Title: Graph theory for data cryptography security

Authors: Sangeetha Nandigam; Perumali Sundarayya

Addresses: Department of Mathematics, GITAM (Deemed to be University), Visakhapatnam, Andhra Pradesh, 530003, India ' Department of Mathematics, GITAM (Deemed to be University), Visakhapatnam, Andhra Pradesh, 530003, India

Abstract: This paper explores the use of graph theory in data cryptography security, with a focus on encryption and decryption methods. The proposed approach utilises the double transposition column method with a graph as a key to enhance security and flexibility for various applications. To further improve the efficiency and effectiveness of the proposed algorithm, we introduce GEO and SMO optimisation techniques. GEO optimisation leverages geometric features of the graph to improve the security of the encryption process, while SMO optimisation uses support vector machines to enhance the accuracy of the decryption process. Experimental results show that the proposed approach with GEO and SMO optimisation outperforms traditional encryption methods in terms of security, efficiency, and accuracy. The use of graph theory and optimisation techniques provides a promising solution for secure data transmission and storage in various applications, including banking, electronic commerce, electronic voting, and more.

Keywords: graph theory; cryptography; encryption; decryption; secure data transmission; golden eagle optimiser; GEO; slime mould optimise; SMO.

DOI: 10.1504/IJMOR.2025.145641

International Journal of Mathematics in Operational Research, 2025 Vol.30 No.2, pp.167 - 184

Received: 06 Apr 2023
Accepted: 23 Apr 2023

Published online: 09 Apr 2025 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article