Skip to main content
Log in

Introduction to Soft-Cryptosystem and its Application

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The soft set theory offers a wide range of applications in a variety of domains. The soft set is more general and has more capabilities in controlling unpredictable data than other current apparatuses, such as fuzzy set theory. On the other hand, at whatever point we come over the term cryptography, the primary thing and probably the only thing that comes to our intellect could be private communication. This paper’s important reason is to present a new cryptosystem in which both the key and the plaintext are of a soft set environment. We have proposed the definitions of the soft cryptosystem. At that point, we introduced symmetric and asymmetric cryptosystem in a soft set environment. We have created two new theorems. Utilizing this concept, we have arranged two algorithms to encrypt the plaintext and decrypt the ciphertext. Besides, a numerical illustration to solve a banking problem with our proposed cryptosystem has been displayed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

Data Availability

Not applicable.

Code Availability

Not applicable.

References

  1. Sezgin, A., & Atagun, A. O. (2011). On Operations of soft setts. Computers and Mathematics with Applications, 60, 1840–1849. https://doi.org/10.1016/j.camwa.2011.01.018

    Article  Google Scholar 

  2. Aygun, E. (2019). AES Encryption and A Cryptosystem Obtained with Soft Set II. Cumhuriyet Science Journal, 40, 69–78. https://doi.org/10.17776/csj.416395

    Article  Google Scholar 

  3. Molodtsov, D. (1999). Soft set theory-1st result. Computers and Mathematics with Applications, 37, 19–31. https://doi.org/10.1016/S0898-1221(99)00056-5

    Article  MathSciNet  MATH  Google Scholar 

  4. Cagman, N., & Enginoglu, S. (2010). Soft set theory and uni-int decision making. European Journal of Operational Research, 207, 848–855. https://doi.org/10.1016/j.ejor.2010.05.004

    Article  MathSciNet  MATH  Google Scholar 

  5. Gong, K., Xiao, Z., & Zhang, X. (2010). The bijective soft set with its operations. Computers and Mathematics with Applications, 60, 2270–2278. https://doi.org/10.1016/j.camwa.2010.08.017

    Article  MathSciNet  MATH  Google Scholar 

  6. Basu, T. M., Mahapatra, N. K., & Mondal, S. K. (2012). A balanced solution of a fuzzy soft set based decision making problem in medical science. Applied Soft Computing, 12, 3260–3275. https://doi.org/10.1016/j.asoc.2012.05.006

    Article  Google Scholar 

  7. Basu, T. M., & Mondal, S. K. (2015). Neutrosophic soft matrix and its application in solving group decision making problems from medical science. Infinite Study. https://doi.org/10.5281/zenddo.23095

    Article  Google Scholar 

  8. Manna, S., Basu, T. M., & Mondal, S. K. (2019). Generalized trapezoidal intuitionistic fuzzy soft sets in risk analysis. International Journal of Applied and Computational Mathematics, 5, 66. https://doi.org/10.1007/s40819-019-0647-6

    Article  MATH  Google Scholar 

  9. Manna, S., Basu, T., & M., & Mondal, S.K. (2019). A new algorithmic approach to linguistic valued soft multi-criteria group decision making problems using linguistic scale function. Applied Soft Computation. https://doi.org/10.1016/j.0505c.2019.105651

  10. Paik, B., & Mondal, S. K. (2020). A distance-similarity method to solve fuzzy sets and fuzzy soft sets based decision-making problems. Soft Computers, 24, 5217–5229. https://doi.org/10.1007/s00500-019-04273-z

    Article  Google Scholar 

  11. Xu, W., Ma, J., Wang, S., & Hao, G. (2010). Vague soft sets and their properties. Computers and Mathematics with Applications, 59, 787–794. https://doi.org/10.1016/j.camwa.2009.10.015

    Article  MathSciNet  MATH  Google Scholar 

  12. Feng, F., Li, C., Davvaz, B., & Ali, M. I. (2010). Soft sets combined with fuzzy sets and rough sets: a tentative approach. Soft Computing, 14, 899–911. https://doi.org/10.1007/s00500-009-0465-6

    Article  MATH  Google Scholar 

  13. Ali, M. I., Feng, F., Lui, X., Min, W. K., & Shabir, M. (2009). On Some new operations in soft set theory. Computers and mathematics with applications, 57, 1574–1553. https://doi.org/10.1016/j.camwa.2008.11.009

    Article  MathSciNet  Google Scholar 

  14. Stinson, D. (2000). Cyrptography: Theory and Practice (pp. 1–42). New York: CRC Press.

    Google Scholar 

  15. Aygun, E. (2018). Soft Matrix Product and Soft Cryptosystem. Faculty of Sciences and Mathematics, University of Nis, Serbia, 2(19), 6519–6530. https://doi.org/10.2298/FIL1819519A

