Figures
Abstract
The field of cryptography has grown significantly with the advent of information and communication technologies due to the increasing complexity of cyber threats and rising security requirements. This evolution has come with the creation of new cryptosystems and improvements to current ones. This study is the first to explore the RSA approach in the framework of t-intuitionistic fuzzy subgroups. This technique makes group-based cryptographic operations safer when there are unclear relationships and hesitations. This supports the complex and uncertain nature of subgroup membership, allowing for much more significant representations of the degrees of belonging, non-belonging, and hesitancy for the group elements along parameter ’t’. The t-intuitionistic fuzzy RSA technique employs a t-intuitionistic fuzzy subgroup to address cryptosystem ambiguity, fuzziness, and imprecision. Consequently, inaccurate cryptographic data is more effectively represented, manipulated, and protected. Furthermore, this technique enhances the current level of fuzzy cryptography. The t-intuitionistic fuzzy RSA algorithms are of theoretical and practical value, as they significantly contribute towards developing fuzzy cryptography, fuzzy algebraic structures, and decision support systems. In this paper, the notions of t-intuitionistic fuzzy numbers and triangular t-intuitionistic fuzzy numbers are introduced. A new RSA cryptosystem based on a t-intuitionistic fuzzy subgroup is proposed in which the plaintext and the ciphertext are obtained in terms of t-intuitionistic fuzzy numbers and triangular t-intuitionistic fuzzy numbers. In addition, the significance of the concept of the t-intuitionistic fuzzy subgroup is highlighted as a suitable alternative tool to secure the data under consideration. In addition, the practical effect of the proposed methods is also investigated in this study. A mathematical mechanism is presented to implement the t-intuitionistic fuzzy RSA algorithm. Finally, a comparative analysis of the developed technique is presented with some existing methods to showcase the applicability and superiority of the recently developed method.
Citation: Alolaiyan H, Latif L, Shuaib U, Razaq A, Xin Q (2024) A novel development to encrypt data communication under t-intuitionistic fuzzy environment. PLoS ONE 19(9): e0308140. https://doi.org/10.1371/journal.pone.0308140
Editor: Raman Singh, University of the West of Scotland, UNITED KINGDOM OF GREAT BRITAIN AND NORTHERN IRELAND
Received: April 6, 2024; Accepted: July 17, 2024; Published: September 27, 2024
Copyright: © 2024 Alolaiyan et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Data Availability: All relevant data are within the paper.
Funding: This project is supported by the Researchers Supporting Project Number (RSP2024R317) King Saud University, Riyadh, Saudi Arabia.
Competing interests: The authors have declared that no competing interests exist.
1. Introduction
1.1. Background
Today’s digital world requires cryptography to protect data. It protects communication channels, prevents unauthorized access to critical data, and verifies user identities and transactions [1–3]. The study of cryptography allows senders and recipients to communicate secure and secret messages. The data is encrypted with a private key and coded before being sent to the sender for decryption. This terminology needs data security and policies to prevent unauthorized access to and reading private correspondence. Data confidentiality, integrity, user authentication, and non-repudiation need cryptography. This technology is essential for financial transactions and data security [4,5]. Public key encryption secures account numbers, transaction volumes, digital signatures, and credit card authorizations in electronic transactions. The technology secures websites and electronic communications. For a website to be secure, it must exchange and save every piece of data transmitted between computers in encrypted form, and our electronic transactions are provably trustworthy. The advent of digital communications makes digitally signed and digitally notarized communications possible, thus drastically enhancing the dependability of our electronic transactions in proving the origin and authenticating the integrity of our digital communications. Cryptography is needed to protect privacy and data integrity. For authentication and non-reliability of digital transactions, it is necessary to establish the trust upon which our digitally interconnected and digitally interdependent world depends in an age where digital communications and networked connectivity are everywhere [6,7]. Numerous researchers have devised novel approaches regarding this terminology. A framework for an artificial neural network to generate unique ciphers was presented by Blackledge et al. [8]. Their study demonstrated that neural networks are practical cryptographic tools that can be used to develop personalized ciphers that satisfy the necessary security requirements. In addition, Chakraborty et al. [9] developed a comprehensive portrayal of the principles and applications associated with network security. The RSA algorithm is a widely used asymmetric cryptographic technique introduced by its creators, Rivest, Shamir, and Adleman [10]. Cryptosystems based on the RSA algorithm are used for secure connections and digital signatures. The RSA algorithm is still the most robust encryption method widely used online. This algorithm is based on the mathematical properties of large prime numbers. Due to the number of distinct