Abstract

In this paper, we present a new type of symmetric encryption by converting the classical monoalphabetic affine cipher into a polyalphabetic cipher. The proposed encryption utilizes the properties of outer-convex dominating set in the corona of graphs to generate random keys from the shared keyword to every character of the message. The new encryption eliminates the weaknesses of affine cipher, thus increasing the level of confidence for exchanging messages.

1. Introduction

The security of a system is highly essential nowadays. In an economic era in which industries are information-intensive, data is considered one of the world’s most treasured resources that fuels economic operations; thus, security of information is a significant requirement. With the rapid growth of the information technology power and with the emergence of the innovative technologies, the number of threats a user is supposed to deal with has grown exponentially. For example, information exchange is challenged by issues pertaining to confidentiality, authenticity, and nonrepudiation. The increasing concern of securing data requires a strong algorithm that enables high level of data protection. This necessitates an algorithm of superior quality which is a combination of both performance and security. Cryptography is where security engineering meets mathematics. It provides us with the tools that underlie most modern security protocols. It is probably the key enabling technology for protecting distributed systems, yet it is surprisingly hard to do right, particularly when one aims for resistance to different types of adversaries. Cryptography consists of processing plain information (plaintext) applying a cipher and producing encoded output (ciphertext), meaningless to a third-party who does not know the key. The process of transforming plaintext into ciphertext is called encryption and the reverse process is called decryption. In cryptography both encryption and decryption phase are determined by one or more keys. The creation of algorithms which enhance protection capabilities continues to be the direction of the growing concern for a secured communication.

One of the simplest methods for encrypting text is the substitution cipher. A substitution cipher replaces one symbol with another. If the symbols in the plain text are alphabetical characters, we replace one character with another. Substitution ciphers can be categorized as either monoalphabetic ciphers or polyalphabetic ciphers. In monoalphabetic substitution, each character in the plain text is always replaced by the same character in the cipher text regardless of its position in the text. In polyalphabetic substitution, each occurrence of a character may have a different substitute. The relationship between a character in the plain text to a character in the cipher text is one to many [1].

Modern ciphers possess two important properties: diffusion and confusion. The idea of diffusion is to hide the relationship between the cipher text and the plain text. This will frustrate the adversary who uses the cipher text statistics to find the plain text. The idea of confusion is to hide the relationship between the cipher text and the key. This will frustrate the adversary who tries to use the cipher text to find the key. Diffusion and confusion can be achieved using the concept of a complex cipher known as a product cipher introduced by Shannon [2]. The success and competence of the cryptographic cipher technique depends upon the fact that how difficult it is to be broken or cracked by a cryptanalyst. Affine cipher is a kind of monoalphabetic substitution cipher, in which each letter in the alphabet is converted to its numeric equivalent, encrypted by a simple arithmetical equation, and converted back to the letter. This cipher is defined by the following rule:(i)Encryption rule: (ii)Decryption rule:

Here, is the ciphertext, is the plaintext, and is the shared key such that and for some with , and is the multiplicative inverse of in .

In this encryption scheme, each letter of the original message is replaced by the same cipher substitute. Thus, such cryptographic systems are highly vulnerable to statistical methods of attack since it preserves the frequency, or relative commonness, of individual letters. Affine ciphers can easily make a system noticeably secure by multiplying each plaintext value by a different number and then inserting a shift. Thus, the said affine cipher will become complex and more secured if it will be converted into a polyalphabetic cipher [3].

Domination in graph is seen as a new tool in developing a complex process in encoding messages [4]. Domination is an area in graph theory with numerous research activities. Nowadays, studies in the field of domination have been growing rapidly because of its wide variation of domination parameters and its application such as those found in [514]. One of the domination parameters is outer-convex domination number which was introduced by Dayap and Enriquez in [15] and further investigated in [16, 17]. In [1517], the authors characterized the outer-convex domination in the join of two graphs and outer-convex domination numbers 1 and 2 and characterized the parameter in the corona, composition, and Cartesian product of graphs.

In this paper, we propose a complex process of encoding and decoding messages by converting the monoalphabetic affine cipher into polyalphabetic cipher by using the property of outer-convex dominating set in the corona of two graphs to generate random keys from the shared keyword to every character of the message (see Figure 1).

