Please use this identifier to cite or link to this item: http://dspace.dtu.ac.in:8080/jspui/handle/repository/20756
Title: APPLICATION OF GRAPH THEORY IN CRYPTOGRAPHY
Authors: MERAVI, SHUBHAM
Keywords: CRYPTOGRAPHY
SYMMETRIC KEY
SYMMETRIC KEY
NETWORK SECURITY
PUBLIC KEY
Issue Date: May-2024
Series/Report no.: TD-7270;
Abstract: Now, encryption has become very crucial in this world, especially when important information is exchanged, because data is the new oil of this era. This means that we require a new, non standard, well-secured encryption algorithm to be made. Using the theory of graphs, the encryption concept will comprise meaningful safety features, thereby eliminating standard sniff data. Proposed Algorithm: This paper introduces a new encryption algorithm that uses the characteristics of graph theory in a secure fashion to encrypt and decrypt data. Cryptography presents the most fundamental pillar of graph theory, loaded with a rich set of tools and concepts directed at supporting the security system of communication. The result is that complex relationships within cryptographic systems may be modeled well with graphs because of data stream representation, network topology, and key exchange mechanisms. In such cryptographic uses of graph theory, one finds applications in protocols for scrambling an algorithm and obtaining new algorithms for encryption. The development of encryption schemes is among the most popular applications to which graph theory has been put for the purpose of increasing security through cryptography. Graph-theoretic structures and relationships provide the cryptographic algorithms with a means to encrypt plaintext securely, effectively, and efficiently into ciphertext. These additional properties of the graphs, such as the connectivity of the vertices and edge-disjoint paths, are used to assure better data confidentiality and integrity of the data under encryption through graph-based encryption techniques. Additionally, graph theory provides one of the important tools that can be applied in the key management and distribution process of the cryptographic system. Key exchange protocols, like the Diffie-Hellman key exchange, use a graph-based approach for secure communication channel establishment with the help of secure exchange of cryptographic keys between two parties. Graph theory also forms the basis of vulnerability analysis in networks and the design of secure communication networks by modeling network configurations and identifying possible security risks. In other words, the applications of graph theory to cryptography are driven by the need to fortify the security of digital communication through strong solutions that secure sensitive information and reduce cyber threats in a more connected world.
URI: http://dspace.dtu.ac.in:8080/jspui/handle/repository/20756
Appears in Collections:M.E./M.Tech. Computer Engineering

Files in This Item:
File Description SizeFormat 
SHUBHAM MERAVI M.Tech.pdf1.36 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.