Abstract
The soft set theory offers a wide range of applications in a variety of domains. The soft set is more general and has more capabilities in controlling unpredictable data than other current apparatuses, such as fuzzy set theory. On the other hand, at whatever point we come over the term cryptography, the primary thing and probably the only thing that comes to our intellect could be private communication. This paper’s important reason is to present a new cryptosystem in which both the key and the plaintext are of a soft set environment. We have proposed the definitions of the soft cryptosystem. At that point, we introduced symmetric and asymmetric cryptosystem in a soft set environment. We have created two new theorems. Utilizing this concept, we have arranged two algorithms to encrypt the plaintext and decrypt the ciphertext. Besides, a numerical illustration to solve a banking problem with our proposed cryptosystem has been displayed.
Similar content being viewed by others
Data Availability
Not applicable.
Code Availability
Not applicable.
References
Sezgin, A., & Atagun, A. O. (2011). On Operations of soft setts. Computers and Mathematics with Applications, 60, 1840–1849. https://doi.org/10.1016/j.camwa.2011.01.018
Aygun, E. (2019). AES Encryption and A Cryptosystem Obtained with Soft Set II. Cumhuriyet Science Journal, 40, 69–78. https://doi.org/10.17776/csj.416395
Molodtsov, D. (1999). Soft set theory-1st result. Computers and Mathematics with Applications, 37, 19–31. https://doi.org/10.1016/S0898-1221(99)00056-5
Cagman, N., & Enginoglu, S. (2010). Soft set theory and uni-int decision making. European Journal of Operational Research, 207, 848–855. https://doi.org/10.1016/j.ejor.2010.05.004
Gong, K., Xiao, Z., & Zhang, X. (2010). The bijective soft set with its operations. Computers and Mathematics with Applications, 60, 2270–2278. https://doi.org/10.1016/j.camwa.2010.08.017
Basu, T. M., Mahapatra, N. K., & Mondal, S. K. (2012). A balanced solution of a fuzzy soft set based decision making problem in medical science. Applied Soft Computing, 12, 3260–3275. https://doi.org/10.1016/j.asoc.2012.05.006
Basu, T. M., & Mondal, S. K. (2015). Neutrosophic soft matrix and its application in solving group decision making problems from medical science. Infinite Study. https://doi.org/10.5281/zenddo.23095
Manna, S., Basu, T. M., & Mondal, S. K. (2019). Generalized trapezoidal intuitionistic fuzzy soft sets in risk analysis. International Journal of Applied and Computational Mathematics, 5, 66. https://doi.org/10.1007/s40819-019-0647-6
Manna, S., Basu, T., & M., & Mondal, S.K. (2019). A new algorithmic approach to linguistic valued soft multi-criteria group decision making problems using linguistic scale function. Applied Soft Computation. https://doi.org/10.1016/j.0505c.2019.105651
Paik, B., & Mondal, S. K. (2020). A distance-similarity method to solve fuzzy sets and fuzzy soft sets based decision-making problems. Soft Computers, 24, 5217–5229. https://doi.org/10.1007/s00500-019-04273-z
Xu, W., Ma, J., Wang, S., & Hao, G. (2010). Vague soft sets and their properties. Computers and Mathematics with Applications, 59, 787–794. https://doi.org/10.1016/j.camwa.2009.10.015
Feng, F., Li, C., Davvaz, B., & Ali, M. I. (2010). Soft sets combined with fuzzy sets and rough sets: a tentative approach. Soft Computing, 14, 899–911. https://doi.org/10.1007/s00500-009-0465-6
Ali, M. I., Feng, F., Lui, X., Min, W. K., & Shabir, M. (2009). On Some new operations in soft set theory. Computers and mathematics with applications, 57, 1574–1553. https://doi.org/10.1016/j.camwa.2008.11.009
Stinson, D. (2000). Cyrptography: Theory and Practice (pp. 1–42). New York: CRC Press.
