A novel cryptographic scheme based on radio mean labelling

Loading...
Thumbnail Image

Journal Title

Journal ISSN

Volume Title

Publisher

Postgraduate Institute of Science (PGIS), University of Peradeniya, Sri Laka

Abstract

Graph theory and cryptography have long been intertwined, offering powerful techniques for securing information across disciplines such as computer science, engineering, and biology. This study introduces a novel encryption and decryption algorithm that integrates Radio mean labelling of cycle graphs with a polyalphabetic cypher, aiming to bolster cryptographic security. Graph labelling assigns labels to graph elements, facilitating efficient data representation and manipulation. A radio labelling ƒ of graph G assigns positive integers to the vertices of G such that |ƒ(u) − ƒ(v)| ≥ diam(G) + 1 − d (u , v), where u, v ∈ V (G), diam(G) represents the diameter of the graph, and d(u, v) denotes the distance between vertices u and v. This definition is modified as ⌈(ƒ(u) + ƒ(v)) ⁄ 2 ⌉ ≥ diam(G) + 1 − d(u, v), which is called the Radio Mean Labelling (RML) of G. The Radio Mean number of ƒ, rmn(ƒ), is the maximum number assigned to any vertex of G. The Radio Mean number of G, rmn(G), is the minimum value of rmn(ƒ) taken over all RMLs of G. In this approach, the plaintext is transformed into cyphertext using an alternative RML method applied to odd cycle graphs, specifically C₂(n)₊₁, combined with a polyalphabetic structure. The method assigns labels sequentially to odd cycles with odd or even diameters, selecting vertices from zero at maximum distance. Each label satisfies the Radio Mean condition relative to all previous labels, shaping the cypher. Decryption is achieved by utilizing two keys: the odd cycle graph and a keyword, enabling the accurate restoration of the original message. The polyalphabetic table is constructed using a shifting value, k, derived from the Radio mean number of the cycle graph and the length of the keyword. This method effectively enhances data security by integrating graph-based transformations with traditional encryption techniques. Future research will focus on extending this approach by incorporating different cycle graph structures and alternative graph labelling techniques to further improve encryption strength.

Description

Citation

Proceedings International Conference on Mathematics and Mathematics Education(ICMME) -2025, University of Peradeniya, P 33