Secure communication in the digital age: a new paradigm with graph-based encryption algorithms
In the contemporary technological landscape, ensuring confidentiality is a paramount concern addressed through various skillsets. Cryptography stands out as a scientific methodology for safeguarding communication against unauthorized access. Within the realm of cryptography, numerous encryption algo...
Gespeichert in:
| Veröffentlicht in: | Frontiers in computer science (Lausanne) Jg. 6 |
|---|---|
| Hauptverfasser: | , , , , , , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
Frontiers Media S.A
31.10.2024
|
| Schlagworte: | |
| ISSN: | 2624-9898, 2624-9898 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | In the contemporary technological landscape, ensuring confidentiality is a paramount concern addressed through various skillsets. Cryptography stands out as a scientific methodology for safeguarding communication against unauthorized access. Within the realm of cryptography, numerous encryption algorithms have been developed to enhance data security. Recognizing the imperative for nonstandard encryption algorithms to counter traditional attacks, this paper puts forth novel encryption techniques. These methods leverage special corona graphs, star graphs, and complete bipartite graphs, incorporating certain algebraic properties to bolster the secure transmission of messages. The introduction of these proposed encryption schemes aims to elevate the level of security in confidential communication, some of the applications of these schemes are given in the later section. |
|---|---|
| AbstractList | In the contemporary technological landscape, ensuring confidentiality is a paramount concern addressed through various skillsets. Cryptography stands out as a scientific methodology for safeguarding communication against unauthorized access. Within the realm of cryptography, numerous encryption algorithms have been developed to enhance data security. Recognizing the imperative for nonstandard encryption algorithms to counter traditional attacks, this paper puts forth novel encryption techniques. These methods leverage special corona graphs, star graphs, and complete bipartite graphs, incorporating certain algebraic properties to bolster the secure transmission of messages. The introduction of these proposed encryption schemes aims to elevate the level of security in confidential communication, some of the applications of these schemes are given in the later section. |
| Author | Ali, Nasir Sadiqa, Ayesha Abd El-Gawaad, Nashaat S. Abdallah, Suhad Ali Osman Imran Qureshi, Muhammad Shahzad, Muhammad Amir Siddiqui, Hafiz Muhammad Afzal |
| Author_xml | – sequence: 1 givenname: Nasir surname: Ali fullname: Ali, Nasir – sequence: 2 givenname: Ayesha surname: Sadiqa fullname: Sadiqa, Ayesha – sequence: 3 givenname: Muhammad Amir surname: Shahzad fullname: Shahzad, Muhammad Amir – sequence: 4 givenname: Muhammad surname: Imran Qureshi fullname: Imran Qureshi, Muhammad – sequence: 5 givenname: Hafiz Muhammad Afzal surname: Siddiqui fullname: Siddiqui, Hafiz Muhammad Afzal – sequence: 6 givenname: Suhad Ali Osman surname: Abdallah fullname: Abdallah, Suhad Ali Osman – sequence: 7 givenname: Nashaat S. surname: Abd El-Gawaad fullname: Abd El-Gawaad, Nashaat S. |
| BookMark | eNp9kMtKAzEUQIMoWGt_wFV-YGoyk0wy7qT4KBRcqFvDzWuaMi8yU0r_3ukDEReu7uVezlmcG3TZtI1D6I6SeZbJ4t6btu7mKUnZnDLOSMEu0CTNU5YUspCXv_ZrNOv7DSEk5ZRyKSbo692ZbXR4VNTbJhgYQtvg0OBh7bANZRigwlC6Bwy4cTvcQYTxXONdGNa4jNCtEw29s9g1Ju67Iw5V2cbxX_e36MpD1bvZeU7R5_PTx-I1Wb29LBePq8RkXAwJaKm54AUl3AstvPBgdJ4D87IgxFpd5JmxhBLrDDN5yonkzI6QoJxqXWRTtDx5bQsb1cVQQ9yrFoI6HtpYKohDMJVTEgQxGclz4TMmUgBjvJbMGauz0UVGV3pymdj2fXT-x0eJOgRXx-DqEFydg4-Q_AOZMd2hxhAhVP-h362sivc |
| CitedBy_id | crossref_primary_10_3389_fcomp_2025_1630222 crossref_primary_10_1088_1402_4896_add577 crossref_primary_10_1038_s41598_025_98110_z |
