph theorems are applied to the spanning tree for both encryption and decryption purposes This approach used to encrypt leads to more secure data transfer

read more

Citations
More filters
Journal ArticleDOI

The elliptic scalar multiplication graph and its application in elliptic curve cryptography

TL;DR: In this article, a new graph has been defined as a main point to design a new version of an asymmetric encryption scheme, which is formed based on the scalar multiplication operation on elliptic surfaces.
Journal ArticleDOI

Some Graph-Based Encryption Schemes

TL;DR: This paper proposes some new encryption algorithms for secure transmission of messages using some special corona graphs and bipartite graph along with some algebraic properties to lead to more secure communication of secret messages.
Journal ArticleDOI

Secure Communication over Trellis Using Fundamental Cut-set and Fundamental Circuits☆

TL;DR: A reliable and secure communication system which provides reliability by the Error Correction Techniques and Security by the graph based Cryptosystem is proposed and intruder's access to the information can be avoided.
Journal ArticleDOI

Inner magic and inner antimagic graphs in cryptography

TL;DR: This work discusses the application of inner magic and inner antimagic labeled graphs in data transfer for greater security.
References
More filters
Book

Graph theory

Frank Harary
Journal ArticleDOI

Graph theory with applications to engineering and computer science

TL;DR: Graph Theory and Its Applications to Problems of Society and its Applications to Algorithms and Computer Science.
Proceedings ArticleDOI

Introduction to Cryptography

TL;DR: In today's world of communications it is very necessary to implement some kind of security, whether it is implemented through hardware like FPGAs, μ-Controllers, or through software in your PCs.
Journal ArticleDOI

Graph Theory and the Amateur Cryptographer

TL;DR: In the decryption of codes and ciphers, problems arise from time to time which can be expressed in graph theoretical terms, and sometimes these graph problems can suggest concepts which are not only nontrivial but which may even be of some interest.
Related Papers (5)