Secure communication in the digital age: a new paradigm with graph-based encryption algorithms

In the contemporary technological landscape, ensuring confidentiality is a paramount concern addressed through various skillsets. Cryptography stands out as a scientific methodology for safeguarding communication against unauthorized access. Within the realm of cryptography, numerous encryption algo...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Frontiers in computer science (Lausanne) Jg. 6
Hauptverfasser: Ali, Nasir, Sadiqa, Ayesha, Shahzad, Muhammad Amir, Imran Qureshi, Muhammad, Siddiqui, Hafiz Muhammad Afzal, Abdallah, Suhad Ali Osman, Abd El-Gawaad, Nashaat S.
Format: Journal Article
Sprache:Englisch
Veröffentlicht: Frontiers Media S.A 31.10.2024
Schlagworte:
ISSN:2624-9898, 2624-9898
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract In the contemporary technological landscape, ensuring confidentiality is a paramount concern addressed through various skillsets. Cryptography stands out as a scientific methodology for safeguarding communication against unauthorized access. Within the realm of cryptography, numerous encryption algorithms have been developed to enhance data security. Recognizing the imperative for nonstandard encryption algorithms to counter traditional attacks, this paper puts forth novel encryption techniques. These methods leverage special corona graphs, star graphs, and complete bipartite graphs, incorporating certain algebraic properties to bolster the secure transmission of messages. The introduction of these proposed encryption schemes aims to elevate the level of security in confidential communication, some of the applications of these schemes are given in the later section.
AbstractList In the contemporary technological landscape, ensuring confidentiality is a paramount concern addressed through various skillsets. Cryptography stands out as a scientific methodology for safeguarding communication against unauthorized access. Within the realm of cryptography, numerous encryption algorithms have been developed to enhance data security. Recognizing the imperative for nonstandard encryption algorithms to counter traditional attacks, this paper puts forth novel encryption techniques. These methods leverage special corona graphs, star graphs, and complete bipartite graphs, incorporating certain algebraic properties to bolster the secure transmission of messages. The introduction of these proposed encryption schemes aims to elevate the level of security in confidential communication, some of the applications of these schemes are given in the later section.
Author Ali, Nasir
Sadiqa, Ayesha
Abd El-Gawaad, Nashaat S.
Abdallah, Suhad Ali Osman
Imran Qureshi, Muhammad
Shahzad, Muhammad Amir
Siddiqui, Hafiz Muhammad Afzal
Author_xml – sequence: 1
  givenname: Nasir
  surname: Ali
  fullname: Ali, Nasir
– sequence: 2
  givenname: Ayesha
  surname: Sadiqa
  fullname: Sadiqa, Ayesha
– sequence: 3
  givenname: Muhammad Amir
  surname: Shahzad
  fullname: Shahzad, Muhammad Amir
– sequence: 4
  givenname: Muhammad
  surname: Imran Qureshi
  fullname: Imran Qureshi, Muhammad
– sequence: 5
  givenname: Hafiz Muhammad Afzal
  surname: Siddiqui
  fullname: Siddiqui, Hafiz Muhammad Afzal
– sequence: 6
  givenname: Suhad Ali Osman
  surname: Abdallah
  fullname: Abdallah, Suhad Ali Osman
– sequence: 7
  givenname: Nashaat S.
  surname: Abd El-Gawaad
  fullname: Abd El-Gawaad, Nashaat S.
BookMark eNp9kMtKAzEUQIMoWGt_wFV-YGoyk0wy7qT4KBRcqFvDzWuaMi8yU0r_3ukDEReu7uVezlmcG3TZtI1D6I6SeZbJ4t6btu7mKUnZnDLOSMEu0CTNU5YUspCXv_ZrNOv7DSEk5ZRyKSbo692ZbXR4VNTbJhgYQtvg0OBh7bANZRigwlC6Bwy4cTvcQYTxXONdGNa4jNCtEw29s9g1Ju67Iw5V2cbxX_e36MpD1bvZeU7R5_PTx-I1Wb29LBePq8RkXAwJaKm54AUl3AstvPBgdJ4D87IgxFpd5JmxhBLrDDN5yonkzI6QoJxqXWRTtDx5bQsb1cVQQ9yrFoI6HtpYKohDMJVTEgQxGclz4TMmUgBjvJbMGauz0UVGV3pymdj2fXT-x0eJOgRXx-DqEFydg4-Q_AOZMd2hxhAhVP-h362sivc
CitedBy_id crossref_primary_10_3389_fcomp_2025_1630222
crossref_primary_10_1088_1402_4896_add577
crossref_primary_10_1038_s41598_025_98110_z
Cites_doi 10.1002/j.1538-7305.1949.tb00928.x
10.9734/JSRR/2014/11804
10.1080/17445760.2018.1550771
10.56578/atams020202
10.1155/2024/2084342
10.1007/BF01844162