| Cites_doi | 10.1002/j.1538-7305.1949.tb00928.x 10.9734/JSRR/2014/11804 10.1080/17445760.2018.1550771 10.56578/atams020202 10.1155/2024/2084342 10.1007/BF01844162 10.1155/2023/8975497 10.5120/ijca2016908780 10.1201/9781315282497 |
| ContentType | Journal Article |
| DBID | AAYXX CITATION DOA |
| DOI | 10.3389/fcomp.2024.1454094 |
| DatabaseName | CrossRef DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | CrossRef |
| Database_xml | – sequence: 1 dbid: DOA name: Directory of Open Access Journals (DOAJ) url: https://www.doaj.org/ sourceTypes: Open Website |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 2624-9898 |
| ExternalDocumentID | oai_doaj_org_article_8a70c30667f3472aaccfb84ecdb31bb0 10_3389_fcomp_2024_1454094 |
| GroupedDBID | 9T4 AAFWJ AAYXX ADMLS AFPKN ALMA_UNASSIGNED_HOLDINGS CITATION GROUPED_DOAJ M~E OK1 |
| ID | FETCH-LOGICAL-c357t-ab8b5759105f7b7f7facb66a4f8900ddb963cd010dec4c6250854db8b7151bb93 |
| IEDL.DBID | DOA |
| ISICitedReferencesCount | 5 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001356549200001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2624-9898 |
| IngestDate | Fri Oct 03 12:44:23 EDT 2025 Sat Nov 29 02:12:01 EST 2025 Tue Nov 18 20:45:57 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c357t-ab8b5759105f7b7f7facb66a4f8900ddb963cd010dec4c6250854db8b7151bb93 |
| OpenAccessLink | https://doaj.org/article/8a70c30667f3472aaccfb84ecdb31bb0 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_8a70c30667f3472aaccfb84ecdb31bb0 crossref_primary_10_3389_fcomp_2024_1454094 crossref_citationtrail_10_3389_fcomp_2024_1454094 |
| PublicationCentury | 2000 |
| PublicationDate | 2024-10-31 |
| PublicationDateYYYYMMDD | 2024-10-31 |
| PublicationDate_xml | – month: 10 year: 2024 text: 2024-10-31 day: 31 |
| PublicationDecade | 2020 |
| PublicationTitle | Frontiers in computer science (Lausanne) |
| PublicationYear | 2024 |
| Publisher | Frontiers Media S.A |
| Publisher_xml | – name: Frontiers Media S.A |
| References | Kedia (ref11) 2015; 4 Sabharwal (ref16) 2024; 2024 Yamuna (ref25) 2015; 4 Ali (ref2) 2023; 2023 West (ref23) 2001 Ali (ref3) 2023 Sinha (ref20) 2016; 138 Yamuna (ref24) 2015; 2 Arunkumar (ref6) 2015; 5 Frucht (ref8) 1970; 4 Shannon (ref18) 1949; 28 Stinson (ref21) 2018 Hashem (ref9) 2023 Hu (ref10) 2017 Rosen (ref15) 2005 Shathir (ref19) 2023 Ali (ref1); 2 Selim (ref17) 2020; 35 Ali (ref4) Mahmoud (ref12) 2014; 3 |
| References_xml | – volume-title: AIP conference proceedings year: 2023 ident: ref9 article-title: The tensor product bipartite graph for symmetric encryption scheme – volume: 2 year: 2015 ident: ref24 article-title: Data transfer using fundamental circuits publication-title: Int. J. Comp. Modern Technol. – volume: 4 start-page: 94 year: 2015 ident: ref11 article-title: Encryption using Venn-diagrams and graph publication-title: Int. J. Advanced Comp. Technol. – volume: 28 start-page: 656 year: 1949 ident: ref18 article-title: Communication theory of secrecy systems publication-title: Bell Syst. Tech. J. doi: 10.1002/j.1538-7305.1949.tb00928.x – start-page: 12 year: 2017 ident: ref10 article-title: A bipartite graph propagation approach for mobile advertising fraud detection publication-title: Mob. Inf. Syst. – volume-title: Elementary number theory and its applications year: 2005 ident: ref15 – year: 2023 ident: ref3 article-title: The cartesian product graph for encryption schemes – volume: 3 start-page: 2519 year: 2014 ident: ref12 article-title: Encryption algorithm using graph theory publication-title: J. Sci. Res. Rep. doi: 10.9734/JSRR/2014/11804 – volume: 4 start-page: 128 year: 2015 ident: ref25 article-title: Data transfer using bipartite graphs publication-title: Int. J. Advance Res. Sci. Engin. – volume: 35 start-page: 668 year: 2020 ident: ref17 article-title: How to encrypt a graph publication-title: Int. J. Parallel Emergent Distributed Syst. doi: 10.1080/17445760.2018.1550771 – volume: 2 start-page: 72 ident: ref1 article-title: A mathematical analysis of concealed non-Kekulean benzenoids and subdivided networks in associated