• SECURITY USING K6 GRAPH
Abstract
Along with number theory, which is the fundamental source for cryptography, graph theory is currently a dominant academic subject. Graph theory has numerous applications in domains such as network security, coding theory, and the security of communication networks. In this paper, we use techniques of mathematical ideas and concepts of graphs and look at the principles of encryption and decryption. We have used MATLAB for calculations.
Keywords
Complete Graph; Encryption; Decryption; Cryptography; Hamiltonian cycle.
Full Text:
PDFThis work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
© 2010-2024 International Journal of Mathematical Archive (IJMA) Copyright Agreement & Authorship Responsibility |