Super-Encryption Method using Affine Transform Via Trees

  IJMTT-book-cover
 
International Journal of Mathematics Trends and Technology (IJMTT)
 
© 2022 by IJMTT Journal
Volume-68 Issue-6
Year of Publication : 2022
Authors : Beena Kittur, D. Chaya Kumari, Sneha G. Kulkarni, Manjula K M
 10.14445/22315373/IJMTT-V68I6P524

How to Cite?

Beena Kittur, D. Chaya Kumari, Sneha G. Kulkarni, Manjula K M, " Super-Encryption Method using Affine Transform Via Trees ," International Journal of Mathematics Trends and Technology, vol. 68, no. 6, pp. 190-194, 2022. Crossref, https://doi.org/10.14445/22315373/IJMTT-V68I6P524

Abstract
In this paper, a new technique of super encryption is established with Affine transformation by exploring the features of trees in Graph theory.

Keywords : Affine transformation, Graph, Tree.

Reference

[1] J.Buchman, “Introduction to Cryptography,” Springer-Verlag, 2001.
[2] Neal Koblitz, “A Course in Number Theory and Cryptography”.
[3] K.H.Rosen, “Elementary Number Theory and Its Applications,” Third edition., AddsonWesly.
[4] Dr.D.ChayaKumari, Dr.S.Ashok Kumar, D.Triveni, “Super-Encryption Method of Laplace Transformations using Fibonacci Numbers,” Journal of Huazhong University of Science and Technology, vol. 50, no. 7.
[5] A.ChandraSekhar, D. ChayaKumari, S. Ashok Kumar, “Symmetric Key Cryptosystem for Multiple Encryptions,” International Journal of Mathematics Trends and Technology, vol. 29, no. 2, 2016.
[6] A.ChandraSekhar, D. ChayaKumari, Ch.Pragathi, S. Ashok Kumar, “Multiple Encryptions of Fibonacci Lucas Transformations,” International Organization of Scientific Research (IOST), vol. 12, no. 2, pp. 66-72, 2016. Doi: 10.9790/5728-1202026672.
[7] A.ChandraSekhar, D. ChayaKumari, Ch.Pragathi, S. Ashok Kumar, “Triple Encryption Scheme Using two Independent Keys,” International Journal of Engineering Science and Technology, vol. 8, No. 4, 2016.
[8] Uma Dixit, “Cryptography A Graph Theory Approach,” International Journal of Advance Research in Science and Engineering, vol. 6 no. 1, 2017.
[9] Rishi Pal Singh, Vandana, “Application of Graph Theory in Computer Science and Engineering,” International Journal of Computer Applications, vol. 104, no. 1, 2014.
[10] P. Amudha, A.C. Charles Sagayaraj, A.C.ShanthaSheela, “An Application of Graph Theory in Cryptography,” International Journal of Pure and Applied Mathematics, vol. 119, no. 13, pp. 375-383, 2018.
[11] Nandhini R, Maheswari V and Balaji V, “A Graph Theory Approach on Cryptography,” Journal of Computational Mathematica.
[12] Wael Mahmoud Al Etaiwi, “Encryption Algorithm Using Graph Theory,” Journal of Scientific Research and Reports, vol. 3, no. 19, pp. 2519-2527, 2014.
[13] P.A.S.D.Perera, G.S.Wijesiri, “Encryption and Decryption Algorithms in Symmetric Key Cryptography Using Graph Theory,” Psychology and Education, vol. 58, no. 1, pp. 3420-3427, 2021.
[14] Dharmendra Kumar Gurjar and AuparajitaKrishnaa, “Lexicographic Labeled Graphs in Cryptography,” Advances and Applications in Discrete Mathematics, vol. 27, no. 2, pp. 209-232, 2021.
[15] W. Mahmoud Al Etaiwi, “Encryption Algorithm Using Graph Theory,” Journal of Scientific Research and Reports, vol. 3, no. 19, pp. 2519-2527, 2014.
[16] H. K. Krishnappa, N. K. Srinath and S. Manjunath, “Vertex Magic Total Labeling of Complete Graphs and Their Application for Public-Key Cryptosystem,” International Journal of Innovative Research in Computer and Communication Engineering, vol. 1, no. 2, 2013.
[17] J. Dharani, V. Maheswari and V. Balaji, “Encryption Approach on Graph Theory,” Journal of Computational Mathematica, vol. 2, no. 1, 2018.
[18] Dharmendra Kumar Gurjar, AuparajitaKrishnaa, “Complete Graph and Hamiltonian Cycle in Encryption and Decryption,” International Journal of Mathematics Trends and Technology, vol. 67, no. 12, pp. 62-71, 2021.
[19] A. Krishnaa, “Some Applications of Labelled Graphs,” International Journal of Mathematics Trends and Technology (IJMTT), vol. 37, no. 3, pp. 209-213, 2016.
[20] SafaaHraiz and WaelEtaiwi, “Symmetric Encryption Algorithm Using Graph Representation,” in 2017 8th International Conference on Information Technology (ICIT), IEEE, pp. 501-506, 2017.
[21] G.Ashok, S.Ashok Kumar, D.ChayaKumari, “A New Kind of Cryptosystem Using Polynomials and Fibonacci Numbers,” presented at the International Conference on Computational Sciences – Modelling, Computing and Soft Computing (CSMCS-2022), through online, Department of Mathematics, Manipal Institute of Technology, Manipal, India, 2022.
[22] L Shobana, J BhaskarBabujee, Ismail NaciCangul, “A New Cryptographic Method by Means of Molecular Graph,” Proceedings of the Jangjeon Mathematical Society, vol. 23, no. 4, pp. 503-507, 2020.
[23] “Connections between Graph Theory And Cryptography, Natalia Tokareva G2C2: Graphs and Groups, Cycles and Coverings,” Novosibirsk, Russia, 2426, 2014.
[24] Abdullah K, “Comparison between the RSA Cryptosystem and Elliptic Curve Cryptography,” The University of Waikato, Hamilton, New Zealand.
[25] “Cryptography: A very Short Introduction,“ by Fred Piper and Sean Murthy. E.H.Lock Wood, A single-light on Pascal’s triangle, Math, Gazette, vol. 51, pp. 243-244, 1967.