line graphs publication-title: Acadlore Trans. Appl Math. Stat doi: 10.56578/atams020202 – volume: 5 start-page: 7 year: 2015 ident: ref6 article-title: Applications of bipartite graph in diverse fields including cloud computing publication-title: Int. J. Modern Engin. Res. – volume-title: AIP conference proceedings year: 2023 ident: ref19 article-title: The triple vertex path graph for hill encryption schemes – volume: 2024 start-page: 2084342 year: 2024 ident: ref16 article-title: Graph crypto-Stego system for securing graph data using association schemes publication-title: J. Appl. Math. doi: 10.1155/2024/2084342 – ident: ref4 article-title: Exploring ring structures: multiset dimension analysis in compressed zero-divisor graphs publication-title: arXiv preprint arXiv:2405.06187 – volume: 4 start-page: 322 year: 1970 ident: ref8 article-title: On the corona of two graphs publication-title: Aequationes Math. doi: 10.1007/BF01844162 – volume: 2023 start-page: 1 year: 2023 ident: ref2 article-title: Mapping connectivity patterns: degree-based topological indices of Corona product graphs publication-title: J. Appl. Math. doi: 10.1155/2023/8975497 – volume: 138 start-page: 6 year: 2016 ident: ref20 article-title: Encryption using network and matrices through signed graphs publication-title: Int. J. Comp. Appl. doi: 10.5120/ijca2016908780 – volume-title: Cryptography: Theory and practice year: 2018 ident: ref21 doi: 10.1201/9781315282497 – volume-title: Introduction to graph theory year: 2001 ident: ref23 |
| SSID | ssj0002511587 |
| Score | 2.3060455 |
| Snippet | In the contemporary technological landscape, ensuring confidentiality is a paramount concern addressed through various skillsets. Cryptography stands out as a... |
| SourceID | doaj crossref |
| SourceType | Open Website Enrichment Source Index Database |
| SubjectTerms | data transfer decryption encryption algorithms secure communication security symmetric cipher |
| Title | Secure communication in the digital age: a new paradigm with graph-based encryption algorithms |
| URI | https://doaj.org/article/8a70c30667f3472aaccfb84ecdb31bb0 |
| Volume | 6 |
| WOSCitedRecordID | wos001356549200001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: Directory of Open Access Journals (DOAJ) customDbUrl: eissn: 2624-9898 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0002511587 issn: 2624-9898 databaseCode: DOA dateStart: 20190101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2624-9898 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0002511587 issn: 2624-9898 databaseCode: M~E dateStart: 20190101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV07T8MwELZQxcDCG_GWBzZkNWmcOGYD1IoBKgZAnYj8rCr1gdKCxMJv585Jq7DAwpLBsS3rfL67zzp_R8iF0bGPhcsYcpsznqmE6Uw6xo2TEG7niQoJsi_3ot_PBwP52Cj1hTlhFT1wJbh2rkRkEkzF9AkXHaWM8TrnzlidxFoHtB4J2QBTaIMxcE5zUb2SARQm2x5TtAEPdjgYhxRRzQ9P1CDsD56lt00265CQXldL2SFrbrpLtpblFmh9-vbIa7gbd9Q033TQ0ZRCDEftaIjlPyiYhyuqKATLFFm9oXlC8a6VBmZqhk7LUpiv_Ay2gqrxcFbC_8l8nzz3uk-3d6wuj8BMkooFUzrXWF4TIiQvtPDCK6OzTHGfyyiyVsPZMhbwlnWGGxA8RFfcwiABXl5rmRyQ1nQ2dYeEZrAjABzA38ee59LKzGaqE5lU8jhy0h-ReCmqwtTc4VjCYlwAhkDxFkG8BYq3qMV7RC5XY94q5oxfe9_gDqx6Iut1aABdKGpdKP7SheP_mOSEbODCKv90SlqL8t2dkXXzsRjNy_OgZvB9-Op-A--L2gU |
| linkProvider | Directory of Open Access Journals |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secure+communication+in+the+digital+age%3A+a+new+paradigm+with+graph-based+encryption+algorithms&rft.jtitle=Frontiers+in+computer+science+%28Lausanne%29&rft.au=Ali%2C+Nasir&rft.au=Sadiqa%2C+Ayesha&rft.au=Shahzad%2C+Muhammad+Amir&rft.au=Imran+Qureshi%2C+Muhammad&rft.date=2024-10-31&rft.issn=2624-9898&rft.eissn=2624-9898&rft.volume=6&rft_id=info:doi/10.3389%2Ffcomp.2024.1454094&rft.externalDBID=n%2Fa&rft.externalDocID=10_3389_fcomp_2024_1454094 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2624-9898&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2624-9898&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2624-9898&client=summon |