10.1155/2023/8975497
10.5120/ijca2016908780
10.1201/9781315282497
ContentType Journal Article
DBID AAYXX
CITATION
DOA
DOI 10.3389/fcomp.2024.1454094
DatabaseName CrossRef
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
DatabaseTitleList CrossRef

Database_xml – sequence: 1
  dbid: DOA
  name: Directory of Open Access Journals (DOAJ)
  url: https://www.doaj.org/
  sourceTypes: Open Website
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2624-9898
ExternalDocumentID oai_doaj_org_article_8a70c30667f3472aaccfb84ecdb31bb0
10_3389_fcomp_2024_1454094
GroupedDBID 9T4
AAFWJ
AAYXX
ADMLS
AFPKN
ALMA_UNASSIGNED_HOLDINGS
CITATION
GROUPED_DOAJ
M~E
OK1
ID FETCH-LOGICAL-c357t-ab8b5759105f7b7f7facb66a4f8900ddb963cd010dec4c6250854db8b7151bb93
IEDL.DBID DOA
ISICitedReferencesCount 5
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001356549200001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 2624-9898
IngestDate Fri Oct 03 12:44:23 EDT 2025
Sat Nov 29 02:12:01 EST 2025
Tue Nov 18 20:45:57 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c357t-ab8b5759105f7b7f7facb66a4f8900ddb963cd010dec4c6250854db8b7151bb93
OpenAccessLink https://doaj.org/article/8a70c30667f3472aaccfb84ecdb31bb0
ParticipantIDs doaj_primary_oai_doaj_org_article_8a70c30667f3472aaccfb84ecdb31bb0
crossref_primary_10_3389_fcomp_2024_1454094
crossref_citationtrail_10_3389_fcomp_2024_1454094
PublicationCentury 2000
PublicationDate 2024-10-31
PublicationDateYYYYMMDD 2024-10-31
PublicationDate_xml – month: 10
  year: 2024
  text: 2024-10-31
  day: 31
PublicationDecade 2020
PublicationTitle Frontiers in computer science (Lausanne)
PublicationYear 2024
Publisher Frontiers Media S.A
Publisher_xml – name: Frontiers Media S.A
References Kedia (ref11) 2015; 4
Sabharwal (ref16) 2024; 2024
Yamuna (ref25) 2015; 4
Ali (ref2) 2023; 2023
West (ref23) 2001
Ali (ref3) 2023
Sinha (ref20) 2016; 138
Yamuna (ref24) 2015; 2
Arunkumar (ref6) 2015; 5
Frucht (ref8) 1970; 4
Shannon (ref18) 1949; 28
Stinson (ref21) 2018
Hashem (ref9) 2023
Hu (ref10) 2017
Rosen (ref15) 2005
Shathir (ref19) 2023
Ali (ref1); 2
Selim (ref17) 2020; 35
Ali (ref4)
Mahmoud (ref12) 2014; 3
References_xml – volume-title: AIP conference proceedings
  year: 2023
  ident: ref9
  article-title: The tensor product bipartite graph for symmetric encryption scheme
– volume: 2
  year: 2015
  ident: ref24
  article-title: Data transfer using fundamental circuits
  publication-title: Int. J. Comp. Modern Technol.
– volume: 4
  start-page: 94
  year: 2015
  ident: ref11
  article-title: Encryption using Venn-diagrams and graph
  publication-title: Int. J. Advanced Comp. Technol.
– volume: 28
  start-page: 656
  year: 1949
  ident: ref18
  article-title: Communication theory of secrecy systems
  publication-title: Bell Syst. Tech. J.
  doi: 10.1002/j.1538-7305.1949.tb00928.x
– start-page: 12
  year: 2017
  ident: ref10
  article-title: A bipartite graph propagation approach for mobile advertising fraud detection
  publication-title: Mob. Inf. Syst.
– volume-title: Elementary number theory and its applications
  year: 2005
  ident: ref15
– year: 2023
  ident: ref3
  article-title: The cartesian product graph for encryption schemes
– volume: 3
  start-page: 2519
  year: 2014
  ident: ref12
  article-title: Encryption algorithm using graph theory
  publication-title: J. Sci. Res. Rep.
  doi: 10.9734/JSRR/2014/11804
– volume: 4
  start-page: 128
  year: 2015
  ident: ref25
  article-title: Data transfer using bipartite graphs
  publication-title: Int. J. Advance Res. Sci. Engin.
– volume: 35
  start-page: 668
  year: 2020
  ident: ref17
  article-title: How to encrypt a graph
  publication-title: Int. J. Parallel Emergent Distributed Syst.
  doi: 10.1080/17445760.2018.1550771
– volume: 2
  start-page: 72
  ident: ref1
  article-title: A mathematical analysis of concealed non-Kekulean benzenoids and subdivided networks in associated line graphs
  publication-title: Acadlore Trans. Appl Math. Stat
  doi: 10.56578/atams020202
– volume: 5
  start-page: 7
  year: 2015
  ident: ref6
  article-title: Applications of bipartite graph in diverse fields including cloud computing
  publication-title: Int. J. Modern Engin. Res.
