Vol. 2 No. 1 (2018): Vol 2, Iss 1, Year 2018
Encryption Approach on Graph Theory
Published June 30, 2018
- Public key, cryptography, graphs, encryption, network security.
How to Cite
J, D., V, M., & V, B. (2018). Encryption Approach on Graph Theory. Journal of Computational Mathematica, 2(1), 57-63. https://doi.org/10.26524/cm27
Graph theory is now being a dominant research area along with number theory, which is primary source for cryptography. In particular, we use the concept of graph theory is being used in areas of cryptography in various ways. In this paper, we use spanning tree concept of graph theory to encrypt the message.
Download data is not yet available.