Professional Documents
Culture Documents
A Novel Encryption Algorithm Using Skol em Graceful
A Novel Encryption Algorithm Using Skol em Graceful
net/publication/380517233
CITATIONS READS
0 24
3 authors:
Rajitha Ranasinghe
University of Peradeniya
50 PUBLICATIONS 31 CITATIONS
SEE PROFILE
All content following this page was uploaded by Rajitha Ranasinghe on 12 May 2024.
1
ANNUAL INTERNATIONAL CONFERENCE ON BUSINESS INNOVATION (ICOBI) 2023
called edges. Graph labeling is a notable But in public-key cryptography, the sender
technique (Ni at el., 2021) because it is encrypts the message using a key which is
helpful to solve many applications such as called the public key and when the receiver
the radio labeling method can be used to receives the encrypted message, it can be
find best places to establish signal towers. decrypted using a secret key called the
The Skolem graceful labeling is a prominent private key.
labeling method which was introduced by
S.M. Lee and S.C. Shee following the idea In this study, we encrypt the message into
of Skolem sequence (Lee at el., 1991). A ciphertext by introducing cryptography
graph is said to be Skolem graceful graph, polyalphabetic method by using the
if there exists a function 𝑓 called a Skolem knowledge in graph theory. This method is
graceful labeling such that there is a developed using Skolem graceful graph
bijective function 𝑓: 𝑉 ⟶ {1,2, … , |𝑉|} and labeling which is a modified version of
the induced labeling 𝑔: 𝐸 ⟶ {1,2, … , |𝐸|} graceful labeling method. Here we have
defined by 𝑔(𝑢𝑣) = |𝑓(𝑢) − 𝑓(𝑣)|, ∀ 𝑢𝑣 ∈ used a special graph Lobster graph 𝐿3 (2,4)
𝐸 is also bijective (Lee at el., 1987). which have a Skolem graceful labeling
(Urnika at el.,2021). In the next section we
Cryptology is the art that protects the explain the method of algorithm in detail
confidentiality of messages by creating and discuss it using a simple example.
codes and solving them. It has two main
areas known as Cryptography and 2. MATERIALS AND METHODS
Cryptanalysis. Cryptography is the method 2.1 Preliminaries
of protecting information by converting to
unreadable format called ciphertext and this In this section we provide some
process is known as encryption. On the fundamental definitions that are used to the
other hand, Cryptoanalysis is an art how to proposed encryption technique.
recover encrypted messages to readable 2.1.1 A Lobster graph
format by doing complex study. The
A regular lobster graph 𝐿𝑛 (𝑞, 𝑟) is lobster
original message called as plaintext and the
graph with 𝑛 vertices on backbone path,
method to obtain plaintext from ciphertext
each of which is connected to 𝑞 hand
is called decryption. Cryptosystems can be
vertices, and each hand vertex is connected
divided into two main sections; symmetric
to 𝑟 finger vertices, 𝑛 ≥ 2. Figure 1 shows
and asymmetric or private and public, to
the lobster graph of 𝐿3 (2,4).
maintain consistency. Most of the
symmetric-key algorithms are classical 2.1.2 Graceful labeling
cryptosystems, in which the sender and the
A graceful labeling of a graph 𝐺 is a vertex
receiver use the same key to encrypt and
labeling 𝑓: 𝑉 ⟶ {0,1,2, … , |𝐸|} such that 𝑓
decrypt a message. The cryptography
is injective and the edge labeling 𝑔: 𝐸 ⟶
polyalphabetic method is a famous method
{1,2, … , |𝐸|} defined by 𝑔(𝑢𝑣) =
based on substitution of many variables for
|𝑓(𝑢) − 𝑓(𝑣)|, ∀ 𝑢𝑣 ∈ 𝐸 is also injective.
the characters in plaintext (Ni at el., 2021).
2
ANNUAL INTERNATIONAL CONFERENCE ON BUSINESS INNOVATION (ICOBI) 2023
3
ANNUAL INTERNATIONAL CONFERENCE ON BUSINESS INNOVATION (ICOBI) 2023
numbers 27, 28, 29, 30, 31, 32, and 33. number 𝑙. The first encoding column is
Similarly, assign letters and special obtained from the letters that are in the
adjacent edges related to each vertex. Next,
characters to the edges in the graph. Note use a shifting key say 𝑘 to shift the letters in
that, since the number of vertices is larger each column vertically.
than the number of edges by one, assign the Step 4:
last two assignments of special characters Finally, using the polyalphabetic table,
convert the original message into the
to the last edge. The symbol “−” represent
ciphertext. Then, send the ciphertext to the
the space between any two words. receiver with the key (𝐺, 𝑙, 𝑘). Here,
𝐺, 𝑙, and 𝑘 represent the Skolem graceful
The following diagram shows the English labeled graph, the number of sizes of the
and special character assignment to the block, and the shifting value respectively.
Lobster graph 𝐿3 (2,4).
