IDEAS home Printed from https://ideas.repec.org/a/ids/ijmore/v30y2025i2p167-184.html
   My bibliography  Save this article

Graph theory for data cryptography security

Author

Listed:
  • Sangeetha Nandigam
  • Perumali Sundarayya

Abstract

This paper explores the use of graph theory in data cryptography security, with a focus on encryption and decryption methods. The proposed approach utilises the double transposition column method with a graph as a key to enhance security and flexibility for various applications. To further improve the efficiency and effectiveness of the proposed algorithm, we introduce GEO and SMO optimisation techniques. GEO optimisation leverages geometric features of the graph to improve the security of the encryption process, while SMO optimisation uses support vector machines to enhance the accuracy of the decryption process. Experimental results show that the proposed approach with GEO and SMO optimisation outperforms traditional encryption methods in terms of security, efficiency, and accuracy. The use of graph theory and optimisation techniques provides a promising solution for secure data transmission and storage in various applications, including banking, electronic commerce, electronic voting, and more.

Suggested Citation

  • Sangeetha Nandigam & Perumali Sundarayya, 2025. "Graph theory for data cryptography security," International Journal of Mathematics in Operational Research, Inderscience Enterprises Ltd, vol. 30(2), pages 167-184.
  • Handle: RePEc:ids:ijmore:v:30:y:2025:i:2:p:167-184
    as

    Download full text from publisher

    File URL: http://www.inderscience.com/link.php?id=145641
    Download Restriction: Access to full text is restricted to subscribers.
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:ids:ijmore:v:30:y:2025:i:2:p:167-184. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sarah Parker (email available below). General contact details of provider: http://www.inderscience.com/browse/index.php?journalID=320 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.