A Study of Graph Theory Applications in IT Security

  • Turkan Ahmed Khaleel Department of Computer Engineering, Engineering College, University of Mosul, Mosul, Iraq
  • Ayhan Ahmed Al-Shumam Department of Computer Engineering Technology, Engineering Technology College, Northern Technology University, Mosul, Iraq
Keywords: Graph Theory, Information Technology Security, Network Security, Cryptography

Abstract

The recent developments in information technology have made major changes in all fields. The transfer of information through networks has become irreplaceable due to its advantages in facilitating the requirements of modern life through developing methods of storing and distributing information. This in turn has led to an increase in information problems and risks that threaten the security of the institution’s information and can be used in distributed systems environment.

This study focused on two parts; the first is to review the most important applications of the graph theory in the field of network security, and the second is focused on the possibility of using the Euler graph as a Method Object that is employed in Remote Method Invocation (RMI) technique. This algorithm was compared with the most popular algorithms, such as RSA and 3DES. The results were acceptable and need to be improved in the future.

Published
2020-10-28
How to Cite
Khaleel, T. A., & Al-Shumam, A. A. (2020). A Study of Graph Theory Applications in IT Security. Iraqi Journal of Science, 61(10), 2705-2714. https://doi.org/10.24996/ijs.2020.61.10.28
Section
Computer Science