×

RSA cryptosystem with fuzzy set theory for encryption and decryption. (English) Zbl 1469.94084

Ibrahim, Haslinda (ed.) et al., Proceedings of the 13th IMT-GT international conference on mathematics, statistics and their applications, ICMSA2017, Kedah, Malaysia, December 4–7, 2017. Melville, NY: American Institute of Physics (AIP). AIP Conf. Proc. 1905, Article 030001, 6 p. (2017).
Summary: In the communication area, user is more focus on communication instead of security of the data communication. Many cryptosystems have been improvised to achieved the effectiveness in communication. RSA cryptosystem is one of well-known cryptosystem used to secure the information and protect the communication by providing a difficulty to the attackers specifically in encryption and decryption. As need arises for guarantee the security of the cryptosystem while the communication must be ensured, we propose a new RSA cryptosystem which is based on fuzzy set theory whereby the plaintext and the ciphertext are in terms of Triangular Fuzzy Number (TFN). Decryption result shows that the message obtained is the same as the original plaintext. This study reveals that the fuzzy set theory is suitable to be used as an alternative tool in securing other cryptosystem.
For the entire collection see [Zbl 1437.00040].

MSC:

94A60 Cryptography
03E72 Theory of fuzzy sets, etc.
PDFBibTeX XMLCite
Full Text: DOI

References:

[1] Durfee, G. (2002), Stanford University
[2] Rivest, R. L.; Shamir, A.; Adleman, L., Communications of the ACM, 21, 2, 120-126 (1978) · Zbl 0368.94005 · doi:10.1145/359340.359342
[3] Boneh, D., Notices of the American Mathematical Society (AMS), 46, 2, 203-213 (1999) · Zbl 0914.94007
[4] Sun, H. M.; Yang, W. C.; Laih, C. S.; Lam, K. Y.; Okamoto, E.; Xing, C., Adv. In Cryptology ’99, On the design of RSA with short secret exponent, 150-164 (1999), Singapore · Zbl 0977.94043
[5] Hwang, R. J.; Su, F. F.; Yeh, Y. S.; Chen, C. Y., Adv Infor Netw and Applications, An efficient decryption method for RSA cryptosystem, 585-590 (2005), Taiwan
[6] Rivai, M.; Fischlin, M., Topics in Cryptology - CT RSA 2009, Securing RSA against fault analysis by double addition chain exponentiation, 459-480 (2009), San Francisco · Zbl 1237.94091
[7] Sharma, S.; Sharma, P.; Dhakar, R. S., Computer and Comm Technlogy, RSA algorithm using modified subset sum cryptosystem, 457-461 (2011), India
[8] Dhakar, R. S.; Gupta, A. K.; Sharma, P., Modified RSA Encryption Algorithm (MREA, 426-429 (2012), US
[9] Mathur, S.; Gupta, D.; Goar, V.; Kuri, M., Comp. Intelligence & Comm. Tech, Analysis and design of enhanced RSA algorithm to improve the security (2017), CICT: CICT, India
[10] Thangavel, M.; Varalashmi, P.; Murrali, M.; Nithya, K., Jour. Of Info. Security and Application, 20, 3-10 (2015) · doi:10.1016/j.jisa.2014.10.004
[11] Kumar, N.; Chaudhary, P., Implementation of Modified RSA Cryptosystem for Data Encryption and Decryption based on n Prime number and Bit Stuffing, 05 (2016), ICTCS: ICTCS, India
[12] Sahai, A.; Waters, B.; Cramer, R., Adv. In Cryptology - EUROCRYPT 2005, Fuzzy identity-based encryption, 457-473 (2005), Amsterdam · Zbl 1137.94355
[13] Dhenakaran, S.; Kavinilavu, N., Inter. Jour. of Eng. Trends and Technology, 3, 320-326 (2012)
[14] Madanayake, R.; Peiris, N.; Ranaweera, G.; Jayathilake, U., Advanced encryption algorithm using fuzzy logic, 27 (2012), IPCSIT: IPCSIT, Singapore
[15] Zadeh, L. A., Infor. and Control, 8, 3, 338-353 (1965) · Zbl 0139.24606 · doi:10.1016/S0019-9958(65)90241-X
[16] Rao, V. S.; Rao, V. S., Ind. Jour. Of Sc. And Technology, 9, 44 (2016)
[17] GaneshKumar, K.; Arivazhagan, D., Ind. Jour. of Sc. And Technology, 9, 48 (2016)
[18] Sultan, N. H.; Barbhuiya, F. A.; Sarma, N., PairVoting: A secure online voting scheme using Pairing-Based Cryptography and Fuzzy Extractor (2016), India
[19] Mudia, H. M.; Chavan, P. V., Procedia Comp. Science, 78, 632-639 (2016) · doi:10.1016/j.procs.2016.02.110
[20] Sadkhan, S. B.; Abdulraheem, F. H., A proposed ANFIS evaluator for RSA cryptosystem used in cloud networking (2017), ICCIT: ICCIT, Iraq, Apr
[21] Nitaj, A., A new attack on RSA and CRT-RSA, 221-233 (2012), Morocco · Zbl 1304.94077
[22] Klir, G. J.; Clair, U. S.; Yuan, B., Fuzzy Set Theory: Foundations and Applications (1997), Upper Saddle River · Zbl 0907.04002
[23] Trappe, W.; Lawrence, C. W., Introduction to Cryptography with Coding Theory (2005), Prentice-Hall: Prentice-Hall, USA
[24] Shyamal, A. K.; Pal, M., Iranian Jour. of Fuzzy Systems, 4, 1, 75-78 (2007)
[25] Dubois, D.; Prade, H., Fuzzy sets and systems: Theory and Applications (1980), Academic Press Inc.: Academic Press Inc., London · Zbl 0444.94049
[26] Gani, A. N.; Assarudeen, S. N. M., Appl. Math. Sciences, 6, 11, 525-532A (2012)
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.