Next Article in Journal
Laterality, Shot Direction and Spatial Asymmetry in Decisive Penalty Kicks: Evidence from Elite Men’s Football
Previous Article in Journal
Existence of Mild Solutions for the Generalized Anti-Periodic Boundary Value Problem to the Fractional Hybird Differential Equations with p(t)-Laplacian Operator
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Synthesis of Index Difference Graph Structures for Cryptographic Implementation

1
Department of Mathematics, Research Scholar, Noorul Islam Centre for Higher Education, Kumaracoil 629180, Tamil Nadu, India
2
Department of Mathematics, Faculty of Science and Humanities, Noorul Islam Centre for Higher Education, Kumaracoil 629180, Tamil Nadu, India
*
Author to whom correspondence should be addressed.
Symmetry 2025, 17(9), 1568; https://doi.org/10.3390/sym17091568
Submission received: 13 August 2025 / Revised: 12 September 2025 / Accepted: 13 September 2025 / Published: 19 September 2025
(This article belongs to the Section Computer)

Abstract

Cryptography stands out as a scientific methodology for safeguarding communication against unauthorized access. This article proposes a newly formulated graph termed the Index Difference Graph (IDG). The proposed graph model serves as the secret key in the encryption process. Furthermore, we present a new graph-based algorithm, the Index Difference Modular Cryptographic (IDMC) Algorithm, and analyze it using centipede and path graphs. The goal of this graph-based approach is to increase the encryption rate while maintaining computational efficiency. This research investigates different types of index difference graphs and analyzes the time and space complexity of the algorithm. IDMC exhibits a lower collision probability, thereby enhancing encryption security. When employing a graph that admits an Index Difference Graph structure in the cryptographic algorithm, both the sender and receiver must be aware of the graph’s precise structure, as this strengthens the robustness of the cryptographic key. The application of the index difference centipede graph P n 2 k 1 in cryptography, examined through the IDMC algorithm, demonstrates exceptionally high brute-force resistance estimated at approximately 2.6 × 10 39 for smaller instances with n 7 and escalating to 6.93 × 10 163 for larger graphs with n 20 . This resistance underscores the algorithm’s efficiency and cryptographic resilience.

1. Introduction

Cryptographic security is essential for data integrity and secure communication. Graph theory has recently gained importance in cryptography, where researchers apply various graph-theoretic concepts to security operations. The aim of labeling techniques is to address theoretical challenges, identify structural patterns, and leverage graph properties in real-world applications such as data management, network design, coding theory, etc. J.A. Bondy and U.S.R. Murty [1] present fundamental concepts of of graph theory along with a wide variety of applications. Jingxiang Jin and Zhuojie Tu [2] surveyed antimagic labelings, while Julien Bensmail [3] studied edge labeling, ensuring that adjacent vertices have distinct incident sums. Mirka Miller et al. [4] proposed 1-vertex-magic vertex labeling. Griggs et al. [5] introduced L d ( 2 , 1 ) labeling, which requires adjacent vertices to differ by at least 2 d and distance-2 vertices by at least d. Adarsh Kumar Handa et al. [6] investigated local distance antimagic labeling on paths, cycles, wheels, friendship graphs, multipartite graphs, and special caterpillars. Arumugam S. et al. [7] examined key results on the local antimagic chromatic number, a parameter arising from local antimagic labeling. Stefko Miklavic et al. [8] established a sufficient condition for Hamming graphs to be distance magic graphs, while T. Singh et al. [9] determined the distance magic index for trees and complete bipartite graphs. Joseph A. Gallian [10] compiled all published studies on graph labeling into a single comprehensive volume. Syed Ahtsham Ul Haq Bokhar et al. [11] proposed three graph-based encryption schemes using bipartite and Cartesian graphs, offering enhanced security and efficiency, along with formal analyses of complexity and implementation. Motivated by these observations, we introduce the new graph, the Index Difference Graph (IDG). We elucidate the structural framework of graphs that admit such a technique and propose a new graph-based algorithm, the Index Difference Modular Cryptography (IDMC) algorithm. In this framework, the Index Difference graph serves as a powerful secret key within the cryptographic process. Graph labeling methodologies are generally characterized by three fundamental attributes: a set of numbers for assigning vertex labels, a rule for assigning labels to edges, and specific conditions that these labels must satisfy. The topology Index Difference Graph structure incorporates vertex positions; vertices are labeled after being placed according to specific conditions and their edge connectivity. Unlike other graphs, the distinct positioning of the vertices enhances brute-force resistance and strengthens the encryption key.
In this study, we examine graph classes that admit the Index Difference Graph technique with time and space complexity of O ( n ) , and we incorporate them into the algorithm to improve its efficiency.

1.1. Related Works

Cryptography is the discipline of transmuting confidential information into an enciphered form to guarantee its secure transmission to the intended recipient without the risk of exfiltration. It was basically utilized for war time plans. Classical cryptography goes back over two thousand years. Modern cryptography was established by Shannon in 1949 [12]. Rosen K. H. et al. [13] defined encryption as the process of converting an original message into a coded format, with decryption being its reverse operation. A key is used to transform raw data into a ciphered form during encryption and to reconstruct the plaintext during decryption. Through a provided key, the authorized recipient can open up the hidden message with full ease, but this is not possible for an interceptor. With the provided key, the authorized recipient can easily decrypt and access the hidden message, whereas it remains inaccessible to any interceptor. Stinson D. R. et al. [14] outlined three principal schemes in modern cryptography: symmetric key cryptography, public key cryptography, and hash functions. Priyadarsini P. et al. [15] emphasized the integration of graph theory with cryptography as a significant advancement in cybersecurity research. Cusack and Chapman [16] presented a study on graphical methods for evaluating and challenging cryptographic performance. West D. B. [17] commenced by presenting several fundamental concepts of graph theory as a foundation for subsequent developments. Graphs can be used for designing different encryption algorithms. The interaction between graph theory and cryptography is quite interesting. A. Netto Mertia and M. Sudha [18] introduced a newly formulated Index Difference Graph and explored its structural properties as a foundation for cryptographic systems. Beaula C. [19] proposed a cryptosystem based on the Turan graph, leveraging its dense multipartite structure to enhance robustness. The study introduced a novel approach by decomposing the Turan graph into paths and stars, applying edge labeling for encrypting and decrypting sentences, along with corresponding algorithms. Meenakshi [20] investigated a combinatorial approach to graph networks using efficient domination and total magic labeling. The study introduced a novel method for encrypting and decrypting confidential numbers by employing efficient domination concepts together with labeled graphs. For applications of graph theory in cryptography, refer to [21,22,23]. In [24], Selvakumar and Gupta proposed an innovative algorithm for encryption and decryption using connected graphs. In [25], Yamuna and Karthika describe a unique method of transferring data by using bipartite graph. Hu Liang and Dong [26] proposed a bipartite graph-based propagation approach to address fraud detection in large-scale advertising systems. In recent years, there has been increasing interest in utilizing graphs as a framework for developing novel methodologies across various domains of cryptography (refer [27,28,29,30,31,32,33]). A few more applications of graph theory in coding theory can be referred to in [34,35,36]. Shahnawaz Ahmad et al. [37] proposed the Hybrid Cryptographic Approach (HCA), which was introduced to improve the Key Management System (KMS) in cloud environments. Corthis et al. [38] proposed a fog computing-based framework for secure healthcare IoT, integrating Elliptic Curve Cryptography and Proxy Re-encryption with an Enhanced Salp Swarm Algorithm (ESSA). The hybrid model, combining WOA with SSA, optimizes key parameters to strengthen real-time data sharing and authentication of electronic health records. Hongyu Zhu [39] addressed the computational challenges of the SM2 public key cryptographic algorithm in IoT devices, where large integer operations hinder efficiency. The study proposed an optimized SM2 implementation tailored to enhance performance in IoT contexts. Singh. P et al. [40] explored the use of Generative Adversarial Networks (GANs) in cryptography, modeling encryption and decryption through adversarial neural networks. The study conducted a comparative analysis of four activation functions to evaluate their impact on the efficacy of the cryptographic process. Tsmots et al. [41] presented a neural network-based approach for real-time cryptographic data protection with symmetric keys, tailored for embedded systems. The study emphasized its applicability to UAV onboard communication and evaluated feasibility through FPGA hardware implementation. Zahrah Asri Nur Fauzyah et al. [42] proposed a hybrid image encryption scheme that integrates Quantum Key Distribution (QKD) using the BB84 protocol with seven-dimensional ( 7 D ) and two-dimensional ( 2 D ) hyperchaotic systems. The scheme enhances key exchange security, achieves high randomness through hyperchaotic dynamics, and demonstrates strong resistance to statistical and differential attacks, making it suitable for post-quantum secure communications.

