CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Encryption using Network and Matrices through Signed Graphs

by Deepa Sinha, Anshu Sethi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 138 - Number 4
Year of Publication: 2016
Authors: Deepa Sinha, Anshu Sethi
10.5120/ijca2016908780

Deepa Sinha, Anshu Sethi . Encryption using Network and Matrices through Signed Graphs. International Journal of Computer Applications. 138, 4 ( March 2016), 6-13. DOI=10.5120/ijca2016908780

@article{ 10.5120/ijca2016908780,
author = { Deepa Sinha, Anshu Sethi },
title = { Encryption using Network and Matrices through Signed Graphs },
journal = { International Journal of Computer Applications },
issue_date = { March 2016 },
volume = { 138 },
number = { 4 },
month = { March },
year = { 2016 },
issn = { 0975-8887 },
pages = { 6-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume138/number4/24365-2016908780/ },
doi = { 10.5120/ijca2016908780 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:38:45.215206+05:30
%A Deepa Sinha
%A Anshu Sethi
%T Encryption using Network and Matrices through Signed Graphs
%J International Journal of Computer Applications
%@ 0975-8887
%V 138
%N 4
%P 6-13
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security of a network is important to all organizations, personal computer users, and the military. With the invention of the Internet, major concern is about the security and the history of security allows a better understanding of the emergence of security technology. One of the ways to secure businesses from the Internet is through firewalls and encryption mechanisms. A network can be designed as a sigraph S where every sigraph will have its unique adjacency matrix associated with it. A signed graph (or sigraph in short) S is a graph G in which every edge x carries a value s(x) ∈ {-1, +1} called its sign denoted specially as S = (G, s). Given a sigraph S, H = L(S) called the line sigraph of S is that sigraph in which edges of S are represented as vertices, two of these vertices are adjacent whenever the corresponding edges in S have a vertex in common and any such edge ef is defined to be negative whenever both e and f are negative edges in S. Here S is called root sigraph of H. In this paper first we give an algorithm to obtain a line sigraph [1] and line root sigraph from a given sigraph [1], if it exists. This algorithm is an extension of an algorithm given by Lehot [2] in the realm of sigraphs. In the end we will propose a technique that will use adjacency matrix of S as a parameter to encrypt and forward the data in the form of adjacency matrix of L(S) and will decrypt it by applying inverse matrix operations.

References
  1. Sinha, D. andSethi. A 2015, An Algorithm to detect S-Consistency in Line Sigraph, Journal of Combinatorics, Information & System Sciences: Vol 40, No. 1-4 Comb. (Jan-Dec 2015).
  2. Lehot, P.G.H. 1974. An optimal algorithm to detect a line graph and output its root graph, Journal of the Association for Computing Machinery, 21 (4), (1974), 569-575.
  3. Zasalavsky, T. 1982. Signed graphs, Discrete Appl.Math, 4 (1) (1982), 47-74.
  4. West, D.B. 1996. Introduction to Graph Theory, Prentice-Hall of India Pvt. Ltd., 1996.
  5. Golumbic, M.C. 2004. Algorithmic Graph Theory and Perfect Graphs, Fourth Edition.
  6. Cormen, T., Leiserson C., Rivest, R., Stein, C. 2011. Introduction to algorithm, Third Edition, PHI Learning Private Limited, 2011.
  7. Chartrand, G. T. 1977. Graphs as Mathematical Models, Prindle, Weber and Schmidt, Inc., Boston, Massachusetts, 1977.
  8. Behzad, M. and Chartrand, G. T. 1969. Line coloring of signed graphs, Elem. Math., 24(3) (1969), 49-52.
  9. Sinha, D. and Sethi. A 2015, An Optimal Algorithm toDetect Sign Compatibility of a given Sigraph, National Academy of Science Letters, DOI 10.1007/s40009-014-0317-5, 2015.
  10. Acharya, M. and Sinha, D. 2005. Characterizations of Line sigraphs, Nat. Acad. Sci. –Letters., 28 (1 - 2) (2005), 31-34. [Also, see Extended Abstract in: Electronic Notes in Discrete Mathematics, 15 (2003).
  11. Sinha, D. and Sethi. A 2015, An Algorithmic Characterization of sigraphs whose common edgesigraphs and second iterated line sigraphs are switching equivalent, Journal of Discrete Mathematical Sciences &Cryptography DOI: 10.1080/09720529.2015,1013679,Vol. 18(2015), No. 5, pp. 581-603.
Index Terms

Computer Science
Information Sciences

Keywords

Algorithm sigraph line sigraph root sigraph sign-compatible network network security encryption decryption.