TY - GEN
T1 - Graph-Based Symmetric Crypto-System for Data Confidentiality
AU - Mishra, Alekha Kumar
AU - Obaidat, Mohammad S.
AU - Puthal, Deepak
AU - Tripathy, Asis Kumar
AU - Choo, Kim Kwang Raymond
N1 - Publisher Copyright:
© 2018 IEEE.
PY - 2018
Y1 - 2018
N2 - The use of cryptography systems in cyber security domain has become a primary focus to maintain data confidentiality. Several cryptography solutions exist for protecting data against confidentiality attack. Due to the advancement of computing infrastructure, there is always a need for novel security solution to protect data and introduce more complexity to the intruder. In this paper, a novel graph-based crypto-system is proposed to provide data confidentiality during communication between users and devices. The proposed crypto-system uses a set of graphs of order n along with an operation defined over it to form a group algebraic structure. Using this group, plaintext, ciphertext, and secret key are represented as a graph. The encryption and decryption processes are performed over the graphs using the operation defined in the group. It is then demonstrated that the proposed crypto-system is valid, and for a large n value, brute-forcing attempts to derive the key from plaintext or ciphertext is computationally infeasible.
AB - The use of cryptography systems in cyber security domain has become a primary focus to maintain data confidentiality. Several cryptography solutions exist for protecting data against confidentiality attack. Due to the advancement of computing infrastructure, there is always a need for novel security solution to protect data and introduce more complexity to the intruder. In this paper, a novel graph-based crypto-system is proposed to provide data confidentiality during communication between users and devices. The proposed crypto-system uses a set of graphs of order n along with an operation defined over it to form a group algebraic structure. Using this group, plaintext, ciphertext, and secret key are represented as a graph. The encryption and decryption processes are performed over the graphs using the operation defined in the group. It is then demonstrated that the proposed crypto-system is valid, and for a large n value, brute-forcing attempts to derive the key from plaintext or ciphertext is computationally infeasible.
KW - cyber security
KW - Data confidentiality
KW - graph-based encryption
UR - http://www.scopus.com/inward/record.url?scp=85063517007&partnerID=8YFLogxK
U2 - 10.1109/GLOCOM.2018.8647844
DO - 10.1109/GLOCOM.2018.8647844
M3 - Conference contribution
AN - SCOPUS:85063517007
T3 - 2018 IEEE Global Communications Conference, GLOBECOM 2018 - Proceedings
BT - 2018 IEEE Global Communications Conference, GLOBECOM 2018 - Proceedings
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2018 IEEE Global Communications Conference, GLOBECOM 2018
Y2 - 9 December 2018 through 13 December 2018
ER -