Graph-Based Symmetric Crypto-System for Data Confidentiality

Alekha Kumar Mishra, Mohammad S. Obaidat, Deepak Puthal, Asis Kumar Tripathy, Kim Kwang Raymond Choo

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations


The use of cryptography systems in cyber security domain has become a primary focus to maintain data confidentiality. Several cryptography solutions exist for protecting data against confidentiality attack. Due to the advancement of computing infrastructure, there is always a need for novel security solution to protect data and introduce more complexity to the intruder. In this paper, a novel graph-based crypto-system is proposed to provide data confidentiality during communication between users and devices. The proposed crypto-system uses a set of graphs of order n along with an operation defined over it to form a group algebraic structure. Using this group, plaintext, ciphertext, and secret key are represented as a graph. The encryption and decryption processes are performed over the graphs using the operation defined in the group. It is then demonstrated that the proposed crypto-system is valid, and for a large n value, brute-forcing attempts to derive the key from plaintext or ciphertext is computationally infeasible.

Original languageBritish English
Title of host publication2018 IEEE Global Communications Conference, GLOBECOM 2018 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781538647271
StatePublished - 2018
Event2018 IEEE Global Communications Conference, GLOBECOM 2018 - Abu Dhabi, United Arab Emirates
Duration: 9 Dec 201813 Dec 2018

Publication series

Name2018 IEEE Global Communications Conference, GLOBECOM 2018 - Proceedings


Conference2018 IEEE Global Communications Conference, GLOBECOM 2018
Country/TerritoryUnited Arab Emirates
CityAbu Dhabi


  • cyber security
  • Data confidentiality
  • graph-based encryption


Dive into the research topics of 'Graph-Based Symmetric Crypto-System for Data Confidentiality'. Together they form a unique fingerprint.

Cite this