### Implementation of super H-antimagic total graph on establishing stream cipher

#### Abstract

*a, d*)-

*H*antimagic total graph on generating encryption keys that can be used to establish a stream cipher. Methodology to achieve this goal was undertaken in three steps. First of all the existence of super (

*a, d*)-

*H*-antimagic total labeling was proven. At the second step, the algorithm for utilizing the labeling to construct a key stream was developed, and finally, the mechanism for applying the key to establish a stream cipher was constructed. As the result, according to the security analysis, it can be shown that the developed cryptographic system achieve a good security.

#### Keywords

#### Full Text:

PDF#### References

M. Baca, L. Brankovic, M. Lascsakova, O., Phanalasy, A. Semanicova Fenovcıkova, On d-antimagic labelings of plane graphs, Electr. J. Graph Theory Appli., 1(1), 28-39, (2013)

Dafik, A.K. Purnapraja, R Hidayat, Cycle-Super Antimagicness of Connected and Disconnected Tensor Product of Graphs, Procedia Computer Science, 74, (2015), 9399

Dafik, Slamin, D. Tanna, A. Semaniˇcov´a-Fenovcıkova, M. Baˇca, Constructions of H-antimagic graphs using smaller edge-antimagic graphs, Ars Combinatoria, 100 (2017), In Press

Dafik, M. Hasan, Y.N. Azizah, I. H. Agustin, A Generalized Shackle of Any Graph H Admits a Super H-Antimagic Total Labeling, Mathematics in Computer Science Journal, (2016). Submitted

N. Inayah, R. Simanjuntak, A. N. M. Salman, Super (a, d)−H-antimagic total labelings for shackles of a connected graph H, The Australasian Journal of Combinatorics, 57 (2013), 127138.

A.C. Prihandoko, H. Ghodosi, and B. Litow, Obfuscation and WBC: Endeavour for Securing Encryption in the DRM Context, Proceedings of the International Conference on Computer Science

and Information Technology, CSIT (2013), 150-155, ISBN 978-979-3812-20-5 2.

A.C. Prihandoko, H. Ghodosi, and B. Litow, Secure and Private Content Distribution in the DRM Environment, Proceedings of the Information System International Conference, ISICO (2013), 659-

, ISBN 978-979-18985-7-7. Available online at Open Access Journal of Information Systems.

A.C. Prihandoko, H. Ghodosi, and B. Litow, Deterring Traitor Using Double Encryption Scheme, Proceedings of the IEEE International Conference on Communication, Network and Satellite, COMNETSAT

(2013), 100-104, ISBN 978-1-4673-6054-8. Available online at IEEE Xplore Digital Library.

A.C. Prihandoko, Dafik, I.H. Agustin, D. Susanto, A.I. Kristiana, Slamin, The Construction of Encryption Key by Using a Super H-antimagic Total Graph, Program and Abstract the Asian Mathematical Conference, AMC (2016), 408, ISBN 978-602-74668-0-7.

DOI: http://dx.doi.org/10.19184/ijc.2019.3.1.2

### Refbacks

- There are currently no refbacks.

**ISSN: 2541-2205**

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.