Applications of Graph Transformations in Cryptography: A Secure Encoding Framework for Data Communication
DOI:
https://doi.org/10.63623/9917ce44Keywords:
Cyclic graph, Path graph, Adjacency matrix, Matrix encryptionAbstract
In this paper, we introduce a novel and decentralized cryptographic approach that innovatively integrates concepts from graph theory specifically, the transformation of cycle graphs into path graphs alongside the strategic application of adjacency matrices, to ensure robust and secure data communication. The proposed method efficiently encodes textual data into graph-based representations, offering the capability to encrypt both individual words and complete sentences. This encoding not only preserves the original semantic structure but also enhances adaptability for various data types and formats commonly encountered in digital systems. A core component of this technique is its matrix-based encryption mechanism, which provides a highly secure framework resistant to a wide range of classical cryptographic attacks, including brute-force, known-plaintext, and frequency analysis methods. The encryption and decryption processes leverage the structural properties of graph matrices to conceal information effectively, ensuring confidentiality and integrity throughout the transmission. To substantiate the strength and reliability of the approach, we conduct both theoretical analysis and practical implementation, demonstrating that the scheme offers superior data protection and resilience against unauthorized access. Additionally, this work presents a fresh perspective on cryptographic systems by fusing graph theoretical principles with modern encryption techniques. This interdisciplinary synergy opens new pathways for solving contemporary cybersecurity problems, offering a promising direction for the development of future secure communication protocols in various real-world applications.
References
[1]Lalitha M, Vasu S. A study on graph theory in cryptography using python. Journal of Emerging Technologies and Innovative Research, 2023, 10(4), 97-107.
[2]Subramani S, M S, A K, Svn SK. Review of security methods based on classical cryptography and quantum cryptography. Cybernetics and Systems, 2025, 56(3), 302-320. DOI: 10.1080/01969722.2023.2166261
[3]Acharya B, Rath GS, Patra SK, Panigrahy SK. Novel methods of generating self-invertible matrix for hill cipher algorithm. https://dspace.nitrkl.ac.in/dspace/handle/2080/620
[4]Bokhary SA, Kharal A, Samman FM, Dalam ME, Gargouri A. Efficient graph algorithms in securing communication networks. Symmetry, 2024, 16(10), 1269. DOI: 10.3390/sym16101269
[5]Xue Y, Chen L, Mu Y, Zeng L, Rezaeibagha F, Deng RH. Structured encryption for knowledge graphs. Information Sciences, 2022, 605, 43-70. DOI: 10.1016/j.ins.2022.05.015
[6]Raghavendran P, Gunasekar T, Gochhait S. Sustainable cryptographic solutions: Enhancing decision-making and security with the pourreza transform. In 2024 International Conference on Decision Aid Sciences and Applications (DASA), Manama, Bahrain, 2024, pp. 1-7. DOI: 10.1109/DASA63652.2024.10836613
[7]Yesodha K, Krishnamurthy M, Thangaramya K, Kannan A. Elliptic curve encryption-based energy-efficient secured ACO routing protocol for wireless sensor networks. The Journal of Supercomputing, 2024, 80(13), 18866-99. DOI: 10.1007/s11227-024-06235-1
[8]Sen A, Heng SH, Tan SC. A comprehensive review of cryptographic techniques in federated learning for secure data sharing and applications. IEEE Access, 2025, 13, 135138 - 135164. DOI: 10.1109/ACCESS.2025.3593953
[9]Singh AK, Siddiqui ZA, Singh S, Singh AK, Siddiqui TJ. Recent advances in computational intelligence and cyber security, 1st ed.; Taylor & Francis Group: London, UK, 2024.
[10]Amudha P, Jayapriya J, Gowri J. An algorithmic approach for encryption using graph labeling. Journal of Physics: Conference Series, 2021, 1770, 012072. DOI: 10.1088/1742-6596/1770/1/012072
[11]Islam MS, Rahman MA, Bin Ameedeen MA, Ajra H, Ismail ZB, Zain JM. Blockchain-enabled cybersecurity provision for scalable heterogeneous network: A comprehensive survey. CMES-Computer Modeling in Engineering & Sciences, 2024, 138(1), 43-123. DOI: 10.32604/cmes.2023.028687
[12]Beaula C, Venugopal P. Encryption using double vertex graph and matrices. Solid State Technology, 2021, 64(2), 2486-2493.
[13]Mohan P, Rajendran K, Rajesh A. An encryption technique using a complete graph with a self-invertible matrix. Journal of Algebraic statistics, 2022, 13(3), 1821-1826.
[14]Banoth R, Regar R. Security standards for classical and modern cryptography. In Classical and Modern Cryptography for Beginners; Springer, Cham, Switzerland, 2023, pp. 47-83.
[15]Sasikumar K, Nagarajan S. Comprehensive review and analysis of cryptography techniques in cloud computing. IEEE Access, 2024, 12, 52325-52351. DOI: 10.1109/ACCESS.2024.3385449
[16]Klima R, Klima RE, Sigmon N, Sigmon NP. Cryptology: classical and modern, 2nd ed.; Taylor & Francis Group: New York, USA, 2018, pp. 496.