    Article  MathSciNet  Google Scholar 

  16. Maji, P. K., Bismas, R., & Roy, A. R. (2003). Soft set theory. Computers and Mathematics with Applications, 45, 555–562. https://doi.org/10.1016/S0898-1221(03)00016-6

    Article  MathSciNet  MATH  Google Scholar 

  17. Acar, U., Koyuncu, F., & Tanay, B. (2010). Soft sets and soft rings. Computers and Mathematics with Applications, 59, 3458–3463. https://doi.org/10.1016/j.camwa.2010.03.034

    Article  MathSciNet  MATH  Google Scholar 

  18. Atagun, A. O., & Sezgin, A. (2011). Soft Substructures of rings, fields and modules. Computers and Mathematics with Applications, 61, 529–601. https://doi.org/10.1016/j.camwa.2010.12.005

    Article  MathSciNet  MATH  Google Scholar 

  19. Maji, P. K., Biswas, R., & Roy, A. R. (2001). Fuzzy soft sets. Journal of Fuzzy Mathematics, 9, 589–602.

    MathSciNet  MATH  Google Scholar 

  20. Maji, P. K. (2013). Neutrosophic soft set. Annals of Fuzzy Mathematics and Informatics, 5, 157–168.

    MathSciNet  MATH  Google Scholar 

  21. Maji, P. K., Biswas, R., & Roy, A. R. (2001). Intuitionistic fuzzy soft sets. Journal of Fuzzy Mathematics, 9, 677–692.

    MathSciNet  MATH  Google Scholar 

  22. Yang, X., Lin, T. Y., Yang, J., Li, Y., & Yu, D. (2009). Combination of interval-valued fuzzy set and soft set. Computers and Mathematics with Applications, 58, 521–527. https://doi.org/10.1016/j.camwa.2009.04.019

    Article  MathSciNet  MATH  Google Scholar 

  23. Zadeh, L.A. Fuzzy sets. Information and Control, 8(3), 338-353

  24. Gau, W. L., & Buehrer, D. J. (1993). Vague sets. IEEE Transactions on Systems, Man and Cybernetics, 23(2), 610–614.

    Article  Google Scholar 

  25. Pawlak, Z. (1982). Rough set. International Journal of General Systems, 11(5), 569.

    MATH  Google Scholar 

  26. Chen X. (2013). Rough Soft Sets in Fuzzy Setting. In: Tan Y., Shi Y., Mo H. (eds) Advances in Swarm Intelligence. ICSI 2013. Lecture Notes in Computer Science, vol 7928. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38703-6-62

  27. Feng, F., Liu, X., Fotea, V. L., & Jun, Y. B. (2011). Soft sets and soft rough sets. Information Sciences, 181, 1125–1137.

    Article  MathSciNet  Google Scholar 

  28. Feng, F., Li, C. X., Davvaz, B., & Ali, M. I. (2010). Soft sets combined with fuzzy sets and rough sets: a tentative approach. Soft Computing, 14, 899–911.

    Article  Google Scholar 

  29. Paik, B., & Mondal, S. K. (2021). Representation and application of Fuzzy soft sets in type-2 environment. Complex and Intelligent Systems, 7, 1597–1617. https://doi.org/10.1007/s40747-021-00286-0

    Article  Google Scholar 

  30. Guo, Q., Johansson, T., Mårtensson, E., & Stankovski, P. (2017). Information set decoding with soft information and some cryptographic applications. IEEE International Symposium on Information Theory (ISIT), pp. 1793-1797, https://doi.org/10.1109/ISIT.2017.8006838.

  31. Wang, H., & Song, Y. (2018). Secure Cloud-Based EHR System Using Attribute-Based Cryptosystem and Blockchain. Journal of Medical System, 42, 152. https://doi.org/10.1007/s10916-018-0994-6

    Article  Google Scholar 

  32. Zivic, N. (2011). Soft correction and verification of the messages protected by cryptographic check values. 2011 45th Annual Conference on Information Sciences and Systems,pp. 1-6, https://doi.org/10.1109/CISS.2011.5766106.

  33. Schoinianakis, D. (2020). Residue arithmetic systems in cryptography: a survey on modern security applications. Journal of Cryptography Engineering. https://doi.org/10.1007/s13389-020-00231-w

Download references

Funding

The authors did not receive support from any organization for the submitted work.

Author information

Authors and Affiliations

Authors

Ethics declarations

Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Paik, B., Mondal, S.K. Introduction to Soft-Cryptosystem and its Application. Wireless Pers Commun 125, 1801–1826 (2022). https://doi.org/10.1007/s11277-022-09635-9

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-022-09635-9

Keywords

Navigation