1.1. Related Works

In [18], they propose a polyalphabetic cipher with diffusion and confusion properties based on the concept of the complex cipher used by combining of Vigenére cipher with Affine cipher. Yamuna et al. [19] presented an encryption mechanism using Hamilton path properties (path that covers all vertices in the graph). They encrypt data twice, first using the Hamilton path and second using the complete graph to impose more secure method. Etaiwi [20] proposed a new symmetric encryption algorithm that uses the concepts of cycle graph, complete graph, and minimum spanning tree to generate a complex cipher text using a shared key. In [5], they provided a method of encrypting any chemical formula using graph domination as a tool for encryption. Here, every chemical formula is converted into a binary string using graph domination and later encrypted using DNA steganography.

1.2. Basic Graph Definitions and Properties

Graph theory is the study of graphs, which are mathematical structures used to formulate models in many problems in business, social sciences, physical sciences, and information systems. In this section, we discuss some of the basic concepts of graph that we will encounter throughout our investigation. The definitions and notations are based on [21].

Definition 1. A graph consists of a pair where is a nonempty finite set whose elements are called vertices and is a set of unordered pairs of distinct elements of . The elements of are called edges of the graph . The number of vertices in is called the order of . A graph is connected when there is a path between every pair of vertices.

Definition 2. A dominating set for a graph is a subset of such that every vertex not in is adjacent to at least one vertex of .

Definition 3. A subset of is convex in a graph if, for every pair of vertices , each geodesic (shortest path, curve, or arc) joining and lies completely in .

Definition 4. Cycle graph is a graph that consists of a single cycle, or in other words, some number of vertices (at least 3) connected in a closed chain.

Definition 5. Path graph is a graph that can be drawn so that all of its vertices and edges lie on a single straight line.

Definition 6. Let and be graphs of order and , respectively. The corona of two graphs and is the graph obtained by taking one copy of and copies of , and then joining the vertex of to every vertex of the copy of .

Definition 7. A set of vertices of a graph is an outer-convex dominating set if every vertex not in is adjacent to some vertex in and is convex. The minimum outer-convex dominating set of is the minimum cardinality of an outer-convex dominating set of .

Corollary 1 (see [17]). Let be a connected graph of order and be any graph of order . The set is a minimum outer-convex dominating set in if , where is a minimum outer-convex dominating set in .

2. Materials and Methods

2.1. Minimum Outer-Convex Dominating Set in

In this section, we present on how to determine the minimum outer-convex dominating set in the corona of two graphs using Corollary 1. Here, we let the graph (cycle graph of order 4) as a keyword and the graph ( is the order of a path graph ) as the message to be encrypted.

Example 1. Determine all the minimum outer-convex dominating sets in the graph .

Solution. the graph illustrated in Figure 2 is the corona of a path graph of order 3 and a cycle graph of order 4.
Using Corollary 1, the elements that consist the minimum outer-convex sets of the graph are combinations of . By convention, we let , , , , , , , and . Thus, the graph has the minimum outer-convex dominating sets presented in Table 1 (here, we define the minimum outer-convex dominating set as a permutation of the minimum outer-convex dominating set with respect to its position).
The graph in Figure 2 has 512 different sets that satisfies the condition of minimum outer-convex dominating set. In general, the graph has number of different minimum outer-convex dominating sets, where is the order of graph . To convert the monoalphabetic affine cipher to a polyalphabetic cipher, the key that is used to encrypt and decrypt in every letter of the message must not be the same. Hence, we omit the MOCDS that has the same elements (AAA, BBB, CCC, DDD, EEE, FFF, GGG, and HHH). This implies now that the graph has number of different minimum outer-convex dominating sets.

2.2. Lists of Tables of Minimum Outer-Convex Dominating Sets (MOCDS) of with Their Corresponding Locator Given the Order of Graph

In this section, we provide some of the lists of minimum outer-convex dominating sets of with their corresponding locator. This locator will be used as part of the proposed encryption scheme.

By convention, we letwhere(i), , and are the equivalent numbers of the first, second, third, and fourth letter of the keyword, respectively.

For , the lists of minimum outer-convex dominating sets of is given in Tables 24, respectively.

For the succeeding tables, we follow the pattern presented above (i.e., there is an alternation of letters from right to left with a given pattern of 1, 8, 64, 512, …) in listing all the minimum outer-convex dominating sets with their corresponding locator.

2.3. Encryption Algorithm

In this section, we propose a cryptography algorithm to encrypt data to be transmitted using properties of outer-convex dominating set. This algorithm is a symmetric cryptography wherein it uses the concept of shared key that must be predefined and shared between the sender and receiver. The four-letter keyword and key () are the keys being shared by the sender and receiver:(1)Draw the graph , where is equal to the number of letters of the message to be encrypted.(2)Write each letter of the original message inside the nodes of and each four-letter keyword inside the nodes of . The equivalent numerical value of each letter of the keyword must be relatively prime with .(3)Replace the letters into its equivalent numerical value presented in the encoded Table 5.

