Loading

Application of Graphs in Security
Debajit Sensarma1, Samar Sen Sarma2

1Debajit Sensarma, Assistant Professor, Dept. of Computer Science, Vivekananda Mission Mahavidyalaya, Vidyasagar University, India.
2Samar Sen Sarma, Professor, Dept. of Computer Science & Engineering, University of Calcutta Kolkata, India.

Manuscript received on 02 July 2019 | Revised Manuscript received on 09 July 2019 | Manuscript published on 30 August 2019 | PP: 2273-2279| Volume-8 Issue-10, August 2019 | Retrieval Number: J90740881019/2019©BEIESP | DOI:  J11330881019/2019©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Now-a-days in the era of Big Data huge information is gathered in every second. Humans are now already interconnected via smart phones, gadgets, smart meters and other smart appliances. Also all these computing devices are fully connected to each other and this is known as “Internet of Things” which produces crucial information in every moment. These sensitive information needs to be protected. So, design of a good security mechanism is needed to provide protection against unauthorized attacks on this information. This article mainly takes cryptography and graph as a tool and concentrated on designing two public key encryption scheme based on graph where the first protocol is based on properties of matrices generated from graph. The aim is to protect the message graph generated from a given message. The second protocol is based on the properties of graphical codes.
Keywords: Graph, Information Security, Cyber Security,
Cryptography, Graphical Codes.

Scope of the Article: Plant Cyber Security