Scholar Bank >
Applied Sciences >
Information Resources on Mathematics >
Please use this identifier to cite or link to this item:
|Title: ||A Cryptographic Method to Send a Secret Route or Map to a Receiver Using Concepts in Graph Theory and Number Theory|
|Authors: ||Wickramasooriya, S.A.S.S.|
De Silva, T.P.
|Keywords: ||Cipher tex|
|Issue Date: ||Dec-2015|
|Citation: ||Wickramasooriya, S.A.S.S., Weerasekara, T.M., Lanel, G.H.J., De Silva, T.P., & Ganegoda, N.C. (2015). A Cryptographic Method to Send a Secret Route or Map to a Receiver Using Concepts in Graph Theory and Number Theory. International Journal of Engineering and Applied Sciences (IJEAS), 2(12), 103-108.|
|Abstract: ||Even though new solutions for problematic situations arising from security norms are developing day by day, possibly there are some issues remaining on our hand yet to be tackled. Among those one of the major problem for almost every country might experience is routing and mapping secrecy. In detail, when sending someone’s route of some places or sending a map of protectorate places, its secrecy is the most important factor to be considered. In this study a system is developed which could be used to send a route of a particular person or a map of some specific secret place in a secret manner. Concepts in graph theory and number theory together with some cryptographic algorithms are used to develop this system. In brief, the route or map is transformed into a graph which might be directed or non-directed. Then it simplified in to a numerical value which could be encrypted by applying particular encrypting algorithm. Thereafter, encrypted numerical code is sent to the receiver. Once receiver receives that unreadable code then he/she applies decrypting algorithm on that to obtain the original numerical value. Finally, the graph can be derived from that numerical value and it could be regarded as the map or route that has been sent. However different methods are followed to send the map or route due to the directivity of the graph. Although there are some restrictions and assumptions which have been made during the process, there may be possibilities to further improve this system.|
|Appears in Collections:||Information Resources on Mathematics|
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.