Title: Graph theory for data cryptography security
Authors: Sangeetha Nandigam; Perumali Sundarayya
Addresses: Department of Mathematics, GITAM (Deemed to be University), Visakhapatnam, Andhra Pradesh, 530003, India ' Department of Mathematics, GITAM (Deemed to be University), Visakhapatnam, Andhra Pradesh, 530003, India
Abstract: This paper explores the use of graph theory in data cryptography security, with a focus on encryption and decryption methods. The proposed approach utilises the double transposition column method with a graph as a key to enhance security and flexibility for various applications. To further improve the efficiency and effectiveness of the proposed algorithm, we introduce GEO and SMO optimisation techniques. GEO optimisation leverages geometric features of the graph to improve the security of the encryption process, while SMO optimisation uses support vector machines to enhance the accuracy of the decryption process. Experimental results show that the proposed approach with GEO and SMO optimisation outperforms traditional encryption methods in terms of security, efficiency, and accuracy. The use of graph theory and optimisation techniques provides a promising solution for secure data transmission and storage in various applications, including banking, electronic commerce, electronic voting, and more.
Keywords: graph theory; cryptography; encryption; decryption; secure data transmission; golden eagle optimiser; GEO; slime mould optimise; SMO.
DOI: 10.1504/IJMOR.2025.145641
International Journal of Mathematics in Operational Research, 2025 Vol.30 No.2, pp.167 - 184
Received: 06 Apr 2023
Accepted: 23 Apr 2023
Published online: 09 Apr 2025 *