Back to Search Start Over

Text Encryption with Graph Theory Based Key Generation.

Authors :
Obayes, Karrar Khudhair
Source :
Journal of Qadisiyah Computer Science & Mathematics; 2024, Vol. 16 Issue 3, p1-10, 10p
Publication Year :
2024

Abstract

This work presents a new encryption technique that ensures safe communication through two distinct phases: utilizing monoalphabetic substitution ciphers that rely on agreed-upon character-swapping arrangements between authorized individuals and applying an alphabetical encryption table. In addition, the research utilizes the Kurskal technique to calculate the minimum spanning tree, which improves security by creating intricate encrypted text using a shared key based on ideas drawn from graph theory. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
20740204
Volume :
16
Issue :
3
Database :
Complementary Index
Journal :
Journal of Qadisiyah Computer Science & Mathematics
Publication Type :
Academic Journal
Accession number :
180222288
Full Text :
https://doi.org/10.29304/jqcsm.2024.16.31650