PDF    21

Keywords

Encryption
Decryption
Domination number
Graph theory

Categories

How to Cite

K, K. (2022). Data Encryption using Graph Domination. Scientific Hub of Applied Research in Engineering & Information Technology, 2(3), 27–31. https://doi.org/10.53659/shareit.v2i3.39

Abstract

In this modern world, every industry and organization has tough competition to sustain. So, everyone needs to develop their own ideas to keep their organization exists in good condition. The new technology, innovation and updates are very confidential until it will be declared officially. It is mandatory to maintain the data and communicate the information safe from hackers and other external sources. Encryption and decryption help us to prevent and send the details in safe mode. Using graph theory in cryptography is developing as a promising field. Domination theory in the encryption process is rarely used. A new data encryption method using graph function and control number is discussed in this paper. A sample output using MATLAB program also provided using the same procedure.

https://doi.org/10.53659/shareit.v2i3.39
  
   PDF    21
Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Copyright (c) 2022 Scientific Hub of Applied Research in Engineering & Information Technology

Downloads

Download data is not yet available.

Citations