Graph Theory and its Cryptography Applications: A Novel Approach
DOI:
https://doi.org/10.59828/pijms.v1i3.11Abstract
In our modern society werely extensively on digital technology, which plays a critical role in various sectors, including banking, e-commerce transactions and cybersecurity such as managing computer passwords. This extensive integration emphasizes the critical role of reliable and secure digital infrastructure in our day-to-day activities. Therefore, it is more important to secure information during storage and transformation. Cryptography is the process of safeguarding information by converting it in a protected form, making it accessible only to authorized users. The process employs encryption algorithms to turn simple data, or "plaintext," into a coded version, referred to as "ciphertext," making it unreadable without proper authorization. Cryptography benefits from graph theory, as it enables the seamless conversion of graphs into matrices for cryptographic operations. In numerous disciplines, Graph Theory is indispensable, especially in encryption, due to its numerous properties and its ease of implementation as a matrix in computational systems. This paper introduces a novel approach that combines graph theory with symmetric cryptography, presenting an innovative method to enhance data security and protect against unauthorized access.
Keywords: Cryptography, Decryption
