SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Application
of
Mathematics
S.SWATHI SUNDARI, M.Sc.,M.Phil.,
Assistant Professor of Mathematics
V.V.Vanniaperumal College for Women
Virudhunagar
1
DATA TRANSFER USING BIPARTITE GRAPH
2
● ● ●
● ● ●
DATA TRANSFER IS…
Transfer of data in a secret way of using
some techniques and it’s a safety issue in
the current world.
This can be done in Cryptography.
3
CRYPTOGRAPHY IS…
The science or study of
techniques of secret writing and
message hiding.
4
Encryption Decryption
The process of converting
Plaintext into Ciphertext.
PLAINTEXT
CIPHERTEXT
The process of converting
Ciphertext into Plaintext.
CIPHERTEXT
PLAINTEXT
5
Terminology
Terminology
KEY
The secret, like a password, which is used
to encrypt and decrypt information.
6
For example
Plaintext letters : A B C ,..., Z
Ciphertext letters : C D E ,..., B
ENCRYPTION DECRYPTION
HELLO (Plaintext) JGNNQ (Ciphertext)
JGNNQ (Ciphertext) HELLO (Plaintext)
It is an example of “Secret Key Cryptography”.
7
Types of Keys
Based upon the keys, encryption and decryption
can be done by using two types of keys:
Secret key Cryptography
Public key Cryptography
8
Secret Key Cryptography:
This type of cryptography technique uses
just a single key.
Public Key Cryptography:
In this type of cryptography, one key is used to
encrypt, and a matching key is used to decrypt.
9
Mathematic Application in
Data Transfer
Graph Theory is growing as a promising field
for Data Transfer.
We propose a method of message
encryption as a graph.
10
What is…
Graph:
It consists of a pair G =(V,E), where
●V= V(G)= set of vertices.
●E= E(G)= set of edges.
Example:
Here, V={ 1,2,3} 1 ●
E= { }
G = (V,E) is a (3,2) graph. 2● ●3
11
Weighted Graph:
A number (weight) is assigned to each edge on a
graph, ( weights might represent costs, lengths or
capacities, etc., depend upon a problem)
Multigraph:
Lines joining the same points are called
“Multigraph”.
1●
2● ●3
12
12
11
10
9
Example:
Independent Sets:
An independent set is a set of vertices in a graph,
no two of which are adjacent.
Bipartite Graph:
A graph G is called a “Bigraph” or “Bipartite
Graph” if V can be patitioned into two disjoint
subsets and such that every line of G joins a
point of to a point of .
( , ) is called a “Bipartition” of G.
13
1 ● 2 ● 3 ● = {1,2,3}
={4,5,6}
Example:
4 ● 5 ● 6 ●
Construction of Encryption Table:
First we decide the number of characters (S) required for
the message encryption.
We can randomly fix the number of rows & columns of
the table, Note: The number of cells available in the table is
atleast of length of S.
Assign numbers 1,2,3…k, to the columns and numbers
k+1,k+2,…m, to the rows, where
k = number of columns k ≤ 9,
m = number of rows.
Distribute the characters in S randomly in the table.
14
Encryption Table:
For normal message, we use the 26 alphabets and blank space.
Each character in the cell receives a number value.
For Example:
A receives value 14.
U receives value 310.
Note:
The first character represents
a the column number, remaining
the row number.
15
1 2 3
4 A B C
5 D E F
6 G H I
7 J K L
8 M N O
9 P Q R
10 S T U
11 V W X
12 Y Z Space
Graph Construction from Number Sequence
Let M be the message to be encrypted of length k.
Convert each character in M into it’s corresponding
number values using Table.
Let the resulting number sequence be M1.
Let M1 be represented as .
Where,
are numbers.
16
,
We construct a graph G as follows
Vertices set of G:
Number of vertices in G = Number of distinct row
numbers + Column numbers used to generate M1.
Each vertex receive it’s corresponding row and
column value as it’s label.
Edge set of G:
Draw edges between the vertex pairs
.
Let us label these edges as
17
Number of edges in G = length of M.
and are always
independent sets. So, the graph G is always a Bipartite Graph.
Edge Weights:
Assign random numbers as
the edge weights to the edges
so that
18
Encryption Algorithm
Let M: I CAN be the message to be encrypted.
Step-1: Convert each character in M into it’s corresponding
number values using Table to generate M1.
For the message M, M1: 36 312 34 14 28
Step-2 : Construct the graph corresponding to the
sequence M1. For M1,
Vertex Set = {1, 2, 3, 4, 6, 8, 12}
Edge Set = { (3 6), (3 12), (3 4), (1 4), (2 8) }
= { }
Edge Weights = { 10, 15, 24, 56, 78 }
assigned to the edges
respectively.
19
1 2 3
4 A B C
5 D E F
6 G H I
7 J K L
8 M N O
9 P Q R
10 S T U
11 V W X
12 Y Z Space
Step - 3: Send G to the receiver.
For decrypting the message we reverse the procedure.
The resulting graph G is as follows:
20
1● 2● 3●
4● 6 ● 8● 12●
1524
10
56
78
Decryption Algorithm
Suppose the received graph is as follows:
21
2● 3●
5● 4● 7● 8● 12●
16
4420
78
65
35
92
Step -1: Arranging the edge weights in increasing order,
we generate sequence as follows:
{ 16, 20, 35, 44, 65, 78, 92}
Step -2: Picking the corresponding vertex labels from the
graph, we generate the sequence as follows:
{ 24, 25, 3 12, 34, 38, 38, 37 }
Step –3: From the table, the message is decrypted as
follows,
BE COOL
22
1 2 3
4 A B C
5 D E F
6 G H I
7 J K L
8 M N O
9 P Q R
10 S T U
11 V W X
12 Y Z Space
Applications of Data Transfer Using
Graphs
Electronic Money :
Encryption is used in electronic money
schemes to protect conventional transaction data like
account numbers, transaction amounts and digital
signatures.
Braille System :
In this system, encryption & decryption of any
message using Graph Theory and Braille numbers.
23
24

