Loading

Ciphering and Deciphering Messages by Graph Labeling Techniques Through Multilevel Cryptosystem
B. Deepa1, V. Maheswari2

1B. Deepa, Research Scholar, Department of Mathematics, Vels Institute of Science, Technology & Advanced Studies (VISTAS), Chennai (Tamil Nadu), India.
2V. Maheswari, Associate Professor, Department of Mathematics, Vels Institute of Science, Technology & Advanced Studies (VISTAS), Chennai (Tamil Nadu), India.
Manuscript received on 18 January 2020 | Revised Manuscript received on 01 February 2020 | Manuscript Published on 05 February 2020 | PP: 33-39 | Volume-8 Issue-4S5 December 2019 | Retrieval Number: D10131284S519/2019©BEIESP | DOI: 10.35940/ijrte.D1013.1284S519
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In this paper we present an upgraded technique of coding a message using Multilevel Cryptosystem based on Four square Cipher, Mono alphabetic Substitution Cipher and Columnar Transposition cipher subjected to Graph labeling. We send our Cipher text in the form of graph pattern which admits Root cube mean labeling. Further by using the secret key the receiver decrypts the edge labels which is shared by the sender. Here we employ Symmetric key cryptosystem for both encryption and decryption of messages as both the sender as well as thereceiver shares the same key for encryption and decryption of messages. In this research work we performed Multilevel Cryptographic technique together with Graph Labeling concept to save the messages from third party or Hackers ensuring secure transmission of messages.
Keywords: Plaintext, Cipher Text, Four Square Cipher Encryption, Mono Alphabetic Substitution Cipher and Columnar Transposition Cipher, Umbrella Graph, Root Cube Meanlabeling. AMS Subject Classification MSC (2010) No: 05C78.
Scope of the Article: Cryptography and Applied Mathematics