A Graph-Based Cryptographic Framework Using Complete Graphs and Lower Triangular Identity Key Matrices

Authors

  • Maimoona Safdar Department of Mathematics, COMSATS University Islamabad, Vehari Campus, Vehari, Pakistan Author

DOI:

https://doi.org/10.63623/9m8mm690

Keywords:

Graph, Complete graph, Adjacency matrix, Matrix encryption, Identity matrix

Abstract

In this study, we present a new cryptographic method inspired by the principles of graph theory, offering an innovative way to ensure data security through the use of complete graphs, adjacency matrices, and edge weights. Our approach involves encoding data by mapping it onto weighted complete graphs and performing specific matrix operations on their corresponding adjacency structures. What sets this method apart is the introduction of a lower triangular identity matrix, which serves as a key component in the encryption process. This key design not only strengthens the security of the algorithm but also contributes to its structural simplicity and ease of implementation. The framework we propose takes advantage of the inherent properties of graph theory such as connectivity, symmetry, and weight distribution to provide a mathematically sound and computationally efficient encryption mechanism. Through detailed analysis and a series of practical tests, we demonstrate that the proposed technique is resilient to several well-known cryptographic attacks. Furthermore, its design enables it to be adaptable for various types of digital data, making it a promising tool for modern applications where data protection is critical. By combining theoretical insight with real-world applicability, this paper highlights how classical mathematical concepts can be reimagined to meet the evolving demands of cybersecurity.

References

[1]Lalitha M, Vasu S. A study on graph theory in cryptography using python. Journal of Emerging Technologies and Innovative Research, 2023, 10(4), 97-107.

[2]Ni B, Qazi R, Rehman SU, Farid G. Some graph‐based encryption schemes. Journal of Mathematics, 2021, 2021(1), 6614172. DOI: 10.1155/2021/6614172

[3]Meenakshi A, Mythreyi O, Mrsic L, Kalampakas A, Samanta S. A fuzzy hypergraph-based framework for secure encryption and decryption of sensitive messages. Mathematics, 2025, 13(7), 1049. DOI: 10.3390/math13071049

[4]Bokhary SA, Kharal A, Samman FM, Dalam ME, Gargouri A. Efficient graph algorithms in securing communication networks. Symmetry, 2024, 16(10), 1269. DOI: 10.3390/sym16101269

[5]Xue Y, Chen L, Mu Y, Zeng L, Rezaeibagha F, Deng RH. Structured encryption for knowledge graphs. Information Sciences, 2022, 605, 43-70. DOI: 10.1016/j.ins.2022.05.015

[6]Raghavendran P, Gunasekar T, Gochhait S. Sustainable cryptographic solutions: Enhancing decision-making and security with the pourreza transform. In 2024 International Conference on Decision Aid Sciences and Applications, 2024. DOI: 10.1109/DASA63652.2024.10836613

[7]Khanna A, Kaur S. Evolution of Internet of Things (IoT) and its significant impact in the field of Precision Agriculture. Computers and Electronics in Agriculture, 2019, 157, 218-231. DOI: 10.1016/j.compag.2018.12.039

[8]Ali N, Sadiqa A, Shahzad MA, Imran Qureshi M, Siddiqui HM, Abdallah SA, et al. Secure communication in the digital age: A new paradigm with graph-based encryption algorithms. Frontiers in Computer Science, 2024, 6, 1454094. DOI: 10.3389/fcomp.2024.1454094

[9]Singh P, Acharya B, Chaurasiya RK. A comparative survey on lightweight block ciphers for resource constrained applications. International Journal of High Performance Systems Architecture, 2019, 8(4), 250-270. DOI: 10.1504/IJHPSA.2019.104953

[10]Amudha P, Jayapriya J, Gowri J. An algorithmic approach for encryption using graph labeling. Journal of Physics: Conference Series, 2021, 1770(1), 012072. DOI: 10.1088/1742-6596/1770/1/012072

[11]Chaddad A, Wu Y, Kateb R, Bouridane A. Electroencephalography signal processing: A comprehensive review and analysis of methods and techniques. Sensors, 2023, 23(14), 6434. DOI: 10.3390/s23146434

[12]Beaula C, Venugopal P. Encryption using double vertex graph and matrices. Solid State Technology, 2021, 64(2), 2486-93.

[13]Gupta D, Chandra H, Soni L. An encryption and decryption technique using planar graph with self-invertible matrix. Mathematics in Engineering, Science & Aerospace (MESA), 2024, 15(4), 1335.

[14]Banoth R, Regar R. Security standards for classical and modern cryptography. In Classical and Modern Cryptography for Beginners. Cham: Springer Nature Switzerland, 2023, 47-83. DOI: 10.1007/978-3-031-32959-3_2

[15]Sasikumar K, Nagarajan S. Comprehensive review and analysis of cryptography techniques in cloud computing. IEEE Access, 2024, 12, 52325-52351. DOI: 10.1109/ACCESS.2024.3385449

[16]Klima RE, Klima R, Sigmon NP, Sigmon N. Cryptology: classical and modern. Chapman and Hall/CRC; 2018. DOI: 10.1201/9781315170664

[17]Maqsood F, Ahmed M, Ali MM, Shah MA. Cryptography: a comparative analysis for modern techniques. International Journal of Advanced Computer Science and Applications, 2017, 8(6).

[18]Kaur S, Singh S, Kaur M, Lee HN. A systematic review of computational image steganography approaches. Archives of Computational Methods in Engineering, 2022, 29(7), 4775-4797. DOI: 10.1007/s11831-022-09749-0

[19]Puech W. Multimedia security 2: biometrics, video surveillance and multimedia encryption. John Wiley & Sons; 2022.

[20]Verma SB. Emerging trends in IoT and computing technologies. In Proceedings of the International Conference on Emerging Trends in IoT and Computing Technologies (ICEICT-2022), Lucknow, India. 2022, pp. 338. DOI: 10.1201/9781003350057

[21]Adeniyi AE, Jimoh RG, Awotunde JB. A systematic review on elliptic curve cryptography algorithm for internet of things: Categorization, application areas, and security. Computers and Electrical Engineering, 2024, 118, 109330. DOI: 10.1016/j.compeleceng.2024.109330

[22]Cusack B, Chapman E. Using graphic methods to challenge cryptographic performance. In Johnstone, M. (Ed.). The Proceedings of 14th Australian Information Security Management Conference, 5-6 December, 2016, Edith Cowan University, Perth, Western Australia, 2016, pp.30-36. DOI: 10.4225/75/58a6991e71023

[23]Al Etaiwi WM. Encryption algorithm using graph theory. Journal of Scientific Research and Reports. 2014, 3(19), 2519-2527.

[24]AL-Shakarchy ND, AL-Shahad HF, AL-Nasrawi DA. Cryptographic system based on Unicode. In Journal of Physics: Conference Series, 2018, 1032(1), 012049. DOI: 10.1088/1742-6596/1032/1/012049

[25]Opiłka F, Niemiec M, Gagliardi M, Kourtis MA. Performance analysis of post-quantum cryptography algorithms for digital signature. Applied Sciences, 2024, 14(12), 4994. DOI: 10.3390/app14124994

Downloads

Published

2025-09-05

Issue

Section

Articles