Weitere ähnliche Inhalte

Was ist angesagt?

introduction to graph theory
introduction to graph theoryintroduction to graph theory
introduction to graph theoryChuckie Balbuena
 
Graph Theory Introduction
Graph Theory IntroductionGraph Theory Introduction
Graph Theory IntroductionMANISH T I
 
CBSE XII Database Concepts And MySQL Presentation
CBSE XII Database Concepts And MySQL PresentationCBSE XII Database Concepts And MySQL Presentation
CBSE XII Database Concepts And MySQL PresentationGuru Ji
 
Introduction to Graph and Graph Coloring
Introduction to Graph and Graph Coloring Introduction to Graph and Graph Coloring
Introduction to Graph and Graph Coloring Darwish Ahmad
 
Basic concepts of object oriented programming
Basic concepts of object oriented programmingBasic concepts of object oriented programming
Basic concepts of object oriented programmingSachin Sharma
 
Presentation on c structures
Presentation on c   structures Presentation on c   structures
Presentation on c structures topu93
 
Gsm security and encryption
Gsm security and encryptionGsm security and encryption
Gsm security and encryptionRK Nayak
 
Graph isomorphism
Graph isomorphismGraph isomorphism
Graph isomorphismCore Condor
 
Graphs (Models & Terminology)
Graphs (Models & Terminology)Graphs (Models & Terminology)
Graphs (Models & Terminology)zunaira saleem
 
CS6702 Unit III coloring ppt
CS6702   Unit III coloring pptCS6702   Unit III coloring ppt
CS6702 Unit III coloring pptAbilaasha Ganesan
 
Files and Directories in PHP
Files and Directories in PHPFiles and Directories in PHP
Files and Directories in PHPNicole Ryan
 
Connected and disconnected graph
Connected and disconnected graphConnected and disconnected graph
Connected and disconnected graphABDULLAHSHAUKAT4
 
Computer Networking - Its Advantages & Disadvantages
Computer Networking - Its Advantages & DisadvantagesComputer Networking - Its Advantages & Disadvantages
Computer Networking - Its Advantages & DisadvantagesRita Gokani
 

Was ist angesagt? (20)

introduction to graph theory
introduction to graph theoryintroduction to graph theory
introduction to graph theory
 
Graph Theory Introduction
Graph Theory IntroductionGraph Theory Introduction
Graph Theory Introduction
 