systems that attach to the RSA system to maintain its structure and preserve the confidentiality and integrity of digital data, many practical applications and modifications of its basic algorithms have been proposed recently. Therefore, it has become one of the most essential parts of cryptography because of its innovative approach to establishing secure communication using public-key mechanisms. The algorithm encrypts data transmission across an untrusted network when used with a shared secret key without requiring a secret key first to be shared. By enabling a secure, shared key exchange, the system overcomes security issues by trying to distribute keys and provides for authentication and digital signatures. This algorithm also formed the hybrid cryptosystem, allowing the security industry to benefit from giving hundreds of thousands of users secure data transmission, integrity verification of transmitted messages, digital signature generation and verification systems, and the exchange of shared keys to achieve privacy for communication and authentication. The RSA encryption method is secure due to the use of prime numbers. The RSA algorithm allows two parties to exchange messages privately. It is based on factors in large numbers and among secure encryption methods generally used in secure email, digital signatures, and online banking. Over the years, mathematicians have developed many additional methods to improve the basic RSA algorithm. Chavan et al. [11] discussed a method for data security authentication in a network using a combination of symmetric and asymmetric algorithms. Blackledge and Mosola [12] provided a brief explanation of artificial intelligence, which is used for the encoding and cryptanalysis of encrypted data to evaluate the robustness of a cryptographic technique. Mathematicians have created RSA or hybrid cryptosystems in the past, using a variety of methods to secure and implement the system, including the use of short secret key exponents [13], the application of the Chinese Remainder Theorem (CRT) during the decryption process [14], the inclusion of homomorphism properties [15], the use of four large primes [16], the use of double additive string rates [17], and the implementation of n primes and bit padding [18]. Cryptosystems in the fuzzy framework are designed for uncertainty and imprecision, which naturally exist in real-life data. Under this condition, typical cryptographic methods fall short, based on "either/or" or "how much" information, which readily degrades to an impractical form. Fuzzy logic allows cryptosystems the flexibility to represent uncertainty and adapt suitably a cryptosystem to the differing levels of ambiguity and model better human perception. Uncertain contexts have been added to address the lack of clarity around cryptosystem approaches in the academic literature. While the literature discusses various techniques for uncertain data, each approach has strengths and weaknesses.
1.2. Literature review
Practical situations often raise challenges that cannot be easily addressed with binary logic. Consider today’s automated vehicle speed control systems; accurately differentiating between ‘slow,’ ‘moderate,’ and ‘fast’ velocities can be arduous. To solve this kind of issue, Zadeh [19] introduced the concept of fuzzy sets () arising from the complexity and uncertainties inherent in real-world scenarios. This inadequacy of binary sets in such circumstances has made clear the significance of
.
allows the representation of the membership grades for elements that do not necessarily belong to the set, a beneficial capability for managing ambiguity and irregularity in scenarios such as those described. The
has become a widely applied framework for representing the cumbersome variables of traditional crisp binary structures in fields like artificial intelligence and control systems. Computational cognition was thus generated from interpretative information, and computational perception was assumed to have intrinsic ambiguity, inherent imprecision, non-exactly bounded, and partially inaccurate information. It has been implemented in various disciplines as a general framework for describing variables to deal with variables difficult to categorize using traditional binary sets. This is the base of information available in computational cognition and perception. In this knowledge-based system, a system with a fully equipped suite of sensors can make its way deftly through confusing differentiation and regulate its speed as a function of lane information, spacing and density, and road surface fairness. This knowledge can [20–22] be used advantageously in many diverse disciplines, such as industrial automation, image processing, control system engineering, decision-making, robotics, power engineering, optimization, and consumer electronics. When uncertainty or ambiguity pertains to quantitative values instead of qualitative distinctions in isolation, fuzzy numbers (
) become an essential requirement.
incorporates quantities in the form of numbers into the concept of
, which is primarily concerned with degrees of membership. FNs were initially developed by Zadeh [23,24]. As a consequence, a more accurate representation is achieved across multiple domains.
, for instance, enables a more complex quantification in the domain of financial risk assessment, where the degree of risk cannot be simplistically categorized as low or high.
is highly advantageous in temperature control systems that utilize precise temperature ranges to distinguish between "warm" and "hot" temperatures.
