Some Graph Based Encryption Techniques

  • H. Dhanvanth Narayan
  • , Surekha Ravishankar Bhat
  • , Ravishankar Bhat
  • , Smitha Ganesh Bhat*
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

1 Citation (Scopus)

Abstract

In today’s fast-evolving technological environment, ensuring confidentiality is of utmost importance. Cryptography stands as a critical discipline in safeguarding information from unauthorized access. It employs various encryption algorithms to secure data effectively. As digital threats evolve, there’s a growing demand for unconventional encryption methods to counter traditional cyber-attacks. This paper introduces innovative encryption algorithms leveraging special graphs and public key cryptography techniques, enhancing security through modular arithmetic properties and enabling more robust communication safeguards. A partition V1, V2,…, Vk of the vertex set V is called a chromatic partition of G if each Vi, 1 ≤ i ≤ k is an independent set of G. The minimum order of a chromatic partition of G is called chromatic number χ(G). A chromatic partition of G is called an ordered partition if |V1| = β0 and |Vi| = β0(V − ∪j=1i Vj ). The order of a minimum ordered chromatic partition of G is called ordered chromatic number χ1(G). It is immediate that χ1(G) ≥ χ(G). In this paper we extend Nordhaus Gaddum results to ordered chromatic number.

Original languageEnglish
Pages (from-to)2727-2734
Number of pages8
JournalIAENG International Journal of Applied Mathematics
Volume54
Issue number12
Publication statusPublished - 2024

All Science Journal Classification (ASJC) codes

  • Applied Mathematics

Fingerprint

Dive into the research topics of 'Some Graph Based Encryption Techniques'. Together they form a unique fingerprint.

Cite this