CBSE XII Database Concepts And MySQL Presentation
CBSE XII Database Concepts And MySQL PresentationCBSE XII Database Concepts And MySQL Presentation
CBSE XII Database Concepts And MySQL Presentation
 
Structure and Enum in c#
Structure and Enum in c#Structure and Enum in c#
Structure and Enum in c#
 
Introduction to Graph and Graph Coloring
Introduction to Graph and Graph Coloring Introduction to Graph and Graph Coloring
Introduction to Graph and Graph Coloring
 
Basic concepts of object oriented programming
Basic concepts of object oriented programmingBasic concepts of object oriented programming
Basic concepts of object oriented programming
 
Graph Coloring
Graph ColoringGraph Coloring
Graph Coloring
 
Presentation on c structures
Presentation on c   structures Presentation on c   structures
Presentation on c structures
 
Gsm security and encryption
Gsm security and encryptionGsm security and encryption
Gsm security and encryption
 
Graph isomorphism
Graph isomorphismGraph isomorphism
Graph isomorphism
 
Sets Introduction
Sets IntroductionSets Introduction
Sets Introduction
 
Graph theory presentation
Graph theory presentationGraph theory presentation
Graph theory presentation
 
Methods and constructors in java
Methods and constructors in javaMethods and constructors in java
Methods and constructors in java
 
Graphs (Models & Terminology)
Graphs (Models & Terminology)Graphs (Models & Terminology)
Graphs (Models & Terminology)
 
Graph theory
Graph theoryGraph theory
Graph theory
 
Graphs Algorithms
Graphs AlgorithmsGraphs Algorithms
Graphs Algorithms
 
CS6702 Unit III coloring ppt
CS6702   Unit III coloring pptCS6702   Unit III coloring ppt
CS6702 Unit III coloring ppt
 
Files and Directories in PHP
Files and Directories in PHPFiles and Directories in PHP
Files and Directories in PHP
 
Connected and disconnected graph
Connected and disconnected graphConnected and disconnected graph
Connected and disconnected graph
 
Computer Networking - Its Advantages & Disadvantages
Computer Networking - Its Advantages & DisadvantagesComputer Networking - Its Advantages & Disadvantages
Computer Networking - Its Advantages & Disadvantages
 

Ähnlich wie Data transfer using bipartite graph

International journal of computer science and innovation vol 2015-n2-paper5
International journal of computer science and innovation  vol 2015-n2-paper5International journal of computer science and innovation  vol 2015-n2-paper5
International journal of computer science and innovation vol 2015-n2-paper5sophiabelthome
 
parameterized complexity for graph Motif
parameterized complexity for graph Motifparameterized complexity for graph Motif
parameterized complexity for graph MotifAMR koura
 
An ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
An ElGamal Encryption Scheme of Adjacency Matrix and Finite MachinesAn ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
An ElGamal Encryption Scheme of Adjacency Matrix and Finite MachinesComputer Science Journals
 
Learning multifractal structure in large networks (KDD 2014)
Learning multifractal structure in large networks (KDD 2014)Learning multifractal structure in large networks (KDD 2014)
Learning multifractal structure in large networks (KDD 2014)Austin Benson
 
Graph Theory,Graph Terminologies,Planar Graph & Graph Colouring
Graph Theory,Graph Terminologies,Planar Graph & Graph ColouringGraph Theory,Graph Terminologies,Planar Graph & Graph Colouring
Graph Theory,Graph Terminologies,Planar Graph & Graph ColouringSaurabh Kaushik
 
Metric dimesion of circulsnt graphs
Metric dimesion of circulsnt graphsMetric dimesion of circulsnt graphs
Metric dimesion of circulsnt graphsAmna Abunamous
 
Rsa Signature: Behind The Scenes
Rsa Signature: Behind The Scenes Rsa Signature: Behind The Scenes
Rsa Signature: Behind The Scenes acijjournal
 
Lego like spheres and tori, enumeration and drawings
Lego like spheres and tori, enumeration and drawingsLego like spheres and tori, enumeration and drawings
Lego like spheres and tori, enumeration and drawingsMathieu Dutour Sikiric
 
Novel encryption algorithm and software development ecc and rsa
Novel encryption algorithm and software development ecc and rsaNovel encryption algorithm and software development ecc and rsa
Novel encryption algorithm and software development ecc and rsaSoham Mondal
 
