A Study of Graph Theory Applications in IT Security

Authors

  • Turkan Ahmed Khaleel Department of Computer Engineering, Engineering College, University of Mosul, Mosul, Iraq
  • Ayhan Ahmed Al-Shumam Department of Computer Engineering Technology, Engineering Technology College, Northern Technology University, Mosul, Iraq

DOI:

https://doi.org/10.24996/ijs.2020.61.10.28

Keywords:

Graph Theory, Information Technology Security, Network Security, Cryptography

Abstract

The recent developments in information technology have made major changes in all fields. The transfer of information through networks has become irreplaceable due to its advantages in facilitating the requirements of modern life through developing methods of storing and distributing information. This in turn has led to an increase in information problems and risks that threaten the security of the institution’s information and can be used in distributed systems environment.

This study focused on two parts; the first is to review the most important applications of the graph theory in the field of network security, and the second is focused on the possibility of using the Euler graph as a Method Object that is employed in Remote Method Invocation (RMI) technique. This algorithm was compared with the most popular algorithms, such as RSA and 3DES. The results were acceptable and need to be improved in the future.

Downloads

Download data is not yet available.

Downloads

Published

2020-10-28

Issue

Section

Computer Science

How to Cite

A Study of Graph Theory Applications in IT Security. (2020). Iraqi Journal of Science, 61(10), 2705-2714. https://doi.org/10.24996/ijs.2020.61.10.28

Similar Articles

1-10 of 1302

You may also start an advanced similarity search for this article.