1.2. Preliminaries

Graph labeling is a technique that assigns values, labels, or numbers to the vertices, edges, or both, according to specific rules. Each labeling method follows distinct criteria and serves different applications, with the choice of labels depending on the problem under investigation. This technique facilitates the study of symmetry, balance, and other combinatorial aspects of a graph, and the process of studying them is made easier with the aid of the graph-labeling technique. Throughout this manuscript, all graphs are assumed to be simple, finite, connected, and undirected.
Design of the secret key in graph-based index difference modular cryptography
Let G be a graph of order n, and let S be a set of positive integers with | S | = n . Assign each vertex v V ( G ) a unique positional index i, which is selected uniformly at random from the discrete ordered set S. Then G is said to be an Index Difference Graph if there exists a bijection Ω : V ( G ) { 0 , 1 , 2 , , n } that maps each vertex to an element of the aforementioned codomain, according to its positional index i, such that Ω ( v i ) = i 2 when i 0 ( m o d 2 ) and i 1 2 when i 1 ( m o d 2 ) . The edge labeling exhibits a bounded imbalance, with the edge discrepancy lying within the closed interval [ 0 , 1 ] . Specifically, this means that 0 | Δ L 1 Δ L 1 c | 1 , where Δ L 1 represents the number of edges labeled with 1, and Δ L 1 c denotes the number of edges not labeled with 1. If a graph G allows for a specific labeling technique, it is classified as an index difference graph.
Perception of the graph model key structure
The proposed graph model acts as the secret key, aiming to bolster the security of the encryption mechanism. The key space of this encryption technique is determined by the number of possible permutations of the connections in the scrambled graph. In IDMC, the key length is determined by the structural complexity of the graph used as the encryption key. This complexity is influenced by several factors, including the positioning of vertices, the number of vertices, the number of edges, the labeling schemes, and the type and structure of the graph.
In the next section, we have investigated its applicability across different graph structures, such as the wheel graph, centipede graph, double triangular snake graph, bipartite graph and subdivision graph, centipede graph, and path graph. A new graph-based algorithm is implemented on graphs adhering to the index difference graph structure, ensuring that the encryption complexity remains linear.

2. Main Results

The Index Difference Modular Cryptography Algorithm is implemented on graphs adhering to the index difference graph structure, ensuring that both time and space complexities remain linear. As in the graph-based cryptography, time complexity depends on the number of vertices and edges, the type of labeling method, and the graph structure. In the next section, we have identified the graph structures that conform to the criteria of the Index Difference Graph.
Proposition 1.
Let n 1 be a positive integer. Then the centipede graph P n 2 k 1 is an index difference graph.
Proof. 
The centipede graph P n 2 k 1 is a graph constructed by starting with a path graph P n on n vertices v 1 , v 2 , , v n and then two pendant vertices, u i and w i , are attached to each vertex v i in P n . Edges are formally added to each vertex P n to connect it to u i and w i , where u i w i P n .
Thus, the vertex set is V ( G ) = { v 1 , v 2 , , v n } { u 1 , u 2 , , u n } { w 1 , w 2 , , w n } . And the edge set is E ( G ) = { ( v i , v i + 1 ) / 1 i n 1 } { ( v i , u i ) / 1 i n } { ( v i , w i ) / 1 i n }
| V ( G ) | = 3 n and | E ( G ) | = 3 n 1 .
This structure resembles a centipede, with the central spine formed by the path P n and each vertex having two legs as pendant edges.
Initially, the positional indices are designated to each vertex in the centipede graph P n 2 k 1 . The vertices should be systematically assigned positions pursuant to the following scheme:
Position ( φ ) = 3 i 2 , if φ = u i ( upper pendent vertex of v i ) 3 i 1 , if φ = v i ( path vertex ) 3 i , if φ = w i ( lower pendent vertex of v i )
where, 1 i n .
Now, define a function Ω : V ( G ) { 0 , 1 , 2 , 3 , , n } that allocates numerical values to the vertices of P n 2 k 1 , according to their designated positions, as governed by the index difference graph conditions. Subsequently, the edges labeled with the value 1 in the centipede graph are determined as follows.
The edges e ( u 1 , v 1 ) , e ( v 1 , v 2 ) , and e ( v 2 , w 2 ) consistently retain the label 1 for all permissible n in P n 2 k 1 , provided they are included in the graph structure. Beyond this invariant subset, the labeling schema can be encapsulated as follows:
For all i N ,
χ ( e ( u i , v i ) ) = 1 if i 1 ( m o d 2 )
χ ( e ( v i , w i ) ) = 1 if i 0 ( m o d 2 )
χ ( e ( v 2 i 1 , v 2 i ) ) = 1 i N
In this context, χ : E ( P n 2 k 1 ) Z represents the characteristic labeling function assigning value 1 to the specified edge set in accordance with the parity and indexing structure of the centipede graph. All remaining edges in E ( P n 2 k 1 ) E 1 are assigned values strictly different from 1, where E 1 denotes the set of edges assigned the value 1.
Upon a comprehensive examination of the edge label assignments throughout the graph P n 2 k 1 for arbitrary n, it can be deduced that the total number of edges labeled with 1 denoted as Δ L 1 , asymptotically conforms to 3 n 2 .
Owing to the fact that the total number of edges is 3 n 1 , the number of edges labeled 1, denoted as Δ L 1 c is given by Δ L 1 c = ( 3 n 1 ) 3 n 2 .
It is necessary to prove that | Δ L 1 Δ L 1 c | 1
Substituting the expressions
Δ L 1 Δ L 1 c = 3 n 2 ( 3 n 1 ) 3 n 2 .
= 2 3 n 2 ( 3 n 1 )
Since 3 n 2 represents the greatest integer less than or equal to 3 n 2 .
That is,
3 n 2 1 < 3 n 2 3 n 2
So,
3 n 2 < 2 3 n 2 3 n
Owing to the fact that ( 3 n 1 ) lies between the two values 3 n 2 and 3 n .
From Equation (1), it must be shown that
2 3 n 2 ( 3 n 1 ) 1
When n is even. Let n = 2 k , an even number.
Then,
3 n 2 = 3 k ( aninteger ) 2 3 n 2 = 3 n .
Thus, 2 3 n 2 ( 3 n 1 ) = 1 . So, the difference is exactly 1.
When n is odd. Let n = 2 k + 1 , where k N .
Then,
3 n 2 = ( 6 k + 3 ) 2 = 3 k + 1.5 2 3 n 2 = 3 n 1 .
Therefore, 2 3 n 2 ( 3 n 1 ) = 0 . So, the difference is exactly 0.
Thus, in both cases, the difference between 2 3 n 2 and ( 3 n 1 ) is at most 1, there by proving that 2 3 n 2 ( 3 n 1 ) 1 .
From the Equation (1) ⇒
| Δ L 1 Δ L 1 c | = 2 3 n 2 ( 3 n 1 ) 1 .
Hence, the centipede graph P n 2 k 1 is an index difference graph. □

3. Foundational Graph Concepts in Modular Cryptographic Design

Cryptography can be used to conceal the content of the message so that it is visible solely to the sender and the intended receiver. Graph-based cryptography is a relatively new area of study, and these methods are constantly being developed, and the specific labeling techniques can offer new avenues for security. The secret key plays a crucial role in the cryptographic framework. This secret key impedes brute-force attacks and renders unauthorized decryption attempts considerably more challenging. We have applied the index difference graph model, integrated with modular arithmetic, to perform the encryption and decryption of plaintext in the cryptographic process. This new process is known as the graph-based Index Difference Modular Cryptographic algorithm.
In the subsequent section, we have discussed the Index Difference Modular Cryptography algorithm, which utilizes both the Centipede graph P n 2 k 1 and path graph P n structures along with the modular algorithm and the formally defined secret key used in the cryptographic process.

