A Fuzzy Graph Theory Approach to Symmetric Key Cryptography
Main Article Content
Abstract
Today's network relies heavily on cryptography. While exchanging data over a network, data security is a major concern. A high level of confidentiality is required for the data. When transmitting data from one party to another, cryptography hides or manipulates the original data so that no third party can translate it. Today's society relies more on digital technology, which is utilized for a variety of purposes including banking, passwords, e-commerce, etc. Given that graphs are easily transformed into matrices, graph theory is used in the subject of cryptography. In this paper, a modified affine cipher and fuzzy graph are used to convert the message with the symmetric key.
Article Details
Issue
Section
Articles