“…The previous approach permits in particular to convert graph theoretic problems for finite graphs into group theoretic ones for graph groups. Motivated by the fact that some of these group theoretic problems can be used for cryptographic purposes, such as authentication schemes, secret sharing schemes, zero-knowledge proofs, hash functions and key-exchange protocols, Flores, Kahrobaei, and Koberda have considered these groups as a promising platform for several cryptographic schemes (see [FKK19], [FKK21a], [FKK21b], [FKK22]). It is important, in this sense, that good knowledge of the group-theoretic structure of these groups (normal forms, centralizers, automorphisms, subgroups, etc.)…”