Data Security Using Crypto Bipartite Graph Theory with Modified Diffie–Hellman Algorithm

Sharing confidential information over an unprotected channel is prone to privacy breaches since unauthorized parties can steal the data. Therefore, developing a cryptosystem that ensures the security criteria for transmitted data’s secrecy, integrity, and validity is necessary and inevitable. This p...

Full description

Saved in:
Bibliographic Details
Published inWireless personal communications Vol. 139; no. 4; pp. 1905 - 1926
Main Authors Shastri, V. Harsha, Pragathi, C.
Format Journal Article
LanguageEnglish
Published New York Springer US 01.12.2024
Springer Nature B.V
Subjects
Online AccessGet full text
ISSN0929-6212
1572-834X
DOI10.1007/s11277-024-11679-y

Cover

More Information
Summary:Sharing confidential information over an unprotected channel is prone to privacy breaches since unauthorized parties can steal the data. Therefore, developing a cryptosystem that ensures the security criteria for transmitted data’s secrecy, integrity, and validity is necessary and inevitable. This paper proposes a unique graph-based crypto-system to guarantee data integrity during user-to-user communication. In the proposed work, the data is encrypted using a crypto bipartite graph theory (CBGT), which uses a creative strategy to safeguard communication by utilizing the structural characteristics of bipartite graphs. Random key selection may result in poor security and lead the CBGT to potential cryptographic attacks. In a CBGT based cryptosystem, the key is a set of edges that join the vertices belonging to the two sets. Here, improved teacher learning based optimization (iTLBO) is used to select a secure and optimized set of edges, which improves the encryption security without compromising the decryption efficiency. Moreover, a modified Diffie Hellman (m-DH) algorithm is used for key exchange. Here, Euler’s coefficient and modulo inverse are used in the private key generation to strengthen the m-DH security. Python is used to implement the simulations, and the outcomes demonstrate that the proposed method performs better than existing methods like Data Encryption Standard (DES), Advanced Encryption Standard (AES), Blowfish, and Rivest–Shamir–Adleman (RSA) in terms of encryption time, decryption time, execution time and throughput.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:0929-6212
1572-834X
DOI:10.1007/s11277-024-11679-y