4. Graph-Theoretic Construction of an Index Difference Modular Algorithm Using a Centipede Graph P n 2 k 1

The structural model of the index difference centipede graph P n 2 k 1 , which includes vertex positioning, vertex labeling schemes, and edge connectivity, plays a pivotal role in the encryption key structure. This study elucidates the process of efficiently encoding and decoding the plaintext message ‘THE EAGLE HAS LANDED’ by employing the index difference graph technique over a centipede graph topology, integrated with a modular algorithm.
In graph-based cryptography, plaintext letters are transformed into the vertices of a graph, and thus, the plaintext letters become the vertices of the graph.
Mapping Characters to Numbers: Each character in the plaintext is converted into a corresponding integer value using the following scheme: Letters AZ are mapped to values 1–26, and the space character is mapped to 0. This mapping ensures that all characters fall within the range [0, 26], which will be essential for applying modular arithmetic with a modulus of 27. The plaintext consists of 20 characters, including spaces, so it is essential to choose a centipede graph that includes 20 or more vertices. Accordingly, the graph P 7 2 k 1 , which consists of 21 vertices, is deemed appropriate for this purpose.
Formulation of the Secret Key for Index Difference Modular Cryptography: In the graph-based Index Difference Modular Cryptographic Algorithm, the encryption process entails vertex positioning and labeling, computation of edge values, and edge/vertex values are used to generate the encrypted formula. These serve as the cryptographic key in the proposed algorithm.
Secret Key Generation: Assign the first n plaintext characters, including spaces, to the path vertices v 1 , v 2 , , v n of the centipede graph P n 2 k 1 . Subsequently, allocate the remaining n characters sequentially to all upper pendant vertices u i . Upon completion of assignments to all u i vertices, continue the allocation to the lower pendant vertices w i , maintaining the original order. In instances where the total number of characters is insufficient to populate all vertices, the surplus lower pendant vertices shall remain unassigned. Only those vertices to which characters have been explicitly mapped are to be considered in the encoding procedure.
Once the characters of the plaintext are mapped to the vertices, assign a position systematically to each character (vertex) as delineated in Proposition 1. Subsequently, assign values to each vertex according to the rules of the Index Difference Graph, followed by computing the corresponding values for the edges.
Encryption Algorithm: Each plaintext value is encrypted using the formula
[Plaintext − vertex label] mod27
For encryption, a secret key vector of equal length is used. Each element of the plaintext is subtracted by the corresponding secret value (vertex label).
Table 1 presents the integer values of the plaintext, their positions after being placed on the graph, the corresponding vertex labels based on their positions, and the final encrypted values of the plaintext.
Encrypted message: SFAVYTXCXCVKRKYJYYV
Decryption Algorithm: To retrieve the original plaintext, each encrypted value is decrypted using the formula: P l a i n t e x t = ( C i p h e r + s e c r e t c o d e ) m o d 27 , where the secret code refers to the vertex label of the character.
This technique proficiently reverses the encryption process and enables the reconstruction of the original message.
Recovered Plaintext: THE EAGLE HAS LANDED
This study unveils how to efficiently encode and decode the plaintext message ‘THE EAGLE HAS LANDED’ using the graph topology, which admits an index difference graph.
Low Collision Probability in IDMC
In this example, we have placed the plaintext letters starting with the vertices of the path, following the order from v 1 to v n . Once all the path vertices are filled, we then assign the characters to the upper pendent vertices, followed by the lower pendent vertices, in the same order. The selection of vertices to place the plaintext characters is also part of the secret key in IDMC. We either shuffle the plaintext characters on a given graph or select a graph containing more vertices than the number of plaintext characters. This increases the strength of the encryption. Even when using two different large keys, the input can produce the same ciphertext only with extremely low probability. When using a complex index-difference graph with the same plaintext, the encryption and decryption consistently yield the original message, while maintaining a minimal collision probability. A lower collision probability occurs when the graph key is large, complex, uniquely structured, and labeled in a highly variable manner, making it extremely unlikely for two different graphs to produce the same encrypted output. By virtue of this, IDMC exhibits a lower collision probability, enhancing the security of the encryption.
Remark 1.
The selection of vertices and their order can also be changed. Shuffling the letters across the graph vertices enhances the cryptographic strength of the secret key, thereby increasing its resistance to unauthorized decryption. In this study, a 21-character plaintext is utilized; the proposed method is inherently scalable and can accommodate any desired number of characters, demonstrating its adaptability for broader cryptographic applications. In the current work, the encryption results are demonstrated for the alphabet A–Z with space to illustrate the feasibility of the proposed method in a simplified setting. Extending the scheme to ASCII/Unicode to expand the key space and improve practical applicability is among our plans for future future work. The key factors in selecting the index difference modular cryptography algorithm were as follows:
  • Structural novelty—the use of graph-theoretic properties, particularly the index difference graph, provides a new mathematical key foundation for encryption.
  • Low collision probability—a modular encryption technique based on IDG lowers the probability of message collisions.
  • Computational efficiency—the algorithm maintains linear time complexity.
  • Flexibility across graph classes—the framework can be applied to various graph structures (e.g., paths, cycles, bipartite graph ( K 1 , n ), Double Triangular Snake Graph ( D T n ) , and the subdivision graph S ( L n ) ), allowing adaptability.
  • Cryptographic strength—the inherent complexity of the key structure enhances the algorithm’s robustness against brute-force and structural attacks.

Time Complexity Analysis of Graph-Based Cryptography Using an Index Difference Centipede Graph P n 2 k 1

In graph-based cryptography, time complexity depends on the number of vertices and edges, the type of labeling method, and the graph structure. The centipede graph P n 2 k 1 , consists of 3 n vertices and 3 n 1 edges. In the proposed method, the positions of the plaintext, as well as the vertex and edge labels, are predetermined. We are counting the number of edges labeled by 1, and the number of edges other than 1 depends on the total number of edges. As a result, the time complexity of the graph-based cryptography algorithm when implemented on an index difference centipede graph P n 2 k 1 is O ( n ) .
Proposition 2.
For every integer n 2 , the path P n is an index difference graph.
Proof. 
A path graph P n with n vertices, where each vertex is connected linearly to the next, has exactly n 1 edges. For a path P n , assign indices to all its n vertices. Index the first vertex as the first position, the second vertex as the second position, and continue this pattern sequentially until the last vertex, which is indexed as the n t h position.
Now define a function Ω : V ( G ) { 0 , 1 , 2 , 3 , , n } that assigns labels to the vertices of the graph P n according to their designated positions. Hence, for each vertex v i , the label is determined by the expression Ω ( v i ) = i 2 , where i denotes the index or position of the vertex. As the edges in the graph P n connect consecutive vertices v i and v i + 1 , where i = 1 , 2 , 3 , , n 1 , the weight assigned to an edge e i = ( v i , v i + 1 ) is given by w ( e i ) = Ω ( v i + 1 ) Ω ( v i ) .
  • If i is even, then Ω ( v i + 1 ) = Ω ( v i ) , so w ( e i ) = 0 .
  • If i is odd, then Ω ( v i + 1 ) = Ω ( v i ) + 1 , so w ( e i ) = 1 .
Since the edge weights alternate between 0 and 1, the absolute difference between any two consecutive edge weights satisfies w ( e i + 1 ) w ( e i ) 1 . Hence, the difference between edges labeled 0 and 1 is always, at most, 1.
Therefore, P n is an index difference graph for all n 2 . □
Result 1.
There are n vertices and n 1 edges in the path graph. As a result, the encryption algorithm’s time complexity is O ( n ) .

