A multi layered encryption framework using intuitionistic fuzzy graphs and graph theoretic domination for secure communication networks

Abstract Secure communication is essential in today’s rapidly evolving digital environment, and strong encryption methods are required to protect private data from unwanted access. The aim of this study is to strengthen the security and complexity of encrypted communications by adopting a new form o...

Full description

Saved in:
Bibliographic Details
Main Authors: A. Meenakshi, S. Dhanushiya, Leo Mrsic, Antonios Kalampakas, Sovan Samanta
Format: Article
Language:English
Published: Nature Portfolio 2025-07-01
Series:Scientific Reports
Subjects:
Online Access:https://doi.org/10.1038/s41598-025-01924-0
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849238644834959360
author A. Meenakshi
S. Dhanushiya
Leo Mrsic
Antonios Kalampakas
Sovan Samanta
author_facet A. Meenakshi
S. Dhanushiya
Leo Mrsic
Antonios Kalampakas
Sovan Samanta
author_sort A. Meenakshi
collection DOAJ
description Abstract Secure communication is essential in today’s rapidly evolving digital environment, and strong encryption methods are required to protect private data from unwanted access. The aim of this study is to strengthen the security and complexity of encrypted communications by adopting a new form of cryptographic encryption technique based on the principles of an intuitionistic fuzzy graph. Key graph-theoretic measures, such as domination number, vertex categorization (alpha-strong, beta-strong, and gamma-strong), vertex order coloring, and chromatic number, play important roles in this process. Domination number finds the key vertices of the network, while vertex strength categorization and fuzzy graph coloring provide multiple encryption layers, hence the encoded message is highly resistant to decryption unless a proper key is used. The chromatic number offers further security through various patterns of vertex coloring. The comparative analysis shows the proposed approach to be superior compared to RSA, AES, ECC, and Blowfish due to its increased security, computational efficiency, and resilience to attacks. This framework can be applied to the protection of banking PINs, military access codes, government identification numbers, cryptographic keys, and medical records, so it is an extremely versatile solution for protecting sensitive data. This multi-step approach to encryption through the proposed technique ensures safe transfer and efficient encoding as it establishes a complicated framework.
format Article
id doaj-art-b58d4ca9fe9840f3ac5ae36c4f9d84d2
institution Kabale University
issn 2045-2322
language English
publishDate 2025-07-01
publisher Nature Portfolio
record_format Article
series Scientific Reports
spelling doaj-art-b58d4ca9fe9840f3ac5ae36c4f9d84d22025-08-20T04:01:26ZengNature PortfolioScientific Reports2045-23222025-07-0115112210.1038/s41598-025-01924-0A multi layered encryption framework using intuitionistic fuzzy graphs and graph theoretic domination for secure communication networksA. Meenakshi0S. Dhanushiya1Leo Mrsic2Antonios Kalampakas3Sovan Samanta4Department of Mathematics, Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and TechnologyDepartment of Mathematics, Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and TechnologyDepartment of Technical Sciences, Algebra Bernays UniversityCollege of Engineering and Technology, American University of the Middle EastDepartment of Technical Sciences, Algebra Bernays UniversityAbstract Secure communication is essential in today’s rapidly evolving digital environment, and strong encryption methods are required to protect private data from unwanted access. The aim of this study is to strengthen the security and complexity of encrypted communications by adopting a new form of cryptographic encryption technique based on the principles of an intuitionistic fuzzy graph. Key graph-theoretic measures, such as domination number, vertex categorization (alpha-strong, beta-strong, and gamma-strong), vertex order coloring, and chromatic number, play important roles in this process. Domination number finds the key vertices of the network, while vertex strength categorization and fuzzy graph coloring provide multiple encryption layers, hence the encoded message is highly resistant to decryption unless a proper key is used. The chromatic number offers further security through various patterns of vertex coloring. The comparative analysis shows the proposed approach to be superior compared to RSA, AES, ECC, and Blowfish due to its increased security, computational efficiency, and resilience to attacks. This framework can be applied to the protection of banking PINs, military access codes, government identification numbers, cryptographic keys, and medical records, so it is an extremely versatile solution for protecting sensitive data. This multi-step approach to encryption through the proposed technique ensures safe transfer and efficient encoding as it establishes a complicated framework.https://doi.org/10.1038/s41598-025-01924-0Graph networkVertex order coloring$$\alpha$$ −strong vertex$$\beta$$ −strong vertex$$\gamma$$ –strong vertexDomination number
spellingShingle A. Meenakshi
S. Dhanushiya
Leo Mrsic
Antonios Kalampakas
Sovan Samanta
A multi layered encryption framework using intuitionistic fuzzy graphs and graph theoretic domination for secure communication networks
Scientific Reports
Graph network
Vertex order coloring
$$\alpha$$ −strong vertex
$$\beta$$ −strong vertex
$$\gamma$$ –strong vertex
Domination number
title A multi layered encryption framework using intuitionistic fuzzy graphs and graph theoretic domination for secure communication networks
title_full A multi layered encryption framework using intuitionistic fuzzy graphs and graph theoretic domination for secure communication networks
title_fullStr A multi layered encryption framework using intuitionistic fuzzy graphs and graph theoretic domination for secure communication networks
title_full_unstemmed A multi layered encryption framework using intuitionistic fuzzy graphs and graph theoretic domination for secure communication networks
title_short A multi layered encryption framework using intuitionistic fuzzy graphs and graph theoretic domination for secure communication networks
title_sort multi layered encryption framework using intuitionistic fuzzy graphs and graph theoretic domination for secure communication networks
topic Graph network
Vertex order coloring
$$\alpha$$ −strong vertex
$$\beta$$ −strong vertex
$$\gamma$$ –strong vertex
Domination number
url https://doi.org/10.1038/s41598-025-01924-0
work_keys_str_mv AT ameenakshi amultilayeredencryptionframeworkusingintuitionisticfuzzygraphsandgraphtheoreticdominationforsecurecommunicationnetworks
AT sdhanushiya amultilayeredencryptionframeworkusingintuitionisticfuzzygraphsandgraphtheoreticdominationforsecurecommunicationnetworks
AT leomrsic amultilayeredencryptionframeworkusingintuitionisticfuzzygraphsandgraphtheoreticdominationforsecurecommunicationnetworks
AT antonioskalampakas amultilayeredencryptionframeworkusingintuitionisticfuzzygraphsandgraphtheoreticdominationforsecurecommunicationnetworks
AT sovansamanta amultilayeredencryptionframeworkusingintuitionisticfuzzygraphsandgraphtheoreticdominationforsecurecommunicationnetworks
AT ameenakshi multilayeredencryptionframeworkusingintuitionisticfuzzygraphsandgraphtheoreticdominationforsecurecommunicationnetworks
AT sdhanushiya multilayeredencryptionframeworkusingintuitionisticfuzzygraphsandgraphtheoreticdominationforsecurecommunicationnetworks
AT leomrsic multilayeredencryptionframeworkusingintuitionisticfuzzygraphsandgraphtheoreticdominationforsecurecommunicationnetworks
AT antonioskalampakas multilayeredencryptionframeworkusingintuitionisticfuzzygraphsandgraphtheoreticdominationforsecurecommunicationnetworks
AT sovansamanta multilayeredencryptionframeworkusingintuitionisticfuzzygraphsandgraphtheoreticdominationforsecurecommunicationnetworks