Graph Theoretic Approaches In Cryptography: Exploring Connections And Applications
DOI:
https://doi.org/10.21839/lsdjmr.2024.v3.126Keywords:
Complete graph, Spanning tree, Encryption, Decryption, Public key, Sharing keyAbstract
Cryptography is one among the most important techniques used for securing the transmission of messages and the protection of data and Graph Theory is one of the techniques used to protect the data. Cryptography is especially used to make the text unintelligible and non-readable through the encrypt and decrypt process. In this paper, we use graph theory to encrypt and decrypt the message.
Published
12/31/2024
How to Cite
Geetha, P., & Nivethini, R. (2024). Graph Theoretic Approaches In Cryptography: Exploring Connections And Applications. Louis Savinien Dupuis Journal of Multidisciplinary Research, 3, 170–177. https://doi.org/10.21839/lsdjmr.2024.v3.126
Issue
Section
Original Article

.