5. Graph-Theoretic Construction of an Index Difference Modular Algorithm Using Path Graph P n

We now use a path graph that satisfies the index difference condition for secure encoding and decoding in graph-based cryptography.
Consider a path graph P n if the plaintext contains n characters, including spaces. Character-to-number mapping is applied in the same manner as demonstrated in the preceding example.
In this example, three cryptographic keys are utilized: Secret Keys 1 and 2 dictate the spatial allocation of positional indices to the vertices (characters) and the values of the edges as specified by Proposition 2, and Secret Key 3 is the encrypted formula. E n c r y p t e d f o r m u l a = [ P l a i n t e x t E d g e l a b e l ] m o d 27 . For encryption, a secret key vector of equal length is used. Each element of the plaintext is subtracted by the corresponding secret value (Edge label).
Here, we retain the plaintext value of the final character of the plaintext, unaltered, since it does not have an outgoing edge on the path graph P n , where the last letter is placed.
Then, compute the cipher text values and the encrypted message. Finally, use the formula below to decode the original message: D e c r y p t e d = ( C i p h e r t e x t v a l u e + E d g e l a b e l ) m o d 27 .
This study unveiled how to effectively use a path graph to encode and decode a plaintext message.
Observation 1.
The proposed algorithm facilitates secure message transmission regardless of word length by leveraging the structural properties and mathematical characteristics of these graphs.
Proposition 3.
Show that the wheel graph W 5 admits an index difference graph.
Proof. 
A wheel graph W n is created by adding a central vertex (called the ‘hub’) to a cycle graph C n , and then connecting this hub to every vertex on the cycle.
V ( W n ) = V ( C n ) { u } that is, V ( W n ) = n + 1 .
E ( W n ) = E ( C n ) { ( u , u i ) : 1 i n } . That is, E ( W n ) = 2 n .
The wheel graph W 5 includes the five vertices of the cycle C 5 , namely, u 1 , u 2 , u 3 , u 4 , u 5 and one central hub vertex, say u. It contains a total of 10 edges: 5 rim edges forming the cycle C 5 , and 5 spoke edges connecting the central vertex u to each vertex of the cycle. Initially, assign a position to each vertex in the wheel graph. Thereafter, assign values to the vertices pursuant to Definition 1. Based on their positions, the following values are to be assigned to the vertices: 3 , 1 , 0 , 2 , 1 , and 2. The vertices should be positioned and labeled in such a way that all the conditions of the index difference graph are satisfied. The vertex labeling is examined under the following cases:
Case(i) Assume that the value assigned to the central vertex is 0.
If the value assigned to the central vertex is zero, then the remaining values 3 , 1 , 2 , 1 , and 2 can be assigned to the other vertices according to their positions.
Now, determine the values of all edges by calculating the absolute differences between the values of the vertices that each edge connects. Among the five spoke edges, two have a value of one.
To prove the theorem, it must be shown that exactly three of the five rim edges are assigned the value one.
There are six distinct circular permutations that are used to assign the values 1 , 1 , 2 , 2 , and 3 to the five vertices. Among all six permutations, the number of edges labeled one appears two times in three of the six different circular permutations and four times in three of them. This contravenes the requirement that the absolute difference between the number of edges labeled with 1 and those labeled with values other than 1 must not exceed 1. This violates the condition for an index difference graph.
Hence, in this case (i), W 5 does not admit an index difference graph.
Case(ii) Assume that the value assigned to the central vertex is three.
If the central vertex has a value of 3, the remaining values 2 , 1 , 1 , 0 , and 2 can be allocated among the five vertices based on how they are positioned.
In this instance, two of the five spoke edges have magnitudes of precisely one.
To prove the theorem, it must be proven that exactly three of the five rim edges have a magnitude of one. Consequently, the values 1 , 1 , 0 , 2 , and 2 can be assigned to the five vertices in six distinct ways. The number of edges labeled one appears two times in three of the six different circular permutations and four times in three of them. This breaches the norm that the number of edges with the label 1 and those without the label 1 cannot differ by more than one.
This, in turn, indicates that the criteria for the index difference graph have been violated. As an outcome, in this case (ii), W 5 does not accept an index difference graph.
Case(iii) Assume that the value assigned to the central vertex is one.
Let the central vertex be assigned the value one, and let the remaining values from the set { 3 , 1 , 0 , 2 , 2 } be assigned to the five vertices. So, the total number of spoke edges labeled one is three. There are 12 distinct ways to assign the values 3 , 1 , 2 , 2 , and 0 to the five vertices. As a result, the total number of edges labeled with a value of 1 is given by 3 + x , where x represents the number of such edges among the rim edges. Accordingly, we define Δ L 1 = 3 + x .
Now, the condition | Δ L 1 Δ L 1 c | = | 2 x 4 | 1 must hold. This equation is satisfied only when x = 2 . Out of the 12 possible arrangements of the vertex values, 5 specific arrangements fulfil this condition.
Therefore, in this scenario (Case iv), the wheel graph W 5 admits an index difference graph.
Case(iv) Assume the value assigned to the central vertex is two.
In the current case, the five vertices can be assigned the values 3 , 1 , 2 , 1 , and 0 in 12 different circular ways. There are three spoke edges in all that are labeled one. Thus, the total number of edges labeled with the value 1 can be expressed as 3 + y , where y denotes the count of such labels among the rim edges. This leads to the expression Δ L 1 = 3 + y .
The condition | Δ L 1 Δ L 1 c | = | 2 y 4 | 1 must be satisfied for an index difference graph technique to hold. This equation is valid only when y = 2 . This condition is met by exactly 6 arrangements out of the 12 total circular permutations of vertex values.
Thus, under this configuration (Case iv), the wheel graph W 5 supports an index difference graph.
Hence, based on cases (iii) and (iv), it is conclusively proven that the graph W 5 admits an index difference graph. □
Observation 2.
Exhaustive (brute-force) enumeration of labeling is commonly used as a baseline in graph-labeling studies. It involves checking up to k n assignments (where n is the graph size and k label options) to find a satisfying labeling. In the above proposition, cases (i) and (ii) do not satisfy the criteria of the Index Difference Graph. If these cases are considered in the cryptographic process, they may lead to confusion during encoding and decoding, as vertex values in this graph are assigned based on the positions of the vertices. Cases (iii) and (iv) meet the desired criteria. Employing a structured, symmetric, and balanced Index Difference Graph can improve the robustness of the cryptographic key.
Corollary 1.
The wheel graphs W 2 , W 3 , W 4 , W 5 and W 8 are index difference graphs.
Proof. 
Initially, assign every vertex of the wheel graphs W 2 , W 3 , W 4 , W 5 and W 8 a position, as specified in the previous theorem.
Let Ω : V ( W n ) { 0 , 1 , 2 , , n } be a vertex labeling function that assigns numerical values to the index vertices.
For each u v E ( W n ) , define the edge difference as Ω ( u ) Ω ( v ) , and define
χ Ω ( u ) Ω ( v ) = 1 , i f Ω ( u ) Ω ( v ) = 1 0 , o t h e r w i s e
Then define Δ L 1 = u v E ( W n ) χ Ω ( u ) Ω ( v ) and Δ L 1 c = u v E ( W n ) 1 χ Ω ( u ) Ω ( v )
To prove that a graph shows an index difference, we must show that Δ L 1 Δ L 1 c 1 . Case Verification:
Specifically…
For W 2 : Δ L 1 = 2 , Δ L 1 c = 2 ; W 3 : Δ L 1 = 3 , Δ L 1 c = 3 ; W 4 : Δ L 1 = 4 , Δ L 1 c = 4 ; W 5 : Δ L 1 = 5 , Δ L 1 c = 5 ; W 8 : Δ L 1 = 8 , Δ L 1 c = 8
In each case, using a previously established technique, we have
Δ L 1 = Δ L 1 c = 2 n 2 = n where n = 2 , 3 , 4 , 5 , 8
Therefore,
Δ L 1 Δ L 1 c = 0 .
The requirement for the index difference graph technique is met, since Δ L 1 Δ L 1 c 1 in all scenarios.
Therefore, the wheel graphs W 2 , W 3 , W 4 , W 5 and W 8 admit the index difference graph. □
Observation 3.
In graph-based cryptography, time complexity depends on the number of vertices and edges, the type of labeling method, and the graph structure. The wheel graph, being a dense structure, is inherently more complex than sparse graphs like paths or centipedes. To minimize time complexity, the index difference encoding algorithm selects either edge-based or vertex-based processing, depending on the structural characteristics of the graph. When a vertex-based encryption algorithm is applied to a structured index difference wheel graph, the time complexity is O ( n ) .
