{"title":"Radio mean labeled paths in Cryptography","authors":"M. Saraswathi, K. Meera","doi":"10.1109/PhDEDITS56681.2022.9955298","DOIUrl":null,"url":null,"abstract":"Graph coloring or labeling is an NP-complete problem. The labeling technique in the scope of this paper is radio mean labeling. We integrate the radio mean labeling of graphs with the encryption/decryption process using matrices. An intruder can easily crack the secret message if the matrix or its inverse is known. The unique radio mean number of a graph is used to construct the key matrix for encryption. The inverse of this matrix is then the matrix for decryption. Out of all graphs of a given order, graphs isomorphic to path graphs have the maximum diameter. Since the mathematical constraint associated with the radio mean labeling of any given graph depends solely on the graph’s order and diameter, deriving the radio mean number of paths is difficult as order increases. Hence, we choose path graphs for constructing the key matrix for encryption.","PeriodicalId":373652,"journal":{"name":"2022 IEEE 4th PhD Colloquium on Emerging Domain Innovation and Technology for Society (PhD EDITS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 4th PhD Colloquium on Emerging Domain Innovation and Technology for Society (PhD EDITS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PhDEDITS56681.2022.9955298","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Graph coloring or labeling is an NP-complete problem. The labeling technique in the scope of this paper is radio mean labeling. We integrate the radio mean labeling of graphs with the encryption/decryption process using matrices. An intruder can easily crack the secret message if the matrix or its inverse is known. The unique radio mean number of a graph is used to construct the key matrix for encryption. The inverse of this matrix is then the matrix for decryption. Out of all graphs of a given order, graphs isomorphic to path graphs have the maximum diameter. Since the mathematical constraint associated with the radio mean labeling of any given graph depends solely on the graph’s order and diameter, deriving the radio mean number of paths is difficult as order increases. Hence, we choose path graphs for constructing the key matrix for encryption.