Aygun, E. (2018). Soft Matrix Product and Soft Cryptosystem. Faculty of Sciences and Mathematics, University of Nis, Serbia, 2(19), 6519–6530. https://doi.org/10.2298/FIL1819519A
Maji, P. K., Bismas, R., & Roy, A. R. (2003). Soft set theory. Computers and Mathematics with Applications, 45, 555–562. https://doi.org/10.1016/S0898-1221(03)00016-6
Acar, U., Koyuncu, F., & Tanay, B. (2010). Soft sets and soft rings. Computers and Mathematics with Applications, 59, 3458–3463. https://doi.org/10.1016/j.camwa.2010.03.034
Atagun, A. O., & Sezgin, A. (2011). Soft Substructures of rings, fields and modules. Computers and Mathematics with Applications, 61, 529–601. https://doi.org/10.1016/j.camwa.2010.12.005
Maji, P. K., Biswas, R., & Roy, A. R. (2001). Fuzzy soft sets. Journal of Fuzzy Mathematics, 9, 589–602.
Maji, P. K. (2013). Neutrosophic soft set. Annals of Fuzzy Mathematics and Informatics, 5, 157–168.
Maji, P. K., Biswas, R., & Roy, A. R. (2001). Intuitionistic fuzzy soft sets. Journal of Fuzzy Mathematics, 9, 677–692.
Yang, X., Lin, T. Y., Yang, J., Li, Y., & Yu, D. (2009). Combination of interval-valued fuzzy set and soft set. Computers and Mathematics with Applications, 58, 521–527. https://doi.org/10.1016/j.camwa.2009.04.019
Zadeh, L.A. Fuzzy sets. Information and Control, 8(3), 338-353
Gau, W. L., & Buehrer, D. J. (1993). Vague sets. IEEE Transactions on Systems, Man and Cybernetics, 23(2), 610–614.
Pawlak, Z. (1982). Rough set. International Journal of General Systems, 11(5), 569.
Chen X. (2013). Rough Soft Sets in Fuzzy Setting. In: Tan Y., Shi Y., Mo H. (eds) Advances in Swarm Intelligence. ICSI 2013. Lecture Notes in Computer Science, vol 7928. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38703-6-62
Feng, F., Liu, X., Fotea, V. L., & Jun, Y. B. (2011). Soft sets and soft rough sets. Information Sciences, 181, 1125–1137.
Feng, F., Li, C. X., Davvaz, B., & Ali, M. I. (2010). Soft sets combined with fuzzy sets and rough sets: a tentative approach. Soft Computing, 14, 899–911.
Paik, B., & Mondal, S. K. (2021). Representation and application of Fuzzy soft sets in type-2 environment. Complex and Intelligent Systems, 7, 1597–1617. https://doi.org/10.1007/s40747-021-00286-0
Guo, Q., Johansson, T., Mårtensson, E., & Stankovski, P. (2017). Information set decoding with soft information and some cryptographic applications. IEEE International Symposium on Information Theory (ISIT), pp. 1793-1797, https://doi.org/10.1109/ISIT.2017.8006838.
Wang, H., & Song, Y. (2018). Secure Cloud-Based EHR System Using Attribute-Based Cryptosystem and Blockchain. Journal of Medical System, 42, 152. https://doi.org/10.1007/s10916-018-0994-6
Zivic, N. (2011). Soft correction and verification of the messages protected by cryptographic check values. 2011 45th Annual Conference on Information Sciences and Systems,pp. 1-6, https://doi.org/10.1109/CISS.2011.5766106.
Schoinianakis, D. (2020). Residue arithmetic systems in cryptography: a survey on modern security applications. Journal of Cryptography Engineering. https://doi.org/10.1007/s13389-020-00231-w
Funding
The authors did not receive support from any organization for the submitted work.
Author information
Authors and Affiliations
Ethics declarations
Conflict of interest
The authors have no conflicts of interest to declare that are relevant to the content of this article.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Paik, B., Mondal, S.K. Introduction to Soft-Cryptosystem and its Application. Wireless Pers Commun 125, 1801–1826 (2022). https://doi.org/10.1007/s11277-022-09635-9
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-022-09635-9