Proposition 4.
The bipartite graph K 1 , n , 2 n 9 is an index difference graph.
Proof. 
Consider the bipartite graph K 1 , n where there are two sets of vertices. Set A contains a single vertex. Set B contains n vertices. Each vertex in Set B is connected to a single vertex in Set A, forming edges, for a total of n edges. First, allocate positions to each vertex in the graph. Since the graph K 1 , n has n + 1 vertices, the possibilities for positions when allocating the indices for its vertices are 1 , 2 , 3 , , n + 1 . To meet the conditions set forth by the theorem, each vertex must be positioned in a specific manner. The methods for assigning these positions are detailed below.
For the graph K 1 , n , when 2 n 5 , the vertex in set A is assigned to the n t h position, while the vertices in set B are randomly distributed among positions 1 , 2 , 3 , , n 1 , n + 1 . When n = 6 , 9 , the vertex in A is placed at the ( n 3 ) r d position, and the remaining vertices in B are assigned randomly to positions 1 , 2 , 3 , , n 4 , n 2 , n 1 , n , n + 1 . Similarly, for n = 7 , 8 , the vertex in A is located at the 4th position, with the vertices in B being randomly allocated to positions 1 , 2 , 3 , 5 , , n 4 , n 3 , n 2 , n 1 , n + 1 .
Next, define a function Ω : V ( G ) { 0 , 1 , 2 , 3 , , n } that allocates numerical values to the vertices of the graph K 1 , n for 2 n 9 , pursuant to their assigned positional order, as articulated in the definition. As a result, the vertex in Set A was assigned the value n 2 when 2 n 5 , and also maintained the value n 3 2 for 6 n 9 .
Now compute the absolute difference between the values assigned to the edges.
When n is even, for the graph K 1 , 2 n , with n 1 , the graph consists of 2 n edges. Among these, n edges are assigned a value of 1, while n edges are assigned values different from 1.
When n is odd—that is, for the graph K 1 , 2 n + 1 with n 1 —the graph contains 2 n + 1 edges. In this case, n + 1 edges are assigned a value of 1, whereas the remaining n edges are assigned values other than 1, according to the predefined labeling scheme.
To evaluate the absolute disparity between the number of edges labeled with weight 1 and those assigned a weight other than 1, consider the following cases:
When n is even; that is, K 1 , 2 n , n 1 . Δ L 1 Δ L 1 c = | n n | = 0
When n is odd; that is, K 1 , 2 n + 1 , n 1 . Δ L 1 Δ L 1 c = | n + 1 n | = 1
In both scenarios, the magnitude of the difference does not exceed 1. Hence, it can be affirmed that the condition Δ L 1 Δ L 1 c 1 is consistently upheld, thereby satisfying the criterion.
Therefore, it is proven that K 1 , n for 2 n 9 is an index difference graph. □
Remark 2.
When employing a graph that admits an Index Difference Graph structure, both the sender and receiver must be aware of the graph’s precise structure, as this enhances the robustness of the cryptographic key.
Proposition 5.
The Double Triangular Snake Graph ( D T n ) is an index difference graph for all n.
Proof. 
The Double Triangular Snake Graph ( D T n ) is a graph constructed from the path graph P n + 1 , which consists of n + 1 vertices, denoted as v 1 , v 2 , , v n , v n + 1 , connected in a linear sequence. Each edge of P n + 1 serves as the base for two parallel triangles, forming a zigzag chain of 2 n triangles. Every successive pair of triangles shares a common edge, ensuring connectivity throughout the graph. The ancillary vertices constituting the upper and lower triangular substructures are designated as u 1 , u 2 , , u n and w 1 , w 2 , , w n respectively.
Thus, V ( D T n ) = 3 n + 1 and E ( D T n ) = 5 n . This structure ensures that D T n is a connected, planar graph with a well-defined arrangement of triangular subgraphs.
Begin by delineating the positions of all vertices constituting the Double Triangular Snake Graph D T n .
Let us define χ ( v i ) as the position of vertex v i in graph D T n .
χ ( v i ) = 1 , i = 1 2 , i = 2 6 , i = 3 χ ( v i 1 ) + 3 , i 4
Let us define ψ ( u i ) as the position of vertex u i in graph D T n .
ψ ( u i ) = 3 , i = 1 5 , i = 2 ψ ( u i 1 ) + 3 , i 3
Let us define ϑ ( w i ) as the position of vertex u i in graph D T n .
ϑ ( w i ) = 4 , i = 1 ϑ ( w i 1 ) + 3 , i 2
Subsequently, define a function Ω : V ( G ) { 0 , 1 , 2 , 3 , , n } that allocates numerical values to the vertices of D T n , contingent upon their designated spatial positions and the stipulated criteria. The weight of an edge is ascertained by computing the absolute difference between the numerical values allocated to its incident vertices.
For any n 1 , in the graph D T n , the edges that are invariably assigned the value 1 are e ( v 1 v 2 ) = 1 , e ( v 1 u 1 ) = 1 and e ( v 2 w 1 ) = 1 . From n = 2 onward, additional edges are assigned value 1, contingent upon the parity of n.
Case 1 When n is even
For even values of n, the graph D T n incorporates two supplementary edges labeled 1 relative to D T n 1 : e ( v n u n ) = 1 and e ( u n v n + 1 ) = 1 .
Case 2 When n is odd
For odd values of n, the graph D T n encompasses three additional edges consistently labeled 1 when compared to the preceding graph: e ( v n u n ) = 1 , e ( w n v n + 1 ) = 1 , and e ( v n v n + 1 ) = 1 .
Let Δ L 1 denote the number of edges in D T n that are endowed with the label 1, and let Δ L 1 c denote the number of edges assigned labels distinct from 1. The resultant quantities, derived through the aforementioned procedure, are expressed as follows: Δ L 1 ( n ) = 5 n 2 and Δ L 1 c ( n ) = 5 n 2 .
We consider two exhaustive cases based on the nature of 5 n 2 :
If 5 n 2 is an integer, then Δ L 1 = Δ L 1 c Δ L 1 Δ L 1 c = 0 (since in this case, the ceiling and floor functions coincide).
If 5 n 2 is not an integer, then Δ L 1 = Δ L 1 c + 1 Δ L 1 Δ L 1 c = 1 .
In both cases, the absolute difference satisfies Δ L 1 Δ L 1 c 1 .
This proves that for all n, the absolute difference between the number of edges labeled by 1 and those labeled by other than 1 in graph D T n is always at most 1.
Therefore, the Double Triangular Snake Graph D T n is an index difference graph for all n. □
Proposition 6.
For all integers n > 1 , the subdivision graph S ( L n ) of the line graph L n is an index difference graph.
Proof. 
The subdivision graph S ( L n ) denotes the graph obtained by performing a subdivision operation on L n , wherein a new vertex is interposed at the midpoint of each edge. Consequently, every edge of L n is transformed into a path of length 2. Let u 1 , u 2 , , u n and v 1 , v 2 , , v n be the vertices of the first (lower) and second (upper) rows of L n , respectively. Let v i , u i and w i denote the newly added vertices inserted between the vertex pairs ( v i , v i + 1 ) , ( u i , u i + 1 ) , and ( u i , v i ) , respectively. Then, S ( L n ) is of order 5 n 2 and size 6 n 4 .
The position of the vertices of the graph S ( L n ) , for n > 1 is delineated as follows:
P ( u i ) = i , i = 1 i + 5 , i = 2 P ( u i 1 ) + χ ( i 1 ( m o d 2 ) ) . 3 + χ ( i 0 ( m o d 2 ) ) . 7 i > 2
where χ ( i 1 ( m o d 2 ) ) = 1 if the condition is true; otherwise, it is 0.
      χ ( i 0 ( m o d 2 ) ) = 1 if the condition is true; otherwise, it is 0.
P ( v i ) = i + 2 , i = 1 i + 3 , i = 2 P ( v i 1 ) + χ ( i 1 ( m o d 2 ) ) . 7 + χ ( i 0 ( m o d 2 ) ) . 3 i > 2
where χ ( i 1 ( m o d 2 ) ) = 1 if the condition is true; otherwise, it is 0.
      χ ( i 0 ( m o d 2 ) ) = 1 if the condition is true; otherwise, it is 0.
P ( w i ) = i + 1 , i = 1 i + 4 , i = 2 P ( w i 1 ) + 5 , i 3
P ( u i ) = i + 7 , i = 1 P ( u i 1 ) + χ ( i 1 ( m o d 2 ) ) . 9 + χ ( i 0 ( m o d 2 ) ) . 1 i > 1
where χ ( i 1 ( m o d 2 ) ) = 1 if the condition is true; otherwise, it is 0.
      χ ( i 0 ( m o d 2 ) ) = 1 if the condition is true; otherwise, it is 0.
P ( v i ) = i + 3 , i = 1 P ( v i 1 ) + χ ( i 1 ( m o d 2 ) ) . 9 + χ ( i 0 ( m o d 2 ) ) . 1 i > 1
where, χ ( i 1 ( m o d 2 ) ) = 1 if the condition is true; otherwise, it is 0.
      χ ( i 0 ( m o d 2 ) ) = 1 if the condition is true; otherwise, it is 0.
Thereafter, define a function Ω : V ( G ) { 0 , 1 , 2 , 3 , , n } that allocates numerical values to the vertices of S ( L n ) , contingent upon their designated positions and the stipulated criteria.
In light of the preceding observation, it is evident that in the graph S ( L n ) , for all n > 1 , the cardinalities of the edge sets labeled 1 and those labeled distinctly from 1 are both identically equal to 3 n 2 .
Therefore, Δ L 1 Δ L 1 c 1 . Hence, the graph S ( L n ) meets the criteria for an index difference graph.
Thus, the graph S ( L n ) is an index difference graph for all n > 1 . □
Remark 3.
Depending on the length of the plaintext or the desired strength of the secret key, one may use only the ladder line, the lower and upper rows of the line graph, or randomly select vertices from the graph and assign letters to them accordingly.

