Published
June 30, 2018
Keywords
- Public key, cryptography, graphs, encryption, network security.
How to Cite
J, D., V, M., & V, B. (2018). Encryption Approach on Graph Theory. Journal of Computational Mathematica, 2(1), 57-63. https://doi.org/10.26524/cm27
Abstract
Graph theory is now being a dominant research area along with number theory, which is primary source for cryptography. In particular, we use the concept of graph theory is being used in areas of cryptography in various ways. In this paper, we use spanning tree concept of graph theory to encrypt the message.
Downloads
Download data is not yet available.