Research Article

GRAPH-BASED CRYPTOGRAPHIC KEY GENERATION FOR SECURE TEXT ENCRYPTION

Number: Kolluk Uygulamaları ve Güvenlik Teknolojileri Özel Sayısı October 27, 2025
EN TR

GRAPH-BASED CRYPTOGRAPHIC KEY GENERATION FOR SECURE TEXT ENCRYPTION

Abstract

The purpose of this article is to use a novel text encryption technique that ensures secure communication through a two-phase process and to use the encryption technique to demonstrate the connection between graph theory and cryptography. In this article, the spanning tree graph, which is a subgraph of an undirected graph used in graph theory and includes all vertices of the graph G, will be used. The first phase employs a monoalphabetic substitution cipher, utilizing predefined character-swapping arrangements between authorized individuals along with an alphabetical encryption table. The second phase enhances security by leveraging graph theory for key generation. Specifically, the Kruskal algorithm is used to compute the minimum spanning tree, enabling the creation of intricate encrypted text with a shared key derived from graph structures. By utilizing properties such as adjacency matrices, spanning trees, and graph isomorphisms, the proposed method strengthens cryptographic security while maintaining computational efficiency. The security analysis demonstrates its resilience against common cryptographic attacks, making it a promising alternative for secure text encryption and communication.

Keywords

Ethical Statement

-No permission from an ethics committee or special legal authority is required for any situation in this article. -Research and publication ethics have been adhered to in this article. -This article has been checked using Turnitin.

References

  1. Abdul-Ghani, S. A.; Abdul-Wahhab, R. D.& Abood, E.W. (2022) Securing Text Messages Using Graph Theory and Steganography. Baghdad Science Journal, 19(1), 189-196.
  2. Akl, S. G. (2020). How to encrypt a graph. International Journal of Parallel, Emergent and Distributed Systems, 35, 668–681.
  3. Alaeiyan, M., Obayes. K.K., & Alaeiyan M. (2023). Prediction nullity of graph using data mining. Results in Nonlinear Analysis, 6(2), 1–8.
  4. Bai, S., Zhou, L., Yan, M., Ji, X., & Tao, X. (2021). Image cryptosystem for visually meaningful encryption based on fractal graph generating. IETE Technical Review, 38, 130–141.
  5. Bondy, J.A. and Murty, U.S.R. (2008) Graph Theory. Springer, New York. http://dx.doi.org/10.1007/978-1-84628-970-5
  6. Cormen, T. H., Leiserson, C. E., Rivest, R. L., & Stein, C. (2009). Introduction to algorithms (3rd edition). MIT Press.
  7. Lu, S., Manchala, D., & Ostrovsky R. (2008). Visual cryptography on graphs. Computing and Combinatorics: 14th
  8. Annual International Conference, COCOON 2008, Dalian, China, June 27–29, Proceedings 14, 225–234.

Details

Primary Language

English

Subjects

Information Security and Cryptology

Journal Section

Research Article

Publication Date

October 27, 2025

Submission Date

April 2, 2025

Acceptance Date

October 9, 2025

Published in Issue

Year 2025 Number: Kolluk Uygulamaları ve Güvenlik Teknolojileri Özel Sayısı

APA
Gür, Y., & Gür, H. (2025). GRAPH-BASED CRYPTOGRAPHIC KEY GENERATION FOR SECURE TEXT ENCRYPTION. Güvenlik Bilimleri Dergisi, Kolluk Uygulamaları ve Güvenlik Teknolojileri Özel Sayısı, 288-309. https://doi.org/10.28956/gbd.1669030
AMA
1.Gür Y, Gür H. GRAPH-BASED CRYPTOGRAPHIC KEY GENERATION FOR SECURE TEXT ENCRYPTION. Güvenlik Bilimleri Dergisi. 2025;(Kolluk Uygulamaları ve Güvenlik Teknolojileri Özel Sayısı):288-309. doi:10.28956/gbd.1669030
Chicago
Gür, Yılmaz, and Hülya Gür. 2025. “GRAPH-BASED CRYPTOGRAPHIC KEY GENERATION FOR SECURE TEXT ENCRYPTION”. Güvenlik Bilimleri Dergisi, no. Kolluk Uygulamaları ve Güvenlik Teknolojileri Özel Sayısı: 288-309. https://doi.org/10.28956/gbd.1669030.
EndNote
Gür Y, Gür H (October 1, 2025) GRAPH-BASED CRYPTOGRAPHIC KEY GENERATION FOR SECURE TEXT ENCRYPTION. Güvenlik Bilimleri Dergisi Kolluk Uygulamaları ve Güvenlik Teknolojileri Özel Sayısı 288–309.
IEEE
[1]Y. Gür and H. Gür, “GRAPH-BASED CRYPTOGRAPHIC KEY GENERATION FOR SECURE TEXT ENCRYPTION”, Güvenlik Bilimleri Dergisi, no. Kolluk Uygulamaları ve Güvenlik Teknolojileri Özel Sayısı, pp. 288–309, Oct. 2025, doi: 10.28956/gbd.1669030.
ISNAD
Gür, Yılmaz - Gür, Hülya. “GRAPH-BASED CRYPTOGRAPHIC KEY GENERATION FOR SECURE TEXT ENCRYPTION”. Güvenlik Bilimleri Dergisi. Kolluk Uygulamaları ve Güvenlik Teknolojileri Özel Sayısı (October 1, 2025): 288-309. https://doi.org/10.28956/gbd.1669030.
JAMA
1.Gür Y, Gür H. GRAPH-BASED CRYPTOGRAPHIC KEY GENERATION FOR SECURE TEXT ENCRYPTION. Güvenlik Bilimleri Dergisi. 2025;:288–309.
MLA
Gür, Yılmaz, and Hülya Gür. “GRAPH-BASED CRYPTOGRAPHIC KEY GENERATION FOR SECURE TEXT ENCRYPTION”. Güvenlik Bilimleri Dergisi, no. Kolluk Uygulamaları ve Güvenlik Teknolojileri Özel Sayısı, Oct. 2025, pp. 288-09, doi:10.28956/gbd.1669030.
Vancouver
1.Yılmaz Gür, Hülya Gür. GRAPH-BASED CRYPTOGRAPHIC KEY GENERATION FOR SECURE TEXT ENCRYPTION. Güvenlik Bilimleri Dergisi. 2025 Oct. 1;(Kolluk Uygulamaları ve Güvenlik Teknolojileri Özel Sayısı):288-309. doi:10.28956/gbd.1669030

2434714728147311473929833


This journal is licensed under the Creative Commons Attribution-NonCommercial 4.0 International License29846