Skip to main content

ORIGINAL RESEARCH article

Front. Comput. Sci.
Sec. Networks and Communications
Volume 6 - 2024 | doi: 10.3389/fcomp.2024.1454094

Secure Communication in the Digital Age: A New Paradigm with Graph-Based Encryption Algorithms

Provisionally accepted
  • 1 COMSATS University Islamabad, Vehari Campus, Vehari, Pakistan
  • 2 COMSATS University Islamabad, Lahore Campus, Lahore, Punjab, Pakistan
  • 3 King Khalid University, Abha, Saudi Arabia

The final, formatted version of the article will be published soon.

    In the contemporary technological landscape, ensuring confidentiality is a paramount concern addressed through various skillsets. Cryptography stands out as a scientific methodology for safeguarding communication against unauthorized access. Within the realm of cryptography, numerous encryption algorithms have been developed to enhance data security. Recognizing the imperative for nonstandard encryption algorithms to counter traditional attacks, this paper puts forth novel encryption techniques. These methods leverage special corona graphs, star graphs, and complete bipartite graphs, incorporating certain algebraic properties to bolster the secure transmission of messages. The introduction of these proposed encryption schemes aims to elevate the level of security in confidential communication, some of the applications of these schemes are given in the later section.

    Keywords: Encryption algorithms, Decryption, security, Secure Communication, Data transfer, Symmetric cipher

    Received: 24 Jun 2024; Accepted: 10 Oct 2024.

    Copyright: © 2024 Ali, Sadiqa, Shahzad, Imran Qureshi, Siddiqui, ABDALLAH and Abd El-Gawaad. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

    * Correspondence: Nasir Ali, COMSATS University Islamabad, Vehari Campus, Vehari, Pakistan

    Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.