TY - JOUR
T1 - Improving data security with the utilization of matrix columnar transposition techniques
AU - Tulus,
AU - Sy, Syafrizal
AU - Sugeng, Kiki A.
AU - Simanjuntak, Rinovia
AU - Marpaung, J. L.
N1 - Publisher Copyright:
© The Authors, published by EDP Sciences.
PY - 2024/3/18
Y1 - 2024/3/18
N2 - The Graph Neural Network (GNN) is an advanced use of graph theory that is used to address complex network problems. The application of Graph Neural Networks allows the development of a network by the modification of weights associated with the vertices or edges of a graph G (V, E). Data encryption is a technique used to improve data security by encoding plain text into complex numerical configurations, hence minimizing the probability of data leaking. This study seeks to explain the potential of improving data security through the application of graph neural networks and transposition techniques for information manipulation. This study involves an algorithm and simulation that discusses the use of the transposition approach in manipulating information. This is accomplished by the implementation of a graph neural network, which develops the interaction between vertices and edges. The main result of this research shows empirical evidence supporting the notion that the length of the secret key and the number of characters utilized in data encryption have a direct impact on the complexity of the encryption process, hence influencing the overall security of the created data.
AB - The Graph Neural Network (GNN) is an advanced use of graph theory that is used to address complex network problems. The application of Graph Neural Networks allows the development of a network by the modification of weights associated with the vertices or edges of a graph G (V, E). Data encryption is a technique used to improve data security by encoding plain text into complex numerical configurations, hence minimizing the probability of data leaking. This study seeks to explain the potential of improving data security through the application of graph neural networks and transposition techniques for information manipulation. This study involves an algorithm and simulation that discusses the use of the transposition approach in manipulating information. This is accomplished by the implementation of a graph neural network, which develops the interaction between vertices and edges. The main result of this research shows empirical evidence supporting the notion that the length of the secret key and the number of characters utilized in data encryption have a direct impact on the complexity of the encryption process, hence influencing the overall security of the created data.
UR - http://www.scopus.com/inward/record.url?scp=85189242893&partnerID=8YFLogxK
U2 - 10.1051/e3sconf/202450102004
DO - 10.1051/e3sconf/202450102004
M3 - Conference article
AN - SCOPUS:85189242893
SN - 2555-0403
VL - 501
JO - E3S Web of Conferences
JF - E3S Web of Conferences
M1 - 02004
T2 - 2023 International Conference on Computer Science Electronics and Information, ICCSEI 2023
Y2 - 12 December 2023 through 13 December 2023
ER -