Return to Article Details A new cryptographic method irrespective of code order using graph theory Download Download PDF