Convolution presentation
Convolution presentationConvolution presentation
Convolution presentationSoham Mondal
 
Comparative Report Ed098
Comparative Report Ed098Comparative Report Ed098
Comparative Report Ed098mikebrowl
 
Traveling Salesman Problem in Distributed Environment
Traveling Salesman Problem in Distributed EnvironmentTraveling Salesman Problem in Distributed Environment
Traveling Salesman Problem in Distributed Environmentcsandit
 
TRAVELING SALESMAN PROBLEM IN DISTRIBUTED ENVIRONMENT
TRAVELING SALESMAN PROBLEM IN DISTRIBUTED ENVIRONMENTTRAVELING SALESMAN PROBLEM IN DISTRIBUTED ENVIRONMENT
TRAVELING SALESMAN PROBLEM IN DISTRIBUTED ENVIRONMENTcscpconf
 

Ähnlich wie Data transfer using bipartite graph (20)

International journal of computer science and innovation vol 2015-n2-paper5
International journal of computer science and innovation  vol 2015-n2-paper5International journal of computer science and innovation  vol 2015-n2-paper5
International journal of computer science and innovation vol 2015-n2-paper5
 
parameterized complexity for graph Motif
parameterized complexity for graph Motifparameterized complexity for graph Motif
parameterized complexity for graph Motif
 
An ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
An ElGamal Encryption Scheme of Adjacency Matrix and Finite MachinesAn ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
An ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
 
Learning multifractal structure in large networks (KDD 2014)
Learning multifractal structure in large networks (KDD 2014)Learning multifractal structure in large networks (KDD 2014)
Learning multifractal structure in large networks (KDD 2014)
 
graph theory
graph theorygraph theory
graph theory
 
Graph Theory,Graph Terminologies,Planar Graph & Graph Colouring
Graph Theory,Graph Terminologies,Planar Graph & Graph ColouringGraph Theory,Graph Terminologies,Planar Graph & Graph Colouring
Graph Theory,Graph Terminologies,Planar Graph & Graph Colouring
 
G029037043
G029037043G029037043
G029037043
 
Metric dimesion of circulsnt graphs
Metric dimesion of circulsnt graphsMetric dimesion of circulsnt graphs
Metric dimesion of circulsnt graphs
 
Rsa Signature: Behind The Scenes
Rsa Signature: Behind The Scenes Rsa Signature: Behind The Scenes
Rsa Signature: Behind The Scenes
 
Lego like spheres and tori, enumeration and drawings
Lego like spheres and tori, enumeration and drawingsLego like spheres and tori, enumeration and drawings
Lego like spheres and tori, enumeration and drawings
 
Ki2518101816
Ki2518101816Ki2518101816
Ki2518101816
 
Ki2518101816
Ki2518101816Ki2518101816
Ki2518101816
 
Exhaustive Combinatorial Enumeration
Exhaustive Combinatorial EnumerationExhaustive Combinatorial Enumeration
Exhaustive Combinatorial Enumeration
 
Novel encryption algorithm and software development ecc and rsa
Novel encryption algorithm and software development ecc and rsaNovel encryption algorithm and software development ecc and rsa
Novel encryption algorithm and software development ecc and rsa
 
Convolution presentation
Convolution presentationConvolution presentation
Convolution presentation
 
12_Graph.pptx
12_Graph.pptx12_Graph.pptx
12_Graph.pptx
 
Comparative Report Ed098
Comparative Report Ed098Comparative Report Ed098
Comparative Report Ed098
 
Triggering patterns of topology changes in dynamic attributed graphs
Triggering patterns of topology changes in dynamic attributed graphsTriggering patterns of topology changes in dynamic attributed graphs
Triggering patterns of topology changes in dynamic attributed graphs
 
Traveling Salesman Problem in Distributed Environment
Traveling Salesman Problem in Distributed EnvironmentTraveling Salesman Problem in Distributed Environment
Traveling Salesman Problem in Distributed Environment
 
TRAVELING SALESMAN PROBLEM IN DISTRIBUTED ENVIRONMENT
TRAVELING SALESMAN PROBLEM IN DISTRIBUTED ENVIRONMENTTRAVELING SALESMAN PROBLEM IN DISTRIBUTED ENVIRONMENT
TRAVELING SALESMAN PROBLEM IN DISTRIBUTED ENVIRONMENT
 