6. Key Management Strategies

For the reinforced key system, the suggested encryption algorithm makes use of three secret keys, which are quite different from the traditional ones because of the differences in the properties of the new methods. A highly resilient key is used.

7. Algorithmic Complexities of the Index Difference Graph Technique

The complexity of the Index Difference Graph Technique is as follows:
Encryption Complexity: The time required to position the vertices, assign values, and compute the encrypted outputs.
Decryption Complexity: Time to reverse the process (usually simpler once labeling is known).

Computational Complexity Analysis of the Index Difference Modular Cryptography Algorithm

The significant strength of our proposed algorithm is its implementation within a structured graph framework that adheres to the criteria of index difference graph structures. In the proposed method, the positions of the plaintext, as well as the vertex and edge labels, are predetermined. As a result, it takes constant time to fix the vertex position.
In Section 4, we have employed the centipede graph for IDMC. In the graph-based cryptography framework, plaintext characters are mapped to the vertices. During the encryption process, each character is mapped onto the graph. Assigning a character to a vertex requires constant time. Therefore, to assign at most 3 n characters to the centipede graph, the overall complexity is O ( 3 n ) O ( n ) . In our proposed algorithm, we have employed the centipede graph, which admits IDG. Consequently, the positions of the vertices are predetermined, as established in Proposition 2. Since assigning a position to a vertex requires constant time, i.e., O ( 1 ) , fixing the positions of all characters in a graph of size 3 n requires at most O ( 3 n ) O ( n ) time.
The next step in the encryption process is to fix values to the vertices according to the condition defined in the design of the secret key. The condition is as follows: let Ω : V ( G ) { 0 , 1 , 2 , , n } , that maps each vertex to an element of the aforementioned codomain, according to its positional index i, such that Ω ( v i ) = i 2 when i 0 ( m o d 2 ) and and Ω ( v i ) = i 1 2 , when i 1 ( m o d 2 ) . Fixing the values to the vertices using the above formula requires constant time for each vertex. Therefore, for a graph with 3 n vertices, the overall average time complexity is O ( n ) . In the next step of the encryption process, the ciphertext value is obtained by subtracting the vertex value from the plaintext value. Alternatively, the edge value can be used instead of the vertex value, depending on the graph employed and the placement of the plaintext. However, in that case, the corresponding decryption formula must be adjusted accordingly. The value of each edge is defined as the difference between its adjacent vertices. For a graph with 3 n 1 edges, computing the values of all edges requires 3 n 1 operations. Hence, the overall average time complexity is O ( 3 n 1 ) O ( n ) . In turn, the overall computational complexity of IDMC using the centipede graph is O ( n ) .
The path graph P n , double triangular snake D T n , subdivision of ladder graph S ( L n ) , bipartite graph K 1 , n , and wheel graph W n have vertices of n, 3 n + 1 , 5 n 2 , n + 1 , and n + 1 , respectively, with edges of n 1 , 5 n , 6 n 4 , n and 2 n . Consequently, all of the graphs have an O ( n ) time complexity. We are counting the number of edges labeled by 1, and the number of edges other than 1 depends on the total number of edges. As a result, when employing the proposed algorithm, the time complexity for each of these graphs is O ( n ) .
Concerning space complexity, since all vertices are stored, the overall space complexity across all graphs is O ( n ) with respect to the vertices. Additionally, the space complexity for storing the number of edges labelled by 1 and those labelled by other values is constant. Therefore, the final space complexity of the graphs is O ( n ) . In conclusion, the aforementioned graphs have an O ( n ) computational complexity.
As is well known, an algorithm with a complexity of O ( n k ) indicates a slower process that is feasible only for small values of n due to high computational overhead. In contrast, the proposed technique achieves a complexity of O ( n ) across the entire graph, making it linearly efficient even for large graphs. This method enables the secure transmission of large messages using a strong key, as it allows characters to be shuffled across the graph’s vertices, followed by a structured encryption process that is particularly reliant on the positions of the vertices.

8. Discussion

In our approach, the index difference graph structure is mathematically formulated, and modular arithmetic is then integrated to define the encryption process. We use a combination of theoretical analysis and empirical testing to evaluate the security and effectiveness of the proposed algorithm.

Performance Analysis

The proposed encryption techniques provide new approaches to improve data security within confidential communications by utilising path graphs as well as particular centipede graphs. The suggested encryption approach will make use of the graphs that satisfy the index difference graph, which will be addressed in this paper. When an index difference graph is used in graph-based cryptography, labeling optimization ensures that the encoding is secure and efficient. The labeling is unique and reversible. The computational cost (time/space) of encryption and decryption is optimized. Here, we analyse the performance of these schemes, while taking into account their affirmative outcomes and limitations:
Affirmative Outcomes of Index Difference Graph-Based Modular Cryptography:
  • Enhanced security: The encryption algorithms provide increased security by combining modular algebra with the index difference graph structure, making it difficult for unauthorized parties to decode messages. The proposed cryptographic framework, predicated on IDG, employs a tri-key architecture, whereas conventional systems typically rely solely on a public and private key. This enhanced multi-key paradigm substantially strengthens security.
  • Resistance to traditional attacks: The distinct structure and functionality of these nonstandard graph-based encryption algorithms offer a defense mechanism against conventional cryptographic attacks such as frequency analysis and brute-force attacks. IDMC renders brute-force attacks computationally infeasible, as the key-search complexity escalates rapidly with graph size, yielding exceptionally high resistance for larger graphs. This will be demonstrated in the next section.
  • Scalability: The technique remains effective even when the communication system is complex or when there is a massive quantity of data. For large plaintext messages, brute-force guessing becomes exceedingly difficult; however, the encryption process remains tractable, as all values are predetermined and the proposed algorithm utilizes graphs that admit IDG.
  • Algorithm flexibility: Using different types of graphs makes this algorithm highly flexible and adaptable to various communication scenarios.
Limitations of Index Difference Graph -Based Modular Cryptography
A high level of expertise may be required to implement and comprehend the mathematical key concepts of the proposed encryption techniques, possibly hindering broad acceptance.

9. Brute-Force Resistance Analysis of Index Difference Modular Cryptography

Incorporating practical experiments with real data or simulations would further strengthen the validation of the proposed algorithm against specific attack models, such as brute-force and side-channel attacks. This section is primarily concerned with brute-force attacks.
In IDMC encryption, security arises from the graph structure and its index difference properties. IDMC encryption is robust because it makes brute-force guessing extremely difficult due to complex graph-based relationships. As a result, if an attacker attempts to guess the correct keys, the problem quickly becomes infeasible for large graphs, as the difficulty escalates rapidly with the graph size.
In Section 4, for the encryption process, we used a plaintext of 20 characters and accordingly selected a centipede graph of order 21. According to the proposed IDMC algorithm, 20 plaintext characters are assigned to the 21 vertices of the centipede graph. Therefore, the maximum allocation is achieved by selecting 20 vertices out of 21 to occupy the 20 positions. The number of such selections is given by 21 20 = 21 . Once the 20 vertices are chosen, the 20 positions can be assigned to them in all possible permutations, e.g., 20 ! . Hence, the total number of distinct ways to assign the positions is 21 20 × 20 ! = 21 ! .
Thus, the total number of possible assignments is 21 ! 5.11 × 10 19 .
In general, when 3 n 1 plaintext characters are assigned to the 3 n vertices in the centipede graph, the total number of possible assignments is 3 n 3 n 1 · ( 3 n 1 ) ! = ( 3 n ) ! . If a centipede graph of order 3 n is employed to enhance the strength of the secret key for a plaintext of 20 characters, then the total number of possible assignments is given by 3 n 20 × ( 20 ) ! = ( 3 n ) ! ( 3 n 20 ) ! = ( 3 n ) ( 3 n 1 ) , , ( 3 n 19 ) , is well approximated by ( 3 n ) 20 , illustrating the extremely rapid growth as n increases.This dramatic growth in brute-force resistance enhances the cryptographic strength as the order of the centipede graph increases.
In the proposed cryptography process, the next step is to assign values to the vertices (plaintext characters) as explained in the design of the secret key, once their positions are fixed. The number of possible assignments of 20 values in 21 vertices becomes 21 ! .
Hence, if the 20 distinct positions ( 1 20 ) are assigned to the 21 vertices in the centipede graph, and the vertex values are determined after assigning the positions, then the total number of possibilities is ( 21 ! ) 2 2.6 × 10 39 .
Considering a centipede graph with 3 n vertices and 3 n 1 plaintext characters, the total number of possibilities to assign the both the values of the vertex position and values of the vertices is 3 n 3 n 1 . ( 3 n 1 ) ! 2 = ( ( 3 n ) ! ) 2 10 2 l o g 10 ( 3 n ) ! .
  • For small graphs ( n 7 , i.e., 21 vertices), brute-force resistance ≈ 2.6 × 10 39 .
  • For larger graphs ( n 20 , i.e., 60 vertices), brute-force resistance ≈ 6.93 × 10 163 .
Hence, the utilization of sufficiently large graphs can substantially enhance brute-force resistance, even for relatively short plaintexts or small datasets, thereby reinforcing the robustness of the cryptosystem.