[17]Gupta D, Chandra H, Soni L. An encryption and decryption technique using planar graph with self-invertible matrix. Mathematics in Engineering, Science & Aerospace (MESA), 2024, 15(4), 1335.
[18]Kaur S, Singh S, Kaur M, Lee HN. A systematic review of computational image steganography approaches. Archives of Computational Methods in Engineering, 2022, 29(7), 4775-4797. DOI: 10.1007/s11831-022-09749-0
[19]Kottarathil J, Naduvath S, Kureethara JV. Graph theory and decomposition, 1st ed.; Taylor & Francis Group: New York, USA, 2024, pp. 200. DOI: 10.1201/9781003391678
[20]Tripathi SL, Agarwal D, Verma SB, Dwivedi S, Prakash KB, Singh BK. Emerging trends in IoT and computing technologies, 1st ed.; Taylor & Francis Group: London, UK, 2023, pp. 338. DOI:10.1201/9781003350057
[21]Adeniyi AE, Jimoh RG, Awotunde JB. A systematic review on elliptic curve cryptography algorithm for internet of things: Categorization, application areas, and security. Computers and Electrical Engineering, 2024, 118, 109330. DOI: 10.1016/j.compeleceng.2024.109330
[22]Cusack B, Chapman E. Using graphic methods to challenge cryptographic performance. The Proceedings of 14th Australian Information Security Management Conference, Edith Cowan University, Perth, Western Australia, 2016, pp.30-36. DOI: 10.4225/75/58a6991e71023
[23]Al Etaiwi WM. Encryption algorithm using graph theory. Journal of Scientific Research and Reports, 2014, 3(19), 2519-2527.
[24]Zainol ZN, Yatin SF, Sani MK. Improving the security and privacy in malaysia academic digital libraries. Journal of Information and Knowledge Management, 2025, 15(SI2),132-145. DOI: 10.24191/jikm.v15iSI2.7819
[25]Opiłka F, Niemiec M, Gagliardi M, Kourtis MA. Performance analysis of post-quantum cryptography algorithms for digital signature. Applied Sciences, 2024, 14(12), 4994. DOI: 10.3390/app14124994
[26]Qasem MA, Thabit F, Can O, Naji E, Alkhzaimi HA, Patil PR, et al. Cryptography algorithms for improving the security of cloud‐based internet of things. Security and Privacy, 2024, 7(4), e378. DOI: 10.1002/spy2.378
[27]Silva C, Cunha VA, Barraca JP, Aguiar RL. Analysis of the cryptographic algorithms in IoT communications. Information Systems Frontiers, 2024, 26(4), 1243-1260. DOI: 10.1007/s10796-023-10383-9
[28]Radhakrishnan I, Jadon S, Honnavalli PB. Efficiency and security evaluation of lightweight cryptographic algorithms for resource-constrained IoT devices. Sensors, 2024, 24(12), 4008. DOI: 10.3390/s24124008
[29]Zhang C, Liang Y, Tavares A, Wang L, Gomes T, Pinto S. An improved public key cryptographic algorithm based on chebyshev polynomials and RSA. Symmetry, 2024, 16(3), 263. DOI: 10.3390/sym16030263
[30]Ibrahim MM, Venkatesan R, Ali N, Qureshi MI, Siddiqui HM, Tolasa FT, et al. Enhanced image hash using cellular automata with sponge construction and elliptic curve cryptography for secure image transaction. Scientific Reports, 2025, 15(1), 14148. DOI: 10.1038/s41598-025-98027-7
[31]Zeng T, Ye Y, Chen Y, Zhu D, Huang Y, Huang Y, et al. Deep hashing and attention mechanism-based image retrieval of osteosarcoma scans for diagnosis of bone cancer. Journal of Bone Oncology, 2024, 49, 100645. DOI: 10.1016/j.jbo.2024.100645
[32]Weerarathna MD, Perera AA, Ranasinghe PG. A novel cryptosystem using multipartite graphs. Proceedings of the International Conference on Business Excellence, 2022, 590-594.
[33]Ranasinghe PG, Bandara RM, Athapaththtu AM. Symmetric encryption using snake graphs and supermagic covering. Journal of the National Science Foundation of Sri Lanka, 2025, 52(4), 435-440. DOI: 10.4038/jnsfsr.v52i4.12196
[34]Ali N, Sadiqa A, Shahzad MA, Imran Qureshi M, Siddiqui HM, Abdallah SA, et al. Secure communication in the digital age: A new paradigm with graph-based encryption algorithms. Frontiers in Computer Science, 2024, 6, 1454094. DOI: 10.3389/fcomp.2024.1454094
[35]Obayes KK. Text encryption with graph theory based key generation. Journal of Al-Qadisiyah for Computer Science and Mathematics, 2024, 16(3), 26-35. DOI: 10.29304/jqcsm.2024.16.31650
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Nasir Ali, Muhammad Touseef Haider , Mazhar Ahmad , Muhammad Irfan, Muhammad Imran Qureshi, Hafiz Muhammad Afzal Siddiqui (Author)

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.