2024
DOI: 10.47836/mjms.18.2.10
|View full text |Cite
|
Sign up to set email alerts
|

Encryption and Decryption Using Decomposition of Complete Graph K3(6n+1)

C. Beaula,
P. Venugopal,
N. Sujaudeen

Abstract: Encryption and decryption are the two processes in the cryptosystem that ensure the safe transfer of data or sensitive information. Apart from classical mathematics, graph theory techniques are employed nowadays to construct a strong cryptosystem. This paper uses graph techniques such as decomposition and labelling to encrypt and decrypt an alphanumeric string of length 8. The novelty of this paper is the introduction of (S9,C3) -multi-decomposition and a new labelling technique - anti-magic decomposed labelli… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 24 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?