10. Weaknesses of the Index Difference Graph Structure

In graph-based IDMC, certain weaknesses may arise depending on the choice of graph structure. For instance, index difference modular cryptography may become weaker, or the computational complexity may no longer remain linear, when using graphs that do not admit index difference properties. Even in cases where the graph satisfies the requirements of an index difference graph, structural weaknesses can still exist. Specifically, graphs with highly regular or predictable structures (such as cycle graphs or wheel graphs) may allow an attacker to more easily infer the mapping or significantly reduce the brute-force search space. Such regularity and predictability represent important vulnerabilities in graph-based IDMC cryptographic systems.

11. Comparative Performance Analysis of Existing Cryptographic Models

It is significant to compare our proposed graph-based encryption methods with other encryption techniques in order to highlight their benefits and distinctive characteristics. Prathipa Murugan et al. [43] proposed a graph-based geometric mean labeling approach to enhance encryption and key management, and compared various graph labeling methods in cryptography. Table 2 presents a comparative analysis of various graph labeling methods utilized in cryptography.
Therefore, relative to other graph-theoretic cryptography methods, the proposed IDMC transcends in scalability and exhibits strengthened security.
In conventional cryptographic paradigms such as AES, RSA, and QKD, the framework generally relies on a dual-key mechanism, wherein a public key facilitates encryption while a private key enables decryption. However, within military-grade and high-security domains, augmenting the number of cryptographic keys can substantially fortify the resilience of the system against sophisticated adversarial attacks. In the proposed methodology, a tri-key architecture is employed, exclusively integrated into the encryption phase. The first key assigns values based on the positions of the plaintext characters. The second key reassigns these values through a transformation governed by a formula embedded in the structural design of the secret key within the IDMC framework. Subsequently, a third key is applied to produce the definitive ciphertext representation. This multi-layered key mechanism amplifies cryptographic robustness, thereby rendering the scheme exceptionally well suited for defense and security-critical applications.

12. Conclusions

The proposed graph-based Index Difference Modular Cryptography (IDMC) algorithm stands out due to its innovative use of complex graph structures, detailed key management protocols, maintenance of low complexity, enhanced security features, thorough analysis of computational efficiency, and low collision probability, making it a significant advancement in the field of cryptographic techniques. Future research should focus on further improving computational efficiency by leveraging more sophisticated graph structures, aiming to achieve higher security while preserving linear complexity. In this paper, we have presented the theoretical implementation of the proposed IDMC method. Moreover, the strengths, limitations, and unique position of the proposed method have been discussed through comparisons with other graph-based cryptographic techniques. Future research will also aim to conduct a comprehensive comparative analysis of IDMC with state-of-the-art cryptographic technologies such as AES, RSA, and QKD, alongside the implementation and validation of the Index Difference Modular Cryptography algorithm through rigorous computational experiments.

Author Contributions

Conceptualization, A.N.M.; Methodology, A.N.M.; Validation, M.S.; Formal analysis, A.N.M. and M.S.; Investigation, A.N.M. and M.S.; Resources, A.N.M.; Writing—original draft, A.N.M.; Writing—review editing, M.S.; Supervision, M.S.; Funding acquisition, A.N.M. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Acknowledgments