(4)Locate and determine the minimum outer-convex dominating set (MOCDS) by using the congruence equation:as a locator, where(i) is the agreed key such that (ii) is the product of the equivalent numerical values of the agreed keyword(iii) is the number of letters of the original message (note: if the resulting locator will give a minimum outer-convex dominating set of the same element such as AA, BBB, CCCC, and DDDD, reject it and select the next locator in determining the ).(5)Encrypt the message using the affine transformation:where(i) is the equivalent numerical value in the identified minimum outer-convex dominating set which is adjacent to the letter to be encrypted(ii) is the equivalent numerical value of the plaintext(iii) is the equivalent numerical value of the ciphertext.

And replace the resulting number into its corresponding letter presented in Table 5.

2.4. Decryption Algorithm

Here, we provide the decryption algorithm that decrypts the message based on the proposed encryption algorithm in the previous section.(1)Locate and determine the minimum outer-convex dominating set (MOCDS) by using the congruence equation:as a locator, where(i)() is the agreed key such that (ii) is the product of the equivalent numerical values of the agreed keyword(iii) is the number of letters of the ciphertext (note: if the resulting locator will give a minimum outer-convex dominating set of the same element such as AA, BBB, CCCC, and DDDD, reject it and select the next locator in determining the )(2)Decrypt the message using the affine transformation:where(i)() is the equivalent numerical value in the identified minimum outer-convex dominating set which is adjacent to the letter to be encrypted and is the inverse of in mod 26(ii) is the equivalent numerical value of the plaintext(iii) is the equivalent numerical value of the ciphertext.

And replace the resulting number into its corresponding letter.

3. Results and Discussion

3.1. Implementation of Modified Affine Cipher

Example 2. Encrypt the message OUR with a keyword FLPR and a key (5, 3).

Solution. (i)Step 1: draw the graph , where is equal to the number of letters of the message to be encrypted. Since the message to be encrypted has three letters, we have a graph , as shown in Figure 3.(ii)Step 2: write each letter of the original message inside the nodes of and each four-letter keyword inside the nodes of (see Figure 4).See Table 6.

(iii)Step 3: peplace the letters with their equivalent numerical values (see Figure 5).

(iv)Step 4: locate and determine the minimum outer-convex dominating set (MOCDS) by using the congruence equation:The agreed key () is (5, 3), the is 14, 025, and is 3. Thus,implying that the desired minimum outer-convex dominating set is on the location. Using the table in Section 2.2, the MOCDS is , that is, .(v)Step 5: encrypt the message using the affine transformation, , and replace the resulting number with its corresponding letter presented on the encoded Table 5.

Example 3. Decrypt the message JHS with a keyword FLPR and a key (5, 3).

Solution. (i)Step 1: locate and determine the minimum outer-convex dominating set (MOCDS) by using the congruence equationSince , and , it follows thatThis implies that the desired minimum outer-convex dominating set is on the location. Using the table in Section 2.2, the MOCDS is , that is, .(ii)Step 2: decrypt the message using the affine transformation:and replace the resulting number with its corresponding letter, see Table 7.

3.2. Security Analysis

(1)The frequency analysis is not possible to perform in this algorithm because the characters are encrypted as one to many. That is, a single character is mapped to many characters while performing encryption.(2)Kasiski Test fails because the key in this algorithm is not repeating, i.e., the key is based on the locator of the minimum outer-convex dominating set.

4. Conclusions

In this proposed encryption, graph properties are used, specifically, the properties of minimum outer-convex dominating set for encryption. The adversary’s knowledge on the affine transformation alone does not guarantee breaking the code. Utilizing the property of outer-convex dominating sets in the corona of two graphs makes it possible for every letter to have its corresponding key. It is shown that the total number of combinations of minimum outer-convex dominating sets is , where is the size of the message. These features of the proposed method of encryption increase the difficulty of unauthorized parties to gain access to the intelligible message. The proposed algorithm overcomes the existing drawbacks of the classical affine encryption scheme, thus promoting a more secure information and communication. This study paved a way to new research on applying and evaluating different domination parameters as tool for a more secured encryption algorithm.

Data Availability

No data were used to support this study.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Acknowledgments

This work was supported by the National Key R&D Program of China (Grant no. 2019YFA0706402) and Natural Science Foundation of Guangdong Province under Grant 2018A0303130115.