– volume-title: AIP conference proceedings
  year: 2023
  ident: ref19
  article-title: The triple vertex path graph for hill encryption schemes
– volume: 2024
  start-page: 2084342
  year: 2024
  ident: ref16
  article-title: Graph crypto-Stego system for securing graph data using association schemes
  publication-title: J. Appl. Math.
  doi: 10.1155/2024/2084342
– ident: ref4
  article-title: Exploring ring structures: multiset dimension analysis in compressed zero-divisor graphs
  publication-title: arXiv preprint arXiv:2405.06187
– volume: 4
  start-page: 322
  year: 1970
  ident: ref8
  article-title: On the corona of two graphs
  publication-title: Aequationes Math.
  doi: 10.1007/BF01844162
– volume: 2023
  start-page: 1
  year: 2023
  ident: ref2
  article-title: Mapping connectivity patterns: degree-based topological indices of Corona product graphs
  publication-title: J. Appl. Math.
  doi: 10.1155/2023/8975497
– volume: 138
  start-page: 6
  year: 2016
  ident: ref20
  article-title: Encryption using network and matrices through signed graphs
  publication-title: Int. J. Comp. Appl.
  doi: 10.5120/ijca2016908780
– volume-title: Cryptography: Theory and practice
  year: 2018
  ident: ref21
  doi: 10.1201/9781315282497
– volume-title: Introduction to graph theory
  year: 2001
  ident: ref23
SSID ssj0002511587
Score 2.3060455
Snippet In the contemporary technological landscape, ensuring confidentiality is a paramount concern addressed through various skillsets. Cryptography stands out as a...
SourceID doaj
crossref
SourceType Open Website
Enrichment Source
Index Database
SubjectTerms data transfer
decryption
encryption algorithms
secure communication
security
symmetric cipher
Title Secure communication in the digital age: a new paradigm with graph-based encryption algorithms
URI https://doaj.org/article/8a70c30667f3472aaccfb84ecdb31bb0
Volume 6
WOSCitedRecordID wos001356549200001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: Directory of Open Access Journals (DOAJ)
  customDbUrl:
  eissn: 2624-9898
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0002511587
  issn: 2624-9898
  databaseCode: DOA
  dateStart: 20190101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2624-9898
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0002511587
  issn: 2624-9898
  databaseCode: M~E
  dateStart: 20190101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV07T8MwELZQxcDCG_GWBzZkNWmcOGYD1IoBKgZAnYj8rCr1gdKCxMJv585Jq7DAwpLBsS3rfL67zzp_R8iF0bGPhcsYcpsznqmE6Uw6xo2TEG7niQoJsi_3ot_PBwP52Cj1hTlhFT1wJbh2rkRkEkzF9AkXHaWM8TrnzlidxFoHtB4J2QBTaIMxcE5zUb2SARQm2x5TtAEPdjgYhxRRzQ9P1CDsD56lt00265CQXldL2SFrbrpLtpblFmh9-vbIa7gbd9Q033TQ0ZRCDEftaIjlPyiYhyuqKATLFFm9oXlC8a6VBmZqhk7LUpiv_Ay2gqrxcFbC_8l8nzz3uk-3d6wuj8BMkooFUzrXWF4TIiQvtPDCK6OzTHGfyyiyVsPZMhbwlnWGGxA8RFfcwiABXl5rmRyQ1nQ2dYeEZrAjABzA38ee59LKzGaqE5lU8jhy0h-ReCmqwtTc4VjCYlwAhkDxFkG8BYq3qMV7RC5XY94q5oxfe9_gDqx6Iut1aABdKGpdKP7SheP_mOSEbODCKv90SlqL8t2dkXXzsRjNy_OgZvB9-Op-A--L2gU
linkProvider Directory of Open Access Journals
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secure+communication+in+the+digital+age%3A+a+new+paradigm+with+graph-based+encryption+algorithms&rft.jtitle=Frontiers+in+computer+science+%28Lausanne%29&rft.au=Ali%2C+Nasir&rft.au=Sadiqa%2C+Ayesha&rft.au=Shahzad%2C+Muhammad+Amir&rft.au=Imran+Qureshi%2C+Muhammad&rft.date=2024-10-31&rft.issn=2624-9898&rft.eissn=2624-9898&rft.volume=6&rft_id=info:doi/10.3389%2Ffcomp.2024.1454094&rft.externalDBID=n%2Fa&rft.externalDocID=10_3389_fcomp_2024_1454094
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2624-9898&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2624-9898&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2624-9898&client=summon