{"title":"图论矩阵方法在密码学和网络安全中的应用","authors":"Geetha N k, Ragavi V","doi":"10.1109/ACM57404.2022.00025","DOIUrl":null,"url":null,"abstract":"Graph Theory Matrix Approach (GTMA) is moving with great speed into the main stream of computer design, Information sciences, Information and Computer programming, Artificial Intelligence and design, Artificial Intelligent and various field of research. Application of GTMA is in diverse area such as Data structures, Communication networks and their security. A Graph-based approach centres on conserving the environment of security events by breaking down factors of observable data into a graph representation of all cyber vestiges, from all data aqueducts, counting for all once and present data. For secret communication, Ciphers can be converted into graphs. The Application of Graph Theory plays a vital role in various field of Engineering and Sciences. Especially Graph theory is commonly used as a tool of encryption. In this article some survey has been work done in the field of Cryptography and Network security is given.","PeriodicalId":322569,"journal":{"name":"2022 Algorithms, Computing and Mathematics Conference (ACM)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Graph Theory Matrix Approach in Cryptography and Network Security\",\"authors\":\"Geetha N k, Ragavi V\",\"doi\":\"10.1109/ACM57404.2022.00025\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Graph Theory Matrix Approach (GTMA) is moving with great speed into the main stream of computer design, Information sciences, Information and Computer programming, Artificial Intelligence and design, Artificial Intelligent and various field of research. Application of GTMA is in diverse area such as Data structures, Communication networks and their security. A Graph-based approach centres on conserving the environment of security events by breaking down factors of observable data into a graph representation of all cyber vestiges, from all data aqueducts, counting for all once and present data. For secret communication, Ciphers can be converted into graphs. The Application of Graph Theory plays a vital role in various field of Engineering and Sciences. Especially Graph theory is commonly used as a tool of encryption. In this article some survey has been work done in the field of Cryptography and Network security is given.\",\"PeriodicalId\":322569,\"journal\":{\"name\":\"2022 Algorithms, Computing and Mathematics Conference (ACM)\",\"volume\":\"39 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 Algorithms, Computing and Mathematics Conference (ACM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ACM57404.2022.00025\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 Algorithms, Computing and Mathematics Conference (ACM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ACM57404.2022.00025","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Graph Theory Matrix Approach in Cryptography and Network Security
Graph Theory Matrix Approach (GTMA) is moving with great speed into the main stream of computer design, Information sciences, Information and Computer programming, Artificial Intelligence and design, Artificial Intelligent and various field of research. Application of GTMA is in diverse area such as Data structures, Communication networks and their security. A Graph-based approach centres on conserving the environment of security events by breaking down factors of observable data into a graph representation of all cyber vestiges, from all data aqueducts, counting for all once and present data. For secret communication, Ciphers can be converted into graphs. The Application of Graph Theory plays a vital role in various field of Engineering and Sciences. Especially Graph theory is commonly used as a tool of encryption. In this article some survey has been work done in the field of Cryptography and Network security is given.