An application of graph theory in asymmetric key cryptography

dc.contributor.authorFernando, K.K.N.
dc.contributor.authorWijesiri, G.S.
dc.date.accessioned2025-12-18T04:18:52Z
dc.date.available2025-12-18T04:18:52Z
dc.date.issued2023-11-03
dc.description.abstractThe development of digital communication in many facets of our everyday lives significantly impacts the evolving world we live in today. The rapid growth and evolution of digital communication have become the backbone of how we interact with other people. Therefore, it is imperative to protect information and data from unauthorised activities, such as accessing, using, exposing, damaging, modifying, copying, or deleting them. Safeguarding data from these invalid operations is crucial to ensure its integrity, confidentiality, and availability. Cryptography plays a pivotal role in ensuring the security and privacy of information in various contexts, such as online banking, e-commerce transactions, and communication between governments, military organisations, and businesses. Various types of mathematical techniques are available for application in modern cryptology. The application of graph theory is widely utilised in the field of cryptography due to its straightforward representation in computers as a matrix. In this study, we propose a novel asymmetric key cryptography scheme for secure message transmission using graph theory and matrices. The proposed scheme consists of four algorithms. The key generation algorithm on the receiver side is based on the properties of matrices, which enables us to establish the relationship between private key and public key through matrix operations. On the sender-side graph generation algorithm, a graph theory approach is applied to encrypt the original message, and the message is converted into a splitting graph and its minimum spanning tree. Then, the sender-side encryption algorithm is used to generate a complex final ciphertext using the receiver’s public key. The decryption algorithm follows the same process in reverse order, employing the receiver’s private key. This system will provide better security while storing data in the financial retail industry and sharing passwords in transactions.
dc.identifier.citationProceedings of the Postgraduate Institute of Science Research Congress (RESCON) -2023, University of Peradeniya, P 48
dc.identifier.isbn978-955-8787-09-0
dc.identifier.urihttps://ir.lib.pdn.ac.lk/handle/20.500.14444/7246
dc.language.isoen_US
dc.publisherPostgraduate Institute of Science (PGIS), University of Peradeniya, Sri Lanka
dc.subjectAsymmetric Cryptography
dc.subjectCipher text
dc.subjectCryptography
dc.subjectDecryption
dc.subjectEncryption
dc.titleAn application of graph theory in asymmetric key cryptography
dc.title.alternativeICT, Mathematics, and Statistics
dc.typeArticle

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Fernando N.pdf
Size:
93.72 KB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed to upon submission
Description:

Collections