Graph Theoretic Approaches In Cryptography: Exploring Connections And Applications

Authors

  • P. Geetha Assistant Professor for Mathematics, Immaculate College for Women, Cuddalore
  • R. Nivethini Mathematics, Immaculate College for Women, Cuddalore

DOI:

https://doi.org/10.21839/lsdjmr.2024.v3.126

Keywords:

Complete graph, Spanning tree, Encryption, Decryption, Public key, Sharing key

Abstract

Cryptography is one among the most important techniques used for securing the transmission of messages and the protection of data and Graph Theory is one of the techniques used to protect the data. Cryptography is especially used to make the text unintelligible and non-readable through the encrypt and decrypt process. In this paper, we use graph theory to encrypt and decrypt the message.

Published

12/31/2024

How to Cite

Geetha, P., & Nivethini, R. (2024). Graph Theoretic Approaches In Cryptography: Exploring Connections And Applications. Louis Savinien Dupuis Journal of Multidisciplinary Research, 3, 170–177. https://doi.org/10.21839/lsdjmr.2024.v3.126

Issue

Section

Original Article