Back to Search
Start Over
Text Encryption with Graph Theory Based Key Generation.
- Source :
- Journal of Qadisiyah Computer Science & Mathematics; 2024, Vol. 16 Issue 3, p1-10, 10p
- Publication Year :
- 2024
-
Abstract
- This work presents a new encryption technique that ensures safe communication through two distinct phases: utilizing monoalphabetic substitution ciphers that rely on agreed-upon character-swapping arrangements between authorized individuals and applying an alphabetical encryption table. In addition, the research utilizes the Kurskal technique to calculate the minimum spanning tree, which improves security by creating intricate encrypted text using a shared key based on ideas drawn from graph theory. [ABSTRACT FROM AUTHOR]
- Subjects :
- GRAPH theory
UNDIRECTED graphs
COMPLETE graphs
SPANNING trees
CIPHERS
BLOCK ciphers
Subjects
Details
- Language :
- English
- ISSN :
- 20740204
- Volume :
- 16
- Issue :
- 3
- Database :
- Complementary Index
- Journal :
- Journal of Qadisiyah Computer Science & Mathematics
- Publication Type :
- Academic Journal
- Accession number :
- 180222288
- Full Text :
- https://doi.org/10.29304/jqcsm.2024.16.31650