An encryption and decryption of phonetic alphabets using signed graphs
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.spl-2.33Keywords:
Encryption, Decryption, Signed Graph, Eigenvalues, EigenvectorsDimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Indeed, in signed graphs, the weights on the edges can be both positive and negative; this will provide a solid representation and manipulation framework for complicated relationships among phonetic symbols. Encryption and decryption of phonetic alphabets pose a number of special challenges and opportunities. This paper introduces a novel approach utilizing the eigenvalues and eigenvectors of signed graphs to develop more secure and efficient methods of encoding phonetic alphabets. Presented is a new cryptographic scheme; consider a mapping from phonetic alphabets onto a signed graph. Encryption should be carried out by means of structure-changing transformations of the latter, which leave intact the integrity of the information encoded. This approach allows for secure, invertible transformations to resist typical cryptographic attacks. Here, the decryption algorithm restores the encrypted graph back to the original phonetic symbols by systematically going through steps opposite to that taken during encryption. The proposal of signed graphs in the processes of phonetic alphabet encryption and decryption opens new frontiers of cryptographic practices, which have useful implications for secure communication systems and data protection.Abstract
How to Cite
Downloads
Similar Articles
- Milindkumar N. Dandale, Amar P. Yadav, P. S. K. Reddy, Seema G. Kadu, Madhusudana T, Manthan S. Manavadaria, Deep learning enhanced drug discovery for novel biomaterials in regenerative medicine utilizing graph neural network approach for predicting cellular responses , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- Santhanalakshmi M, Ms Lakshana K, Ms Shahitya G M, Enhanced AES-256 cipher round algorithm for IoT applications , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
- M. Iniyan, A. Banumathi, Brower blowfish nash secured stochastic neural network based disease diagnosis for medical WBAN in cloud environment , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Rekha R., P. Meenakshi Sundaram, Enhanced malicious node identification in WSNs with directed acyclic graphs and RC4-based encryption , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- N. Anbarasi, K. Anitha, S. Hemalatha, A study on energy sum of dominating sets in East Indian states , The Scientific Temper: Vol. 16 No. 04 (2025): The Scientific Temper
- S. Gomathi, C. Radhika, A secure messaging application using steganography and AES encryption a dual-layer secure messaging system , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- Ramesh Babu Durai C, D. Madhivadhani, A. Sumathi, Lily Saron Grace, Graph neural networks for modeling ecological networks and food webs , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- M. Vijaya, D. Hema, Some properties of maximal product of two picture fuzzy soft graph , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- S. Mohamed Iliyas, M. Mohamed Surputheen, A.R. Mohamed Shanavas, Enhanced Block Chain Financial Transaction Security Using Chain Link Smart Agreement based Secure Elliptic Curve Cryptography , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
- N. Ruba, A. S. A. Khadir, Session password Blum–Goldwasser cryptography based user three layer authentication for secured financial transaction , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
You may also start an advanced similarity search for this article.

