Some Graph - Based Encryption Schemes
Some Graph - Based Encryption Schemes
Journal of Mathematics
Volume 2021, Article ID 6614172, 8 pages
https://doi.org/10.1155/2021/6614172
Research Article
Some Graph-Based Encryption Schemes
1
Mathematics Science Department, Normal University of Mudanjiang, Mudanjiang, Heilongjiang, China
2
Department of Mathematics, COMSATS University, Islamabad, Attock Campus, Pakistan
Received 9 November 2020; Revised 21 December 2020; Accepted 28 December 2020; Published 19 February 2021
Copyright © 2021 Baizhu Ni et al. This is an open access article distributed under the Creative Commons Attribution License,
which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
In today’s technological world, confidentiality is an important issue to deal with, and it is carried out through different pro-
ficiencies. Cryptography is a scientific technique of securing a communication from unauthenticated approach. There exist many
encryption algorithms in cryptography for data security. The need of new nonstandard encryption algorithms has been raised to
prevent the communication from traditional attacks. This paper proposes some new encryption algorithms for secure trans-
mission of messages using some special corona graphs and bipartite graph along with some algebraic properties. These proposed
encryption schemes will lead to more secure communication of secret messages.
which only one vertex is in one partition while all other through an example. However, in Section 3, bipartite graphs
vertices are in second partition, is termed as star graph. A are used to construct a secure encryption scheme with de-
vertex of degree one is named a pendent vertex, and the edge scribed algorithm. This scheme is applicable on important
incident to it is pendent edge. The corona of two graphs G information, shown by an example. In Section 4, a secured
and H is the graph G ⊙ H formed by one copy of G and encryption scheme is described by using a special corona
|V(G)| copies of H, where the i th vertex of G is joined to graph K1 ⊙ Kn , also named as a star graph. Its algorithm is
each vertex in the i th copy of H. This product is an im- mentioned, and application is viewed through an example.
portant operation between graphs, introduced by Frucht and
Harary [5]. The star graph Sn+1 on n + 1 vertices can be seen 2. Secure Data Transfer Using Corona
as a corona graph K1 ⊙ Kn . The corona graph of the cycle Cn Graph Cn ⊙ K1
with K1 , i.e., Cn ⊙ K1 , is a graph on 2n vertices obtained by
attaching n pendant edges in a cycle graph Cn . To initiate the described algorithm, the first step is to take a
Graphs can be used for designing different encryption simple text which is to be transferred and is to be encrypted
algorithms. The interaction between graph theory and before sending. Every letter in data has its unique numeric
cryptography is quite interesting. For applications of graph representation, mentioned in encoding table, which is used
theory in cryptography, refer to [6–9]. The recent past has to encode each alphabetic character. Then, each digit is
seen a growing interest in exploring graphs as a tool to transmuted up to n-place, through shift type of cipher. Now,
propose new methodologies in different areas of cryptography new numeric values ai are obtained. Randomly, some
(see [10–20]). In [10], Selvakumar and Gupta proposed an positive integers bi are selected which are relatively prime
innovative algorithm for encryption and decryption using with ai . By taking inverse of that ai in the modulus of bi ,
connected graphs. In [11], Kedia and Agrawal discussed a new corona graph Cn ⊙ K1 is considered according to length of
encryption algorithm, in which data are secured through simple text with specified outward vertices and allocates the
numeric representation and letters, using basic concepts of resulting inverses to suspended outward vertices, while main
mathematics like Venn diagram. In [12], the authors have vertices are labeled with bi . The final labeled corona graph
proposed a graph-based algorithm for encryption in which Cn ⊙ K1 is the encrypted data, in which the recipient receives
fundamental circuits are chosen with respect to corre- to get required information. Figure 1 replicates the sche-
sponding weights of edges. In [13], Yamuna and Karthika matic diagram of the proposed algorithm.
describe a unique method of transferring data by using bi- Algorithm for encryption is as follows:
partite graph. They constructed a numeric table for the
representation of alphabets. In [14], Al Etaiwi presented a new Give a plain-text word of length n.
symmetric encryption algorithm using cycle graph, complete Give the numerical values to the alphabets of plain-text
graph, and minimum spanning tree. It is reflected in paper word and apply shift cipher; en (x) � x + n(mod26), to
[15] that the authors highlight some vast applications of each numerical value obtained before and get new
bipartite graph in computation. In [16], the authors presented numerical values, say a1 , a2 , a3 , . . ., an .
a scheme for securing a data by giving a new concept of line Find a sequence; b1 , b2 , b3 , . . ., bn of positive integers in
sigraph. Sigraph consists of graphs with sign of edges and increasing order such that gcd(bi , ai ) � 1 and bi > 26.
belongs to {− 1, +1} as their labeled number. In [17], the
Consider a corona graph Cn ⊙ K1 with 2n vertices and
authors proposed a novel bipartite graph-based propagation
allot weights b1 , b2 , b3 , . . ., bn to the vertices, adjacent to
approach to overcome fraud detection in large advertising
pendent vertices randomly.
system. In [18], Razaq et al. used coset diagram for the action
of PSL(2, Z) on projective line over the finite field F 29 to Find the inverse of ai (modbi ) for all i and denote them
construct proposed substitution box (S-box). The strong by ci , i.e., ci � (ai )− 1 (modbi )∀i.
S-box is an important area of research in cryptography. In Give numeric values c1 , c2 , c3 , . . ., cn to pendent
[19], Razaq et al. generated a strong S-box using orbits of coset vertices.
graphs and the action of the symmetric group S256 . In [20], Send this corona graph Cn ⊙ K1 to the receiver.
Selim G. Akl described an algorithm for encrypting a graph
for its secure transmission from a sender to a receiver. Algorithm for decryption is as follows.
Our aim in this work is to describe new encryption The receiver receives the graph, and following steps are
algorithms based on some types of graphs, particularly, the applied to transform the information and get original data:
corona graph Cn ⊙ K1 , K1 ⊙ Kn (also called star graph), and Arrange those vertices which are adjacent to the
the bipartite graph. The proposed algorithms send and re- pendent vertices, in increasing order as
ceive secure messages consisting of words of any length by b1 < b2 < b3 < · · · < bn .
using graphs and certain algebraic properties. After applying
Find the inverse of the weights of pendent vertices ci
prescribed algorithmic steps, data could be fully protected.
modulus their adjacent vertices bi and denote them by
The recipient then gets the labeled graph and eventually
ai for each i.
approaches to the original message.
In Section 2, an encryption scheme is described by using Compute wi � ai − (order of graph/2)mod26, ∀i.
the corona graph Cn ⊙ K1 . Afterwards, an algorithm of this Convert the numeric values wi for each i, to relate
scheme is formulated. Application of this algorithm is studied specific alphabets.
Journal of Mathematics 3
Shifted up to length of
Obtaining original text
text
Considering random
increasing sequence Computing wi (mod 26)
with gcd (bi , ai) = 1 ∀ i
Sending labeled
Corona graph graph Arranging bi in ascending
Cn K1 order
Sender Receiver
Example 1. Let us suppose we have to transfer information, Construct corona graph Cn ⊙ K1 and put value of bi to
i.e., EDGE, encrypting it and then sending it to the recipient. main vertices randomly, as shown in Figure 3.
The starting point is to convert the alphabetic letters into Now, through the below-mentioned step,
numbers of their respective positions through the encoding − 1
table, as shown in Figure 2: c i � ai modbi , (5)
we get
E D G E − 1
. (1) c1 � a1 modb1 � (9)− 1 (mod28) � 25,
5 4 7 5 − 1
c2 � a2 modb2 � (8)− 1 (mod31) � 4,
− 1 (6)
Here, length of word is n � 4. Applying shift cipher c3 � a3 modb3 � (11)− 1 (mod35) � 16,
en � x + n(mod26), we get − 1
c4 � a4 modb4 � (9)− 1 (mod47) � 21.
5 + 4 � 9 � a1 ,
These inverse values are given to the adjacent pendant
4 + 4 � 8 � a2 , vertices of Figure 3, as shown in Figure 4.
(2) Send this labeled graph (Figure 4) to the receiver.
7 + 4 � 11 � a3 , The recipient, after receiving that labeled graph, arranges
5 + 4 � 9 � a4 . the main vertices in ascending order such that
28 < 31 < 35 < 47, (7)
Given word is encrypted in the form
I H K I. (3) and considers these numbers as values of bi such that
b1 < b2 < b3 < b4 . (8)
Selecting random increasing integers bi such that value
of bi > 26: Taking inverses of corresponding pendent vertices with
respect to the value of each bi , as shown in Figure 4, we get
gcd b1 , a1 � gcd(28, 9) � 1, 1
25− (mod28) � 9 � a1 ,
gcd b2 , a2 � gcd(31, 8) � 1, 1
(4) 4− (mod31) � 8 � a2 ,
gcd b3 , a3 � gcd(35, 11) � 1, 1 (9)
16− (mod35) � 11 � a3 ,
1
gcd b4 , a4 � gcd(47, 9) � 1. 21− (mod47) � 9 � a4 .
4 Journal of Mathematics
A B C D E F G H I J K L M
1 2 3 4 5 6 7 8 9 10 11 12 13
N O P Q R S T U V W X Y Z
14 15 16 17 18 19 20 21 22 23 24 25 26
25 21
28 47
28 47
35 31
35 31
16 4
Figure 3 Figure 4
Now, for wi ,
2n
wi � ai − mod26. (10) Take a set Pn of first “n” primes, where
2 n � ⌈(26/k) + k⌉, 2 < k < 13, and k � key (which is fixed
Find values of a1 , a2 , a3 , and a4 : according to length of a word).
Consider a message, for encryption with length S.
2(4)
w 1 � a1 − mod26 � 5 � E, Then, make a table (n − k) × k such that the first value
2
shows number of rows and second value shows the
2(4) number of columns.
w 2 � a2 − mod26 � 4 � D,
2 After that, alphabets are partitioned as
(11) 1 st, 2 nd, 3 rd, . . . , k th position primes. (horizontally)
2(4)
w 3 � a3 − mod26 � 7 � G, while;
2
(k + 1)th, (k + 2)th, (k + 3)th, . . ., nth position primes.
2(4) (vertically)
w 4 � a4 − mod26 � 5 � E.
2 Now, label the alphabets with the integers ri ci ;
ri � row position, ci � column position.
Finally, we get the original text.
Label the entry ij with ri ci , where k + 1 ≤ i ≤ n, 1 ≤ j ≤ k
3. Secure Data Transfer Using Bipartite Graphs Forming each number as vertex of path graph
(according to sequence of letters).
In this section, we propose an encryption algorithm for the Multiplying i.j and then label each vertex with that
secure and confidential communication of messages be- number (say, ap where 1 ≤ p ≤ k). Keeping in view that,
tween two communicating parties. The construction of this one place digits are not taken in column position. In
encryption algorithm is based on bipartite graph and the other words, we say that column position has just 2-
concept of unique factorization domain (UFD). The fol- digit primes.
lowing are the steps of algorithm. Construct a path graph by giving consecutive i, j
Algorithm for encryption is as follows: numbers to each vertex.
Take a UFD with infinite primes. For example, Z. Separate the graph labels as row and column numbers;
Journal of Mathematics 5
Graph is obtained as shown in Figure 7. Let M be the message which is to be encrypted. Length
Now, apply arbitrary weights to the adjacent edges of the is l(say).
bipartite graph in Figure 7, as shown in Figure 8. Here, we have to use shift cipher with formulation:
Send the labeled graph in Figure 8 to the receiving
ek (x) � x + k(mod26). (15)
authority. Then, apply the steps for decryption:
6 Journal of Mathematics
15 5
–81
e2 e4 –9991
–992 –3
e3 e1
4 3
Figure 13
Figure 10
algorithm depends on star graphs. Labeled graphs are sent to
the recipient. It is a best possible way to secure the data.
19 9
5. Conclusion
e2 e4
This work presents graph theoretic-based schemes to im-
prove encryption quality. Three new encryption algorithms
are proposed which are very helpful for secure communi-
cation of secret messages. In the first algorithm, encryption
e3 e1
and decryption is performed by using a specific corona
graph Cn ⊙ K1 along with some basic algebraic properties.
The second algorithm is based on encoding table, bipartite
8 7
graph, and the concept of unique factorization domain
(UFD). In third algorithm, we used a certain labeling of
Figure 11 vertices and edges of the star graph K1 ⊙ Kn . These sym-
metric algorithms use the concept of shared key that must be
predefined and shared between two communicating parties.
We can modify the proposed algorithms, to be applicable for
–81 the communication of sentences or the set of sentences.
–9991 Furthermore, for more complexity, these algorithms could
be improved by using the public key cryptography. More-
over, we can try to implement these algorithms using any
programming language like C++, JAVA, or Microsoft.Net.
–992 –3
Data Availability
Figure 12
There are no additional data required.
Conflicts of Interest
Through this mod operation, we get the values:
7, 19, 8, 9. (24) The authors declare that there are no conflicts of interest.