are significant in
theory as they provide a generalized platform for expressing imprecise, incomplete, and inconsistent information. Fuzzy logic is rendered more practical and precise by incorporating
when quantitative imprecision is crucial for analysis and decision-making. In 2022, Betta [25] proposed a customer requirements management model using
. It provides the best management strategies resulting from carefully interpreting fuzzy parameter estimates. In applications, the most commonly used
are the triangular and trapezoidal shapes, defined by Buckley and Eslami in [26]. Fuzzy triangular, trapezoidal, and their generalized form are a few common notions by which the linguistic variables are quantified. Mukherjee et al. [27] conducted a comprehensive examination of the arithmetic operations of FNs using the alpha-cut method in a novel approach and provided their interpretation of the results. Kahraman [28] discussed the application of
theory in industrial engineering, highlighting new tools and ideas developed by researchers to address problems specific to industrial engineering. However, the
theory, characterized by only one function, the "membership function," in most cases cannot be used fully to express some complex fuzzy information. For example, during voting, if ten people are voting for an issue, three of them give the ‘agree,’ four of them give the ‘disagree,’ and the others abstain.
cannot fully express the polling information. To solve this problem, Atanassov [29] developed the concept of intuitionistic fuzzy sets (
), a generalization of
. The theory of
differs from
in that they include a membership degree, non-membership degree, hesitancy degree, or intuitionistic index. These aspects align with humans who express decisions using negation, affirmation, or hesitation. Compared to uncertainty theories that primarily focus on quantitative problem-solving, the utilization of
offers distinct advantages. This approach presents a flexible framework that effectively handles decision-making processes’ inherent ambiguity and uncertainty. The
theory is handy in various fields, such as decision-making problems [30–36], logic programming [37,38], medical diagnosis [39–43], and career determination [44–47]. Kozae1 et al. [48] reviewed the definitions of
and suggested its implementation in COVID-19. Citil [49] proposed the application of an
in determining high school using distance measures. Jars et al. [50] reviewed the
concept and presented a useful selection method in various disciplines. Aggarwal et al. [51] studied the significance of this idea in making housing purchase decisions in society. In addition, Ejegwa et al. [52] gave a comprehensive note on some selected models of
in real-life situations, such as pattern recognition, carrier determination, and diagnostic medicine. Gu and Zhang [53] proposed a new method for project risk assessment based on this knowledge. The multi-attribute decision problem in an intuitionistic fuzzy environment was discussed by Junhang et al. [54]. A text classification framework based on
similarity measures was presented by Intrarapaibon [55]. The need for intuitionistic fuzzy numbers (
) instead of the traditional
arises from the requirement for a deeper and richer explanation of the uncertainties enveloping a particular situation. Unlike
, which represent merely membership degrees,
also account for non-membership degrees and degrees of hesitancy, which makes them invaluable in circumstances closer to reality, where uncertainties are multiple and have several dimensions. For example, in the estimation of the completion time of a project, an
may mean a relatively good chance of finishing in time according to some expert estimation, be well aware of a few possible delays but still exhibit a level of hesitancy concerning the estimation. This richer representation helps us understand the chance of some event, the likely deviations, and our confidence in it. Hence, it makes
more appropriate for complex decision-making contexts where uncertainties are all-pervasive, multi-dimensional, and multi-faceted. Triangular
is a more generalized platform for expressing imprecise, incomplete, and inconsistent information when solving multi-criteria decision-making (MCDM) problems and for expressing and reflecting the evaluation information in several dimensions. Seikh et al. [56] defined the notions of
and triangular
. They also presented the decision-making problem based on these concepts. In modelling the decision-making problem with imprecise quantity, one approach is to deal with such imprecise quantity as the
. Thus, the intuitionistic fuzzy optimization problem involves the comparison of
. The comparison of these imprecise numbers needs to develop the ranking methods for
. The ranking of
plays an important role in comparing
decision-making problems. Bharati [57] defined a new ranking function, particularly for triangular
, and has verified its axioms. Aikhuele and Odofin [58] proposed a methodology for addressing MCDM problems in which triangular
represent the performance ratings. Researchers have provided several methods for ranking
and triangular
in an uncertain environment for solving MCDM problems [59–62]. The authors have also compared their approach with some existing methods to demonstrate its suitability in the face of uncertainty. There are many situations when conventional
might not accurately reflect the complexities under consideration. For example, suppose we are interested in approximating the time required to complete a given project. An
may indicate a relatively heightened likelihood of finishing the job on time, but with an understanding that certain obstacles could pop up unexpectedly or that some degree of uncertainty or resistance is present in the estimate.
