| Title | Graph-Based Cryptographic Key Generation for Secure Text Encryption |
| Publication Type | Journal Article |
| Year of Publication | 2025 |
| Journal | Güvenlik Bilimleri Dergisi / Journal of Security Sciences |
| Volume | 14 |
| Pagination | 47-68 |
| Type of Article | Research |
| Publication Language | English |
| Authors | GÜR, Y, Gur, H |
| Publisher | Jandarma ve Sahil Güvenlik Akademisi Güvenlik Bilimleri Enstitüsü |
| Place Published | Ankara-Türkiye |
| Keywords | cryptography, decryption, Encryption, Graphs |
| Abstract | The aim of this study is to use a new text encryption technique that provides two-stage secure communication. This encryption technique also aims to reveal the relationship between graph theory and cryptography. In this article, the spanning-tree graph, which is a subgraph of an undirected graph used in graph theory and includes all the vertices of the graph G, will be used. The first phase employs a mono-alphabetic substitution cipher, utilizing predefined character-swapping arrangements between authorized individuals along with an alphabetical encryption table. The next step strengthens security by supporting graph theory for key generation. Specially, the Kruskal algorithm was used to compute the minimum spanning-tree, which enables the creation of an encrypted text with a shared key that is derived from the graph structures. When adjacency matrices, spanning trees, and graph-isomorphism were used, the proposed method strengthened cryptographic security while maintaining effective use of computational resources. The security analysis shows that it is resilient against common cryptographic attacks. This makes it a promising alternative for secure communication and text encryption. |
| DOI | 10.28956/gbd.1669030 |
| Refereed Designation | Refereed |