The authors declare that they did not use Artificial Intelligence (AI) tools in the creation of this article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Bondy, J.; Murty, U. Graph Theory with Applications; Macmillan: London, UK, 1979. [Google Scholar]
  2. Jin, J.; Tu, Z. Graph antimagic labeling: A survey. Discret. Math. Algorithms Appl. 2024, 16, 2330002. [Google Scholar] [CrossRef]
  3. Bensmail, J. Maximising 1’s Through Proper Labeling. Discuss. Math. Graph Theory 2025, 45, 351–376. [Google Scholar] [CrossRef]
  4. Miller, M.; Rodger, C.; Simanjuntak, R. Distance magic labels of graphs. Australas. J. Comb. 2003, 28, 305–315. [Google Scholar]
  5. Griggs, J.; Yeh, R.K. Labeling graphs with a condition at distance two. SIAM J. Discret. Math. 1992, 5, 586–595. [Google Scholar] [CrossRef]
  6. Handa, A.K.; Gondinho, A.; Singh, T. On local distance antimagic labeling of graphs. AKCE Int. J. Graphs Comb. 2023, 21, 91–96. [Google Scholar] [CrossRef]
  7. Arumugam, S.; Premalatha, K.; Baca, M.; Semanicova-Fenovcikova, A. Local antimagic vertex coloring of a graph. Graphs Comb. 2017, 33, 275–285. [Google Scholar] [CrossRef]
  8. Miklavic, S.; Sparl, P. On Distance Magic Labelings of Hamming Graphs and Folded Hypercubes. Discuss. Math. Graph Theory 2024, 44, 17–33. [Google Scholar] [CrossRef]
  9. Singh, T.; Godinho, A.; Arumugam, S. The Distance Magic Index of a Graph. Discuss. Math. Graph Theory 2017, 38, 135–142. [Google Scholar]
  10. Gallian, J.A. A Dynamic Survey of Graph Labeling. Electron. J. Comb. 2022, 25, 1–623. [Google Scholar] [CrossRef]
  11. Bokhar, S.A.U.H.; Kharal, A.; Samman, F.M.A.; Mhassen, E.E. Dalam and Ameni Gargouri. Efficient Graph Algorithms in Securing Communication Networks. Symmetry 2024, 16, 1269. [Google Scholar] [CrossRef]
  12. Shannon, C.E. Communication theory of secrecy systems. Bell Syst. Tech. J. 1949, 28, 656–715. [Google Scholar] [CrossRef]
  13. Rosen, K.H. Elementary Number Theory and its Applications; Addison-Wesley: Boston, MA, USA, 2005; pp. 1–719. [Google Scholar]
  14. Stinson, D.R. Cryptography: Theory and Practice; Chapman and Hall/CRC: Boca Raton, FL, USA, 2005; pp. 1–562. [Google Scholar]
  15. Priyadarsini, P.L.K. A survey on some applications of graph theory in cryptography. J. Discret. Math. Sci. Cryptogr. 2015, 18, 209–217. [Google Scholar] [CrossRef]
  16. Cusack, B.; Chapman, E. Using graphic methods to challenge cryptographic Performance. In Proceedings of the 14th Australian Information Security Management Conference, Perth, Australia, 5–6 December 2016; pp. 30–36. [Google Scholar]
  17. West, D.B. Introduction to Graph Theory, 2nd ed.; Pearson: London, UK, 2001. [Google Scholar]
  18. Netto Mertia, A.; Sudha, M. Modular Cryptographic Algorithm Using Index Difference Ladder Graph. Int. J. Math. Comput. Sci. 2025, 20, 997–1002. [Google Scholar] [CrossRef]
  19. Beaula, C.; Venugopal, P.; Praba, B. Block Encryption and Decryption of a Sentence Using Decomposition of the Turan Graph. J. Math. 2023, 2023, 1–9. [Google Scholar] [CrossRef]
  20. Meenakshi, A.; Kannan, A.; Cep, R.; Elangovan, M. Efficient Graph Network Using Total Magic Labeling and Its Applications. Mathematics 2023, 11, 4132. [Google Scholar] [CrossRef]
  21. Charles, D.X.; Lauter, K.E.; Goren, E.Z. Cryptographic hash functions from expander graphs. J. Cryptol. 2009, 22, 93–113. [Google Scholar] [CrossRef]
  22. Rivest, R.L.; Shamir, A.; Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 1978, 21, 120–126. [Google Scholar] [CrossRef]
  23. Ustimenko, V.A. On graph-based cryptography and symbolic computations. Serdica J. Comput. 2007, 1, 131–156. [Google Scholar] [CrossRef]
  24. Selvakumar, R.; Gupta, N. Fundamental circuits and cut-sets used in cryptography. J. Discret. Math. Sci. Cryptogr. 2012, 15, 287–301. [Google Scholar] [CrossRef]
  25. Yamuna, M.; Karthika, K. Data transfer using bipartite graphs. Int. J. Adv. Res. Sci. Eng. 2015, 4, 128–131. [Google Scholar]
  26. Hu, J.; Liang, J.; Dong, S. A bipartite graph propagation approach for mobile advertising fraud detection. Mob. Inf. Syst. 2017, 2017, 6412521. [Google Scholar] [CrossRef]
  27. Arunkumar, B.R. Applications of Bipartite Graph in diverse fields including cloud computing. Int. J. Mod. Eng. Res. 2015, 5, 1–7. [Google Scholar]
  28. Kedia, P.; Agrawal, S. Encryption using Venn-diagrams and graph. Int. J. Adv. Comput. Technol. 2015, 4, 94–99. [Google Scholar]
  29. Mahmoud, W.; Etaiwi, A. Encryption algorithm using graph theory. JOurnal Sci. Res. Rep. 2014, 3, 2519–2527. [Google Scholar]
  30. Razaq, A.; Awais Yousaf, M.; Shuaib, U.; Siddiqui, N.; Ullah, A.; Waheed, A. A novel construction of substitution box involving coset diagram and a bijective map. Secur. Commun. Netw. 2017, 5101934. [Google Scholar] [CrossRef]
  31. Razaq, A.; Alolaiyan, H.; Ahmad, M. A novel method for generation of strong substitution-boxes based on coset graphs and symmetric groups. IEEE Access 2020, 8, 75473–75490. [Google Scholar] [CrossRef]
  32. Selim, G.A. How to encrypt a graph. Int. J. Parallel, Emergent Distrib. Syst. 2020, 35, 668–681. [Google Scholar]
  33. Sinha, D.; Sethi, A. Encryption using network and matrices through signed graphs. Int. J. Comput. Appl. 2016, 138, 6–13. [Google Scholar] [CrossRef]
  34. El-Mesady, A.; Bazighifan, O. Construction of mutually orthogonal graph squares using novel product techniques. J. Math. 2022, 16, 9722983. [Google Scholar] [CrossRef]
  35. El-Mesady, A.; Hamed, Y.S.; Abualnaja, K.M. A novel application on mutually orthogonal graph squares and graph-orthogonal arrays. AIMS Math. 2022, 7, 7349–7373. [Google Scholar] [CrossRef]
  36. Higazy, M.; El-Mesady, A.; Mohamed, M.S. On graph-orthogonal arrays by mutually orthogonal graph squares. Symmetry 2020, 12, 1895–1913. [Google Scholar] [CrossRef]
  37. Ahmad, S.; Mehfuz, S.; Beg, J. Hybrid cryptographic approach to enhance the mode of key management system in cloud environment. J. Supercomput. 2023, 79, 7377–7413. [Google Scholar] [CrossRef]
  38. Corthis, P.B.; Ramesh, G.P.; Garcia-Torres, M.; Ruiz, R. Effective Identification and Authentication of Healthcare IoT Using Fog Computing with Hybrid Cryptographic Algorithm. Symmetry 2024, 16, 726. [Google Scholar] [CrossRef]
  39. Zhu, H.; Li, D.; Sun, Y.; Chen, Q.; Tian, Z.; Song, Y. Optimization of SM2 Algorithm Based on Polynomial Segmentation and Parallel Computing. Electronics 2024, 13, 4661. [Google Scholar] [CrossRef]
  40. Singh, P.; Dutta, S.; Pranav, P. Optimizing GANs for Cryptography: The Role and Impact of Activation Functions in Neural Layers Assessing the Cryptographic Strength. Appl. Sci. 2024, 14, 2379. [Google Scholar] [CrossRef]
  41. Tsmots, I.; Teslyuk, V.; Lukaszewicz, A.; Lukashchuk, Y.; Kazymyra, I.; Holovatyy, A.; Opotyak, Y. An Approach to the Implementation of a Neural Network for Cryptographic Protection of Data Transmission at UAV. Drones 2023, 7, 507. [Google Scholar] [CrossRef]
  42. Fauzyah, Z.A.N.; Sambas, A.; Adi, P.W.; Setiadi, D.R.I.M. Quantum Key Distribution-Assisted Image Encryption Using 7D and 2D Hyperchaotic Systems. J. Future Artif. Intell. Technol. 2025, 2, 47–62. [Google Scholar] [CrossRef]
  43. Murugan, P.; Nagarajan, S. Geometric Mean Labeling in Cryptography: A Graph-Based Approach to Enhanced Security and Performance. Contemp. Math. 2025, 6, 2698–2725. [Google Scholar] [CrossRef]
Table 1. Encrypted value of the plaintext.
Table 1. Encrypted value of the plaintext.
PlaintextPlaintextSecret Keys
CharacterValuePosition of the CharacterAssigned Vertex LabelEncrypted Value = (Plaintext Value − Vertex Label) mod27
T202119
H8526
E5841
-011522
E514725
A117820
G7201024
L121012
E5423
-07324
H81053
A113622
S1916811
-019918
L123111
A16325
N149410
D412625
E515725
D418922
Table 2. Graph-based cryptography complexity comparison table.
Table 2. Graph-based cryptography complexity comparison table.
LabelingSecurityComputationalEncryptionKey
MethodStrengthComplexityEfficiencyManagement
AntimagicHigh O ( n 3 ) SlowHigh Complexity
Labeling (Vertex-Edge in Large
Weights Graphs
ArithmeticModerate O ( n 2 ) ModerateLimited
Mean (Arithmetic Scalability
Labeling constraints
CordialModerate O ( n 2 ) ModerateSimple,
Labeling (Balance but Not
constraints) Cryptographically
Strong
Prime-Moderate O ( n 3 ) SlowHigh Storage
Based (Multiplicative Requirement
Labeling Inversions)
GraphModerate O ( n 2 ) ModerateKey
Coloring (Graph Distribution
Labeling Traversal) Challenges
EdgeHigh O ( n 3 ) SlowRequires
Magic (Algebraic Complex
Labeling Transformations) Computation
GracefulModerate O ( n 2 ) ModerateEfficient
Labeling (Vertex Edge but Limited
Mapping)
HarmoniousModerate O ( n 2 ) SlowLimited
Labeling (Edge sum Applications
constraints)
RadioHigh O ( n 3 ) ModerateUseful
Mean (Frequency for Wireless
Labeling Constraints) Security
GeometricVery O ( V 3 ) FastScalable and
MeanHigh(Matrix Efficient
Labeling Operations)
IndexExceptionally O ( n ) FastRobust
DifferenceHigh(Vertex Positions, as Cryptographic
Graph well as Vertex and Resilience
(Proposed) Edge Labels, IoT and
are Predetermined) Standard
Cryptography
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Netto Mertia, A.; Sudha, M. Synthesis of Index Difference Graph Structures for Cryptographic Implementation. Symmetry 2025, 17, 1568. https://doi.org/10.3390/sym17091568

AMA Style

Netto Mertia A, Sudha M. Synthesis of Index Difference Graph Structures for Cryptographic Implementation. Symmetry. 2025; 17(9):1568. https://doi.org/10.3390/sym17091568

Chicago/Turabian Style

Netto Mertia, A., and M. Sudha. 2025. "Synthesis of Index Difference Graph Structures for Cryptographic Implementation" Symmetry 17, no. 9: 1568. https://doi.org/10.3390/sym17091568

APA Style

Netto Mertia, A., & Sudha, M. (2025). Synthesis of Index Difference Graph Structures for Cryptographic Implementation. Symmetry, 17(9), 1568. https://doi.org/10.3390/sym17091568

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop