AN ENCRYPTION ALGORITHM EMPLOYING GRAPHS

With the advancement of technology, maintaining secrecy is a crucial concern that requires a variety of skills. A scientific method for protecting communication against unauthenticated access is cryptography. In cryptography, there are several encryption techniques for data security. It has been sug...

Full description

Saved in:
Bibliographic Details
Main Authors: Bipanchy Buzarbarua, Parismita Phukan, Mridusmita Das, Bikash Barman
Format: Article
Language:English
Published: Institute of Mechanics of Continua and Mathematical Sciences 2024-09-01
Series:Journal of Mechanics of Continua and Mathematical Sciences
Subjects:
Online Access:https://jmcms.s3.amazonaws.com/wp-content/uploads/2024/09/12081651/jmcms-2409010-An-Encryption-Algorithm-Employing-Graphs-BB-MD.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850262338528083968
author Bipanchy Buzarbarua
Parismita Phukan
Mridusmita Das
Bikash Barman
author_facet Bipanchy Buzarbarua
Parismita Phukan
Mridusmita Das
Bikash Barman
author_sort Bipanchy Buzarbarua
collection DOAJ
description With the advancement of technology, maintaining secrecy is a crucial concern that requires a variety of skills. A scientific method for protecting communication against unauthenticated access is cryptography. In cryptography, there are several encryption techniques for data security. It has been suggested that new nonstandard encryption techniques are needed to shield communication from conventional threats. This work presents a method that uses graphs together with some algebraic features to provide some new encryption techniques for safe message transfer. The transmission of secret communications will be safer because of the suggested encryption techniques.
format Article
id doaj-art-4c0ee9f9d2ba41a28c17edb803e21bfb
institution OA Journals
issn 0973-8975
2454-7190
language English
publishDate 2024-09-01
publisher Institute of Mechanics of Continua and Mathematical Sciences
record_format Article
series Journal of Mechanics of Continua and Mathematical Sciences
spelling doaj-art-4c0ee9f9d2ba41a28c17edb803e21bfb2025-08-20T01:55:12ZengInstitute of Mechanics of Continua and Mathematical SciencesJournal of Mechanics of Continua and Mathematical Sciences0973-89752454-71902024-09-011991117https://doi.org/10.26782/jmcms.2024.09.00002AN ENCRYPTION ALGORITHM EMPLOYING GRAPHSBipanchy Buzarbarua0Parismita Phukan1Mridusmita Das2Bikash Barman3Department of Mathematics, Cotton University, Assam, India.Department of Mathematics, Assam Royal Global University, Assam, India.Department of Mathematics, Cotton University, Assam, India.Department of Mathematics, Assam Engineering College, Assam, India.With the advancement of technology, maintaining secrecy is a crucial concern that requires a variety of skills. A scientific method for protecting communication against unauthenticated access is cryptography. In cryptography, there are several encryption techniques for data security. It has been suggested that new nonstandard encryption techniques are needed to shield communication from conventional threats. This work presents a method that uses graphs together with some algebraic features to provide some new encryption techniques for safe message transfer. The transmission of secret communications will be safer because of the suggested encryption techniques.https://jmcms.s3.amazonaws.com/wp-content/uploads/2024/09/12081651/jmcms-2409010-An-Encryption-Algorithm-Employing-Graphs-BB-MD.pdfcryptographydecryptionencryptionstar graph
spellingShingle Bipanchy Buzarbarua
Parismita Phukan
Mridusmita Das
Bikash Barman
AN ENCRYPTION ALGORITHM EMPLOYING GRAPHS
Journal of Mechanics of Continua and Mathematical Sciences
cryptography
decryption
encryption
star graph
title AN ENCRYPTION ALGORITHM EMPLOYING GRAPHS
title_full AN ENCRYPTION ALGORITHM EMPLOYING GRAPHS
title_fullStr AN ENCRYPTION ALGORITHM EMPLOYING GRAPHS
title_full_unstemmed AN ENCRYPTION ALGORITHM EMPLOYING GRAPHS
title_short AN ENCRYPTION ALGORITHM EMPLOYING GRAPHS
title_sort encryption algorithm employing graphs
topic cryptography
decryption
encryption
star graph
url https://jmcms.s3.amazonaws.com/wp-content/uploads/2024/09/12081651/jmcms-2409010-An-Encryption-Algorithm-Employing-Graphs-BB-MD.pdf
work_keys_str_mv AT bipanchybuzarbarua anencryptionalgorithmemployinggraphs
AT parismitaphukan anencryptionalgorithmemployinggraphs
AT mridusmitadas anencryptionalgorithmemployinggraphs
AT bikashbarman anencryptionalgorithmemployinggraphs
AT bipanchybuzarbarua encryptionalgorithmemployinggraphs
AT parismitaphukan encryptionalgorithmemployinggraphs
AT mridusmitadas encryptionalgorithmemployinggraphs
AT bikashbarman encryptionalgorithmemployinggraphs