Plaintext Ciphertext
a - o b j ? u
b . n c p , t
c u m d q ( s
d t l k w ) r
e s f g x / v
f r e h y - o
g v a i z . n
h o b j ? u m
i n c p , t l
j m d q ( s f
k l k w ) r e
l f g x / v a
m e h y - o b
n a i z . n c
o b j ? u m d
p c p , t l k
q d q ( s f g
r k w ) r e h
s g x / v a i
Figure 2. The English letters and special characters labeling t h y - o b j
method for Lobster graph 𝐿3 (2,4). u i z . n c p
v j ? u m d q
Step 3:
w p , t l k w
Using Figure 2, we construct a table to
x q ( s f g x
obtain the ciphertext. The letters in the first
column in the table is considered as the y w ) r e h y
letters of the plaintext that obtain from z x / v a i z
vertex characters of the graph. Then the . y - o b j ?
message is divided into equal number of - z . n c p ,
blocks of the same size (𝑙). If the size of , ? u m d q (
the block is less than l, then add "/" to ( , t l k w )
complete the required size of the block. The ) ( s f g x /
number of encoding columns in the / ) r e h y -
polyalphabetic table are equal to the
4
ANNUAL INTERNATIONAL CONFERENCE ON BUSINESS INNOVATION (ICOBI) 2023
Table 1. The polyalphabetic ciphertext for Table 3. 6 equal blocks with size 6 for the
the key (𝐿3 (2,4), 6,7). ciphertext.
2.2.2 Decryption Algorithm
Therefore, the ciphertext is “hosztfc-
Step 1: khesahzbr.e-hosh-hnugz,ibc(”.
According to the key, identify the terms in 4. CONCLUSION
(𝐺, 𝑙, 𝑘). Then assign characters according Cryptography is used to transmit data in a
to the second step in the encryption secure manner. Encryption algorithms are
algorithm. used to transform any given message from
Step 2: readable format to unreadable format and
Construct the polyalphabetic table using the decryption algorithm is used to recover
values 𝑙 and 𝑘. them. In this study, we have introduced
Step 3: symmetric key encryption and decryption
Finally, find the suitable letters from the algorithm by using graph labelling concepts
constructed table and then the ciphertext with generating a key for the ciphertext.
Two different methods were used to
can be converted into the plaintext.
construct a polyalphabetic table. First, using
3. RESULT AND DISCUSSION the Skolem graceful labeled graph,
In this study, a developed encryption construct the polyalphabetic table by
algorithm is introduced using the labeling dividing the plaintext into equal number of
method known as Skolem graceful labeling blocks of the same size (𝑙). When the table
in Graph Theory. The method is described is constructed, identify the terms 𝐺, and
using the plaintext “The Department of term 𝑘 that helps to generate key. Then,
Mathematics. (UOP)”. convert the plaintext into the cihpertext and
First, substitute “-” symbol for spaces in send it to the receiver with the key (𝐺, 𝑙, 𝑘).
your plaintext and divide it into size 6 equal In future, we are trying to extend the
blocks. Then 𝑙 = 6. present study for an encryption algorithm
The-Department-of-Mathematics.-(UOP) by using graph factorizations and different
graph labeling methods to obtain the
The-De partme nt-of- ciphertext.
5
ANNUAL INTERNATIONAL CONFERENCE ON BUSINESS INNOVATION (ICOBI) 2023
REFERENCES
Lee, S.M., and Shee,S.C.(1991).On Skolem graceful
graphs. Discrete Math. 93, 195-200.
Lee, S.M., and Wui,I.(1987).Skolem gracefulness of
2-stars and 3-stars.Bulletin of Malaysian Math.
Society, 10, 15-20.
Ni, B., Qazi, R., Rehman, S. U., and Farid, G. (2021).
Some Graph-Based Encryption
Schemes.Hindawi Journal of Mathematics, 1-8.
Pasaribu, M., Yundari, and Ilyas, M. (2021). Graceful
Labeling and Skolem Graceful Labeling on the
U-star Graph and It’s Application in
Cryptography.Jambura Journal of Mathematics,
Jambura J. Math. Vol. 3, pp.103-114.
Sakthivel, S., and Karpagam, T. R. (2017). Prime
Labeling of Some New Standard Graphs. Paripex
- Indian Journal of Research, Vol. 6, Issue 2, pp.
343-345.
Thennakoon,T. R. D. S. M., Weerarathna, M. D. M. C.
P., and Perera,A. A. I., (2020).Prime Labeling of
Newly Constructed Graph Using Star Graphs and
Complete Bipartite Graphs.Sumerianz Journal of
Scientific Research, Vol. 3, No. 2, pp. 10-17.
Urnika, D. A., and Purwanto, (2021). Skolem Graceful
Labeling of Lobster Graph 𝐿𝑛 (2, 𝑟). The 4th
International Conference on Mathematics and
Science Education (ICoMSE) 2020, AIP
conference Proceeding 2330, 070014.