A Fuzzy Graph Theory Approach to Symmetric Key Cryptography

Main Article Content

C. Ruby Sharmila, S. Meenakshi

Abstract

Today's network relies heavily on cryptography. While exchanging data over a network, data security is a major concern. A high level of confidentiality is required for the data. When transmitting data from one party to another, cryptography hides or manipulates the original data so that no third party can translate it. Today's society relies more on digital technology, which is utilized for a variety of purposes including banking, passwords, e-commerce, etc. Given that graphs are easily transformed into matrices, graph theory is used in the subject of cryptography. In this paper, a modified affine cipher and fuzzy graph are used to convert the message with the symmetric key.

Article Details

Section
Articles