Mehr von SwathiSundari

Mehr von SwathiSundari (17)

Time and Distance.ppt
Time and Distance.pptTime and Distance.ppt
Time and Distance.ppt
 
Calender.ppt
Calender.pptCalender.ppt
Calender.ppt
 
Allied maths ii
Allied maths iiAllied maths ii
Allied maths ii
 
Z transform
Z transformZ transform
Z transform
 
Cone
ConeCone
Cone
 
Boolean Algebra
Boolean AlgebraBoolean Algebra
Boolean Algebra
 
Application of graph theory in Traffic Management
Application of graph theory in Traffic ManagementApplication of graph theory in Traffic Management
Application of graph theory in Traffic Management
 
The instant insanity game
The instant insanity game The instant insanity game
The instant insanity game
 
Kirchoff''s matrix tree theorem
Kirchoff''s matrix tree theoremKirchoff''s matrix tree theorem
Kirchoff''s matrix tree theorem
 
Fuzzy sets
Fuzzy setsFuzzy sets
Fuzzy sets
 
Statistics
StatisticsStatistics
Statistics
 
Ancillary maths ii
Ancillary maths iiAncillary maths ii
Ancillary maths ii
 
Analytical Geometry in three dimension
Analytical Geometry in three dimensionAnalytical Geometry in three dimension
Analytical Geometry in three dimension
 
Operations Research
Operations ResearchOperations Research
Operations Research
 
Operation Research
Operation ResearchOperation Research
Operation Research
 
Theory of Equation
Theory of EquationTheory of Equation
Theory of Equation
 
Game theory
Game theoryGame theory
Game theory
 

Kürzlich hochgeladen

Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsappssapnasaifi408
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysismanisha194592
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAroojKhan71
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFxolyaivanovalion
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...Suhani Kapoor
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxolyaivanovalion
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfLars Albertsson
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxolyaivanovalion
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSAishani27
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionfulawalesam
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingNeil Barnes
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystSamantha Rae Coolbeth
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxStephen266013
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxolyaivanovalion
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxolyaivanovalion
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...Suhani Kapoor
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130Suhani Kapoor
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 

Kürzlich hochgeladen (20)

Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysis
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFx
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptx
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdf
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICS
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interaction
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data Storytelling
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data Analyst
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docx
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptx
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 