might not accurately represent this emphasis. When the dichotomy is the completion of a project six or seven days from now, for example, where timeliness is obviously of the essence, these are the sorts of concerns a decision-maker should consider. To address concerns of this sort, we introduce the notion of t-intuitionistic fuzzy number (
) in this paper. By accounting for the parameters’ t,’ decision-makers can adjust the interrelationships between membership, non-membership, and hesitancy to reflect the particular requirements of the domain or venture under consideration. As such, the modelling approach is more accurate and adaptable for use in intricate decision-making situations in which specific operational or contextual details influence the interconnections among these three components. In certain situations,
may not be capable of managing intricate decision-making processes. For example, consider the selection committee tasked with appointing a faculty member for a university. Some committee members may declare that an applicant is suitable for the position if their research work is at least 90% superior to the other applicants. However, other committee members may approve applicants for the position if they perform at least 80% better than their peers during the interview. To handle these situations, Sharma [63] introduced the theory of the t-intuitionistic fuzzy sets (
). The theory of the
acts as a pivotal approach to handling the imprecision in the data by adding a parameterizing factor during the process, as compared to the theory of
. By incorporating satisfaction levels (acceptance), rejection, abstention, and priorities (parameter "t") linked to objectives, this methodology simplifies the decision-making process, improves the coherence of reasoning, and reduces subjectivity. The adjustability of the parameter t’ provides flexibility that enables decision-makers to emphasize particular aspects of uncertainty to a greater or lesser degree depending on the demands of a particular situation. The
inherent flexibility makes them an indispensable tool for handling complex relationships and varying degrees of uncertainty. The
are a more explicit and context-dependent representation than conventional
. The framework is beneficial because it relates to decision-making involving vagueness and uncertainty. An extensive study of the t-intuitionistic fuzzy subgroup (
) may be found in [64,65].
1.3. Research gap
Traditional encryption approaches may struggle when dealing with imprecise, confusing, or ambiguous data. The goal of classical cryptography is to convert data into an accurate, binary distinction that may not match real-world data with variable degrees of uncertainty. Many academics have created fuzzy formulations to solve these algorithms. Mandanyake et al. [66] created a fuzzy logic-based encryption technique that may be low-processing or high-security, depending on user needs. Abdullah et al. [67] designed the RSA cryptosystem for . Many mathematicians have developed fuzzy cryptosystem data security techniques. These techniques were explored in [68–70]. However, Shor’s quantum computing assaults, which process massive targets, may restrict the RSA method, which secures communications. Power consumption or cryptographic timing might be used to conduct RSA side-channel attacks. As these key numbers expand, computing efficiency and resource allocation may alter, exposing scaling concerns. However, RSA’s fuzzy foundation makes it more resilient to unforeseen events. We may increase computational complexity and needs and reduce effectiveness by introducing limits detected in this process. Thus,
may need more computing complexity and less efficacy with higher fuzziness to complete a full quantitative evaluation. In the fuzzy RSA framework, we deal only with membership degrees. The fuzzy framework in RSA may not accurately represent complex information, presenting new challenges for theoretical research and practical demonstration. The flexible RSA methodology of ambiguous intuitionistic logic better conveys uncertainty by incorporating non-membership degrees. Due to the subjective nature of
, formal analysis and proof are incredibly hard. The exact impact of non-membership degrees on security and performance is currently unknown. The incorporation of an additional parameter has the potential to introduce complexity and slow computations. The RSA methodology is vulnerable to compromise by side-channel attacks and quantum computation. The RSA fuzzy framework’s computational complexity limits its ability to improve resilience. Furthermore, non-membership degrees complicate verifying and validating the RSA intuitionistic fuzzy framework. The safety and efficacy of the approach are currently outside the bounds of scientific knowledge. This assertion must be carefully considered:
safeguards sensitive data using numerical values of 0.8, 0.15, and 0.05, representing minimal risk, practically total security, and less accurate reservations. Policymakers may modify algorithms to meet security standards or pose a risk environment. The feature might help address some of the security uncertainties and weaknesses. To cope with all these issues, we invented the t-intuitionistic fuzzy RSA (
) method to deal with them. The main objective for developing
is to resolve the constraints of intuitionistic fuzzy frameworks, conventional fuzzy frameworks, and classical RSA algorithms. The adaptability and effectiveness of this novel
algorithm are its two principal characteristics. By adjusting the "t" parameter of the t-norm and t-conorm operators, security could be guaranteed. It is of the utmost importance to contemplate the benefits of deception in situations where the outcome of the parameter ‘t’ is heavily dependent on the accuracy of the message. While it may not provide exhaustive safeguards against every conceivable danger, it can potentially assist law enforcement agencies in their endeavors to identify and apprehend individuals who eavesdrop. Security measures intended to protect fewer sensitive data often serve as sites of vulnerability for the system. In light of these modifications, scholars have examined many potential strategies for fortifying the default RSA configuration. The result could be more readily understandable for the majority of users. In this case, the "t" parameter has an enormous benefit: it permits multiple security-level configurations and modifications to those configurations. By adjusting the parameter "t," individuals can fine-tune the time spent on their feet in cryptographic terminology during interrogations concerning cryptographic ambiguity. The authors state that this enables a comprehensive range of t-norm and t-conorm operators to model imperfections and provide considerable flexibility in contexts where a monolithic approach is unsuitable, such as managing uncertainty. The use of
