Data Security Using Crypto Bipartite Graph Theory with Modified Diffie–Hellman Algorithm
Sharing confidential information over an unprotected channel is prone to privacy breaches since unauthorized parties can steal the data. Therefore, developing a cryptosystem that ensures the security criteria for transmitted data’s secrecy, integrity, and validity is necessary and inevitable. This p...
        Saved in:
      
    
          | Published in | Wireless personal communications Vol. 139; no. 4; pp. 1905 - 1926 | 
|---|---|
| Main Authors | , | 
| Format | Journal Article | 
| Language | English | 
| Published | 
        New York
          Springer US
    
        01.12.2024
     Springer Nature B.V  | 
| Subjects | |
| Online Access | Get full text | 
| ISSN | 0929-6212 1572-834X  | 
| DOI | 10.1007/s11277-024-11679-y | 
Cover
| Summary: | Sharing confidential information over an unprotected channel is prone to privacy breaches since unauthorized parties can steal the data. Therefore, developing a cryptosystem that ensures the security criteria for transmitted data’s secrecy, integrity, and validity is necessary and inevitable. This paper proposes a unique graph-based crypto-system to guarantee data integrity during user-to-user communication. In the proposed work, the data is encrypted using a crypto bipartite graph theory (CBGT), which uses a creative strategy to safeguard communication by utilizing the structural characteristics of bipartite graphs. Random key selection may result in poor security and lead the CBGT to potential cryptographic attacks. In a CBGT based cryptosystem, the key is a set of edges that join the vertices belonging to the two sets. Here, improved teacher learning based optimization (iTLBO) is used to select a secure and optimized set of edges, which improves the encryption security without compromising the decryption efficiency. Moreover, a modified Diffie Hellman (m-DH) algorithm is used for key exchange. Here, Euler’s coefficient and modulo inverse are used in the private key generation to strengthen the m-DH security. Python is used to implement the simulations, and the outcomes demonstrate that the proposed method performs better than existing methods like Data Encryption Standard (DES), Advanced Encryption Standard (AES), Blowfish, and Rivest–Shamir–Adleman (RSA) in terms of encryption time, decryption time, execution time and throughput. | 
|---|---|
| Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14  | 
| ISSN: | 0929-6212 1572-834X  | 
| DOI: | 10.1007/s11277-024-11679-y |