Data transfer using bipartite graph

  • 1. Application of Mathematics S.SWATHI SUNDARI, M.Sc.,M.Phil., Assistant Professor of Mathematics V.V.Vanniaperumal College for Women Virudhunagar 1
  • 2. DATA TRANSFER USING BIPARTITE GRAPH 2 ● ● ● ● ● ●
  • 3. DATA TRANSFER IS… Transfer of data in a secret way of using some techniques and it’s a safety issue in the current world. This can be done in Cryptography. 3
  • 4. CRYPTOGRAPHY IS… The science or study of techniques of secret writing and message hiding. 4
  • 5. Encryption Decryption The process of converting Plaintext into Ciphertext. PLAINTEXT CIPHERTEXT The process of converting Ciphertext into Plaintext. CIPHERTEXT PLAINTEXT 5 Terminology
  • 6. Terminology KEY The secret, like a password, which is used to encrypt and decrypt information. 6
  • 7. For example Plaintext letters : A B C ,..., Z Ciphertext letters : C D E ,..., B ENCRYPTION DECRYPTION HELLO (Plaintext) JGNNQ (Ciphertext) JGNNQ (Ciphertext) HELLO (Plaintext) It is an example of “Secret Key Cryptography”. 7
  • 8. Types of Keys Based upon the keys, encryption and decryption can be done by using two types of keys: Secret key Cryptography Public key Cryptography 8
  • 9. Secret Key Cryptography: This type of cryptography technique uses just a single key. Public Key Cryptography: In this type of cryptography, one key is used to encrypt, and a matching key is used to decrypt. 9
  • 10. Mathematic Application in Data Transfer Graph Theory is growing as a promising field for Data Transfer. We propose a method of message encryption as a graph. 10
  • 11. What is… Graph: It consists of a pair G =(V,E), where ●V= V(G)= set of vertices. ●E= E(G)= set of edges. Example: Here, V={ 1,2,3} 1 ● E= { } G = (V,E) is a (3,2) graph. 2● ●3 11
  • 12. Weighted Graph: A number (weight) is assigned to each edge on a graph, ( weights might represent costs, lengths or capacities, etc., depend upon a problem) Multigraph: Lines joining the same points are called “Multigraph”. 1● 2● ●3 12 12 11 10 9 Example:
  • 13. Independent Sets: An independent set is a set of vertices in a graph, no two of which are adjacent. Bipartite Graph: A graph G is called a “Bigraph” or “Bipartite Graph” if V can be patitioned into two disjoint subsets and such that every line of G joins a point of to a point of . ( , ) is called a “Bipartition” of G. 13 1 ● 2 ● 3 ● = {1,2,3} ={4,5,6} Example: 4 ● 5 ● 6 ●
  • 14. Construction of Encryption Table: First we decide the number of characters (S) required for the message encryption. We can randomly fix the number of rows & columns of the table, Note: The number of cells available in the table is atleast of length of S. Assign numbers 1,2,3…k, to the columns and numbers k+1,k+2,…m, to the rows, where k = number of columns k ≤ 9, m = number of rows. Distribute the characters in S randomly in the table. 14
  • 15. Encryption Table: For normal message, we use the 26 alphabets and blank space. Each character in the cell receives a number value. For Example: A receives value 14. U receives value 310. Note: The first character represents a the column number, remaining the row number. 15 1 2 3 4 A B C 5 D E F 6 G H I 7 J K L 8 M N O 9 P Q R 10 S T U 11 V W X 12 Y Z Space
  • 16. Graph Construction from Number Sequence Let M be the message to be encrypted of length k. Convert each character in M into it’s corresponding number values using Table. Let the resulting number sequence be M1. Let M1 be represented as . Where, are numbers. 16 ,
  • 17. We construct a graph G as follows Vertices set of G: Number of vertices in G = Number of distinct row numbers + Column numbers used to generate M1. Each vertex receive it’s corresponding row and column value as it’s label. Edge set of G: Draw edges between the vertex pairs . Let us label these edges as 17
  • 18. Number of edges in G = length of M. and are always independent sets. So, the graph G is always a Bipartite Graph. Edge Weights: Assign random numbers as the edge weights to the edges so that 18
  • 19. Encryption Algorithm Let M: I CAN be the message to be encrypted. Step-1: Convert each character in M into it’s corresponding number values using Table to generate M1. For the message M, M1: 36 312 34 14 28 Step-2 : Construct the graph corresponding to the sequence M1. For M1, Vertex Set = {1, 2, 3, 4, 6, 8, 12} Edge Set = { (3 6), (3 12), (3 4), (1 4), (2 8) } = { } Edge Weights = { 10, 15, 24, 56, 78 } assigned to the edges respectively. 19 1 2 3 4 A B C 5 D E F 6 G H I 7 J K L 8 M N O 9 P Q R 10 S T U 11 V W X 12 Y Z Space
  • 20. Step - 3: Send G to the receiver. For decrypting the message we reverse the procedure. The resulting graph G is as follows: 20 1● 2● 3● 4● 6 ● 8● 12● 1524 10 56 78
  • 21. Decryption Algorithm Suppose the received graph is as follows: 21 2● 3● 5● 4● 7● 8● 12● 16 4420 78 65 35 92
  • 22. Step -1: Arranging the edge weights in increasing order, we generate sequence as follows: { 16, 20, 35, 44, 65, 78, 92} Step -2: Picking the corresponding vertex labels from the graph, we generate the sequence as follows: { 24, 25, 3 12, 34, 38, 38, 37 } Step –3: From the table, the message is decrypted as follows, BE COOL 22 1 2 3 4 A B C 5 D E F 6 G H I 7 J K L 8 M N O 9 P Q R 10 S T U 11 V W X 12 Y Z Space
  • 23. Applications of Data Transfer Using Graphs Electronic Money : Encryption is used in electronic money schemes to protect conventional transaction data like account numbers, transaction amounts and digital signatures. Braille System : In this system, encryption & decryption of any message using Graph Theory and Braille numbers. 23
  • 24. 24