has greatly enhanced the work. It is necessary to evaluate how well the algorithm will perform and how it will detect errors at different levels of uncertainty. This is done by making use of the t-norm and t-conorm operators. Data safeguarding is complex; however,
has an advantage over other systems. In the traditional RSA algorithms, the security levels are constant, whereas with
, this is not so, and it is also fully customizable. Cryptographic professionals can change the algorithms to match their security needs and risk composition, a potent property, as is the fact that the innovative, versatile manner is initiated by the parameter "t" and recapitulates wider solutions of
to augment precision. The introduction of
is feasible either as an alternative cryptographic system or through any approach that evaluates aspects of a system if it employs RSA algorithms. The significance of the RSA algorithm has motivated us to integrate the
theory into the algorithm of the original RSA cryptosystem. The
algorithm can be utilized in web browsers, email, virtual private networks (VPN), chat, and other communication channels. Furthermore, this newly defined algorithm can establish a secure connection between VPN clients and the VPN server. This new approach can exchange keys and establish a secure channel under protocols such as open VPN and transport layer security (TLS) handshakes. The main objective of this research is to improve the security level of data transmission with a new encryption technique based on public and private keys created by the
algorithm.
1.4. Novelty of the current study
The novelty of the current study is explained in the subsequent discussion:
- The
enhances the traditional
by including the parameter "t," which enables a more accurate representation of uncertainty. This work offers the possibility of a richer action of levels of uncertainty, imprecision, and vagueness, providing decision-makers with the flexibility of a conceptual and computational tool for representing and managing complex degrees of partial ignorance. Enhanced capabilities for decision-makers to communicate their subtle judgments will, in turn, lead to the formulation of more informed and vigorous decisions.
- The newly developed triangular
implementation that leverages the flexibility of the t-intuitionistic fuzzy setting and the rich characteristics of triangular
provides an alternative method to offer decision-makers working under vagueness, imprecision, uncertainty, and partial truth a more pragmatic and efficient tool to allow a compelling presentation of uncertainties, thus economizing computational resources, increasing the facility with which complex judgments can be communicated, and, ultimately, allowing much more informed and robust decisions to be made. The new convergence measures can be utilized to drastically enhance optimization capabilities in many applications, including but not limited to machine learning, engineering design, quality control, decision-making, and cryptography.
- The technique of
based on
is designed to overcome the uncertainty of sub-groups, enhancing the cryptographic security. By combining the flexibility and adaptability with the security of
is altered, which is known as parameter "t." This parameter diminishes the subgroup uncertainty, resulting in a dynamic and adaptable cryptographic solution. The unique
technique of
is employed to manage the ambiguity of subgroups. The variation in security levels is achieved using the subgroup properties concerning the included parameter ‘t’. This innovative modification significantly improves cryptosystem performance. It allows the subgroups to enhance and adapt to security while they become tenuous and complex.
1.5. Motivations and contributions of the current research
The subsequent discussion comprehensively explains the motivations and contributions that enhance the current study.
- The inception of the concepts of
and triangular
. The strength of these notions is that they can encapsulate ambiguity, uncertainty, and imprecision in thought and decision-making. They provide an organized and transparent framework to model complex real-world scenarios that surpass the capabilities of traditional modeling tools. The concepts will benefit engineering design, quality control, decision-making, finance, risk assessment, and cryptography. The intrinsic
supports uncertainty modeling for exploiting uncertainty in complex real-world applications, integrating expert knowledge, and managing ambiguous data. Increasing the complexity associated with these notions of encryption and decryption makes it difficult for potential attackers to estimate or manipulate signals. Compared with conventional statistics, these notions emulate natural unpredictability and uncertainty from different sources and their usual accurate interpolation. A
with these properties may not allow an attacker or an eavesdropper to sense and monitor trends and could be robust in identifying the vulnerability of the communications.
- Development of the
algorithm in the framework of
. In software applications where the data is ambiguous or uncertain, integration of the RSA algorithm with the
architecture will enhance security and privacy in the system. So, it is necessary to implement
in secure communication, access control, and data protection. In the case of emerging intelligent contracts and blockchain applications, where smart contracts execute and sensitive data is encrypted, integrating both technologies in the applications using
is a requirement, as is the case with RSA encryption. The
method introduced in this paper is vital among subgroups, providing an adaptable and configurable cryptosystem solution. The introduction of parameter "t" in the
paradigm framework equips it with more adaptability against unclarity; hence, adaptive changes can be made upon subgroup descriptions. This technology seems to be a significant segue to cryptosystem solutions in cryptographic contexts with ambiguous subgroups and for enhanced security protocols.
- For cryptographic purposes, the
algorithm is implemented in C++. Implementing the
algorithm in C++ yields an individualized and flexible cryptographic solution. Its significance is that it becomes possible to selectively manipulate the utilized parameters, particularly the "t" parameter, in the face of various uncertainties. This implementation provides an adaptable security strategy that permits the solution to be applicable in a wide range of cryptographic contexts by simply enhancing resilience. C++ allows a security protocol to be implemented efficiently with robust execution. It enables a resilient security protocol to be seamlessly integrated. As a result, the
algorithm is an effective safeguard mechanism for sensitive data across a diverse range of application areas.
1.6. Structure of the paper
The structure of the paper is organized as follows: The second section contains basic definitions that are essential for understanding the main results of this article. In Section 3, we define the notions of the and the triangular
. In Section 4, we propose a
algorithm and present an example of this proposed algorithm. In Section 5, we implement the
algorithm computationally. Moreover, we establish a comparative analysis of newly proposed and existing algorithms in Section 6. This section also contains the limitations of the proposed algorithm. Finally, the conclusion and future work is described in Section 7.
2. Preliminaries
This section contains a brief review of some basic notions, which play a fundamental role in understanding the novelty of this article.
Definition 1 [29]. An intuitionistic fuzzy set () A of a universe
is a triplet of the form:
where μA and νA are the membership and non-membership functions defined from the universe
to [0, 1], respectively, that satisfy the condition: 0 ≤ μA (a1) + νA (a1) ≤ 1.
Definition 2 [29]. The (α, β)–cut set of an A is defined as follows:
where α, β ∈ [0, 1] and 0 ≤ α + β ≤ 1.
Definition 3 [31]. An A is an intuitionistic fuzzy number (
) of the set of real numbers
, that satisfies the following properties:
- A is an intuitionistic fuzzy normal set, i.e., μA (a1) = 1 and
- Each (α, β)–cut set is a closed interval for every α, β ∈ (0,1].
- The set
is bounded.
Definition 4 [31,56]. A LR-type A is characterized by its membership and non-membership functions, which can be defined in the following way:
and
Note that L(1) = R(1) = 0 and L(0) = R(0) = 1. The A is represented as follows:
.
Definition 5 [31,56]. A triangular that possesses membership and non-membership functions meets the condition of 0 ≤ μA (z1) + νA (z1) ≤ 1. These functions can be presented in the following manner:
and
where
. Moreover, m1 denotes the mean value of A. The triangular
is symbolized as follows:
Definition 6 [56]. Let A be a triangular . The (α, β)–cut interval of A is defined as:
where α, β ∈ [0,1] and 0 ≤ α + β ≤ 1.
Definition 7 [63]. For any A of a universe
and 0 ≤ t ≤ 1, we say that At is t-intuitionistic fuzzy set (
) of
with respect to A and is defined as:
In this case, the hesitancy margin is denoted by .
Definition 8 [65]. Let At be a of universe
. The (ρ, η)–cut set of
is a subset of the universe
, which is defined as:
where 0 ≤ ρ ≤ 1 and 0 ≤ η ≤ 1 such that 0 ≤ ρ + η ≤ 1.
Definition 9 [64]. The support set of
At of the universe
is defined as:
Definition 10 [63]. A At is called
of group
, if it admits the following conditions:
,
,
,
.
Definition 11 [65]. Let At be a of group
. The subgroup
with 0 ≤ ρ + η ≤ 1 is called a level subgroup of At.
3. Representation of t-intuitionistic fuzzy number and triangular t-intuitionistic fuzzy number
In this section, we define the concepts of t-intuitionistic fuzzy numbers() and triangular t-intuitionistic fuzzy numbers(
) and highlight the understanding of these notions by presenting their respective examples and graphs.
Definition 12. A At of
is said to be a t-intuitionistic fuzzy normal set if it admits the following conditions: for any
such that:
Definition 13. A At defined on a line
is called a t-intuitionistic fuzzy number (
), if At satisfies the following conditions:
- At is a t-intuitionistic fuzzy normal set.
- Each (ρ, η)–cut set of At is a closed interval.
- The support set of At is bounded.
Interestingly, the parameter t is assigned a value of 1, and the transforms into the classical
.
Remark 1. Every At is expressible in the form of the following membership and non-membership functions:
and
where
and
are strictly increasing and decreasing functions in [m1 − α1, m1] and [m1, m1 + β1] respectively, whereas
and
are strictly increasing and decreasing functions in
and
respectively. Moreover, m1 denotes the mean value of At. Additionally, the values α1 and β1 are the left and right legs of
, respectively, whereas
and
are the left and right legs of
respectively.
The At is symbolized in the following way:
.
Definition 14. A is LR-type
such that the membership and non-membership function may be defined as follows:
and
Note that L(1) = R(1) = 0 and L(0) = R(0) = 1.
It’s interesting to note that when the parameter t is set to 1, the LR-type converts into the traditional LR-type
.
Example 1. Consider A on
is defined as follows:
and
The following Fig 1 shows the graphical representation of .
In view of Definition (13), the t- corresponds to the value t = 0.7 is given by:
and
The following Fig 2 illustrates the graphical representation of 0.7-.
Definition 15. A defined on a line
is said to be triangular
, if it possesses the following membership and non-membership functions as follows:
and
where
. Moreover, m1 denotes the mean value of At. The values α1 and β1 are the left and right legs of
, respectively, whereas
and
are the left and right legs of
respectively. The triangular t-
At is symbolized in the following way:
It is important to note that when the parameter t is set to 1, the triangular converts into the traditional triangular
.
Definition 16. Let At be a triangular . The (ρ, η)–cut interval of At is defined as:
Remark 2. For any triangular
then
.
Example 2. Consider A on
is defined as follows:
and
The graphical representation of triangular is depicted in Fig 3.
In view of Definition (15), the triangular 0.6- that is associated with the value t = 0.6 can be expressed as follows:
and
The graphical representation of triangular 0.6- is given in Fig 4:
Remark 3. For any two triangular
and
, then
- The addition and subtraction of any two triangular
At and Bt is triangular
and is calculated in the following way:
.
.
- For any scalar λ, the scalar multiplication of λ and At is also triangular
and is determined as follows:
for λ > 0.
for λ < 0.
- The exponent of a triangular
is obtained as follows:
where p is a positive integer.
4. Application of t-intuitionistic fuzzy subgroup to cryptography
In this section, we present an algorithm that utilizes the concept of a for the RSA cryptosystem.
Algorithm t-Intuitionistic Fuzzy RSA Algorithm
Generation of Keys:
1: Input any two random distinct prime numbers and
.
2: Calculate a modulus for both public and private keys.
3: Compute the Euler totient function: .
4: Choose an encryption exponent such that:
and
.
5: Compute the decryption exponent d, which satisfies the following congruence:
6: The receiver sends the public key to the sender and retains the private key
7: Output public and private keys.
Encryption Phase:
8: Input public key and
9: The sender received the recipient’s public key
10: Represents the experimental message into an integer or plain text
in view of .
11: Compute a corresponding to the set
.
12: Determine the (ρ, η)–level subgroup of .
13: Compute the of the level subgroup for the set of integers.
14: Obtain the triangular from
.
15: Compute ciphertext by using the RSA encryption formula .
16: The sender sends the ciphertext in the form of a triangular .
17: Output ciphertext.
Decryption Phase:
18: Input private key, ciphertext and .
19: The message is retrieved by employing the RSA decryption formula , using a private key
and triangular
exponentiation operation is employed.
20: The message is in triangular form and is verified by applying the Definition of congruence and subtraction of triangular
.
21: Obtain from triangular
.
22: Obtain the set of integers.
23: Obtain the plain text from .
24: Output plaintext.
The flowchart shown in Fig 5 clearly explains the RSA algorithm in the framework of .
4.1 Numerical example of t-intuitionistic fuzzy RSA algorithm
This section is devoted to presenting a numerical example that illustrates the application of to encrypt and decrypt a message using the t-intuitionistic fuzzy RSA module. The process of a t-intuitionistic fuzzy RSA Cryptosystem consists of three steps: generating keys, encryption, and decryption. The subsequent example depicts the mechanism of this method, using an experimental message, "Rose."
- Generate public and private keys:
Choose two distinct prime numbers, such asand
Computegiving:
.
Compute Euler totient functions such as: φ(55) = 40.
Choose any numbersuch as
and
.
Choose d1 = 23 that satisfies: 7d1 ≡ 1(mod40). - Encrypting the plaintext:
The public key is (7,55) and the private key is (23,55).
The experimental message is taken as "Rose."
Convert the experimental message into the set of integers: {18,15,19,05}.
Obtain a 0.7-corresponding to the set
as follows:
and
Compute the (0.4,0.5)–level subgroup of the above 0.7-as follows:
.
In view of Definition (14), 0.7-of
for the experimental message "Rose" is given by:
Transform the above 0.7-into Triangular 0.7-
:
Encrypt the Triangular 0.7-using a public key as follows:
- Decrypting the ciphertext:
The receiver receives the ciphertext in Triangular 0.7-:
Decrypt the ciphertext using a private key as follows:
Verify the ciphertext with plaintext modulo 55.
The original message is in Triangular 0.7-as follows:
Convert Triangular 0.7-into 0.7-
:
Transform 0.7-into the set of integers:{18,15,19,05}.
The plain text is "Rose".
Encrypting and decrypting processes will benefit user communication by making it difficult for attackers to break the message.
5. C++ Program to implement the t-intuitionistic fuzzy RSA algorithm
In this section, we implement the Cryptosystems in computer language. The
algorithm is computationally viewed in Fig 6.
6. Comparative analysis and limitations of the current study
This section presents a comparative analysis of the proposed and existing RSA techniques and discusses the proposed mechanism’s limitations.
One can establish a comparative analysis of the proposed algorithm with the existing RSA algorithm and a fuzzy version of the RSA algorithm. This comparison shows that the newly proposed algorithm to secure a message is better than the current algorithms. Table 2 shows the comparative comparison between the algorithm and existing algorithms.
The following are the limitations of the proposed techniques:
- In certain situations, the t-intuitionistic fuzzy approach may not be appropriate if the sum of the degree of membership and non-membership of the elements is greater than 1. To address this challenge, we suggest exploring alternative approaches in more flexible contexts, such as Pythagorean fuzzy, fermentation fuzzy, picture fuzzy, and spherical fuzzy environments.
- We have added extra security measures to improve the current cryptosystem, specifically to the difficulty of guessing the secret key. We have used t-intuitionistic fuzzy graph theory to strengthen the secret key, which has proven highly effective in overcoming these limitations.
7. Conclusions and future work
Cryptography is the technique used to protect the security of an individual’s or an organization’s data or private communications that must be kept secret or confidential. It is one of the methods to secure a message with a key unique to the sender or receiver. In , The RSA method resolves concerns and hesitations in subgroup structural cryptography. This improves group-based cryptographic processes, encompassing ambiguous connections and hesitations about complex subgroup memberships. This cryptographic approach can describe the degrees of belonging, non-belonging, and hesitation flexibly and securely, which obeys more than binary logic. In this research paper, we have introduced the notions of
and triangular
. A practical and advanced method for cryptographic security, i.e., the
scheme based on the RSA scheme, has been introduced. In this cryptographic scheme, it has been observed that the strategy of managing the fluctuation of the uncertainty level becomes more rapid. For the proposed cryptographic scheme, making the scheme with the parameter ‘t’ seems much more felicitous because the security countermeasure could be customized according to their specific requirements or a threat scenario. Furthermore, we have presented a comparative study of this newly developed mechanism with the existing RSA algorithm and have highlighted its significance.
Future directions for enhancing encryption in t-intuitionistic fuzzy environments include improved vital management, performance optimization, security analysis, integration with emerging technologies, real-world implementation, and standardization efforts. The present ideology shall be extended to the t-intuitionistic fuzzy graph theory, focusing on its practical application across various domains, including cryptography. The exploration of this theory seeks to achieve a heightened level of security.
References
- 1. Li W., Susilo W., Xia C., Huang L., Guo F., Wang T. (2024). Secure Data Integrity Check Based on Verified Public Key Encryption with Equality Test for Multi-Cloud Storage. IEEE Transactions on Dependable and Secure Computing.
- 2. Jiang H., Wang M., Zhao P., Xiao Z., & Dustdar S. (2021). A Utility-Aware General Framework With Quantifiable Privacy Preservation for Destination Prediction in LBSs. IEEE/ACM Trans. Netw., 29(5), 2228–2241.
- 3. Bi B., Huang D., Mi B., Deng Z., & Pan H. (2019). Efficient LBS Security-Preserving Based on NTRU Oblivious Transfer. Wireless Personal Communications, 108(4), 2663–2674.
- 4. Xuemin Z., Haitao D., Zenggang X., Ying R., Yanchao L., Yuan L., Delin H. (2024). Self-Organizing Key Security Management Algorithm in Socially Aware Networking. Journal of Signal Processing Systems, 96(6), 369–383.
- 5. Liu Y., Jia Z., Jiang Z., Lin X., Liu J., Wu Q., Susilo W. (2024). BFL-SA: Blockchain-based federated learning via enhanced secure aggregation. Journal of Systems Architecture, 152, 103163.
- 6. Ma J., & Hu J. (2022). Safe consensus control of cooperative-competitive multi-agent systems via differential privacy. Kybernetika, 58(3), 426–439.
- 7. