Encryption Using Fundamental Cut Sets

Abstract -- The data security is most important and its safety is an issue in current world. If encryption helps us to accomplish that, then we are definitely on board. Nearly every computing device we interact with on a daily basis utilizes some form of encryption technology. Graph theory is growing as a promising field for this purpose. In this paper we propose a method of message encryption by using fundamental cut – sets.

Keywords -- Decryption; Encryption; Fundamental cut – sets; Graph

References --



[3].  Monika Polak, Urszula Romanczuk, Vasyl Ustimenko , Aneta Wroblewska :  On the Applications of Extremal Graph Theory to Coding Theory and Cryptography,  Electronic Notes in Discrete Mathematics Vol. 43,  pp  329 – 342, (2013).

[4].  Wael Mahmoud Al Etaiwi: Encryption Algorithm using Graph Theory, Journal of Scientific Research & Reports, 3(19), 2519 – 2527, (2014).

[5].  M. Yamuna, A.  Sankar, Siddarth Ravichandran, V. Harish: Encryption of a Binary String Using Music Notes and Graph theory, International Journal of Engineering & Technology, Vol. 5(3), pp 2920 – 2925 (2013).


[7].  Narsing Deo: Graph theory with Applications to Engineering and Computer Science, Prentice Hall India, 2010.


 Click here tol Download Full Article

About the Author

M. Yamuna

School of Advanced Sciences, VIT University, Vellore, India.

K. Karthika

School of Advanced Sciences, VIT University, Vellore, India.

Dis Estetigi Liposuction Tstanbul Liposuction istanbul Rhinoplasty Turkey rhinoplasty istanbul cosmetic surgery istanbul Bebek Kiyafetleri sac ekimi Burun Estetigi meme buyutme goz kapagi estetigi goz kapagi estetigi meme kucultme Lazer Lipoliz Karin Germe burun estetigi yuz germe burun estetigi meme estetigi Su Kabagi Gourd Lamps somine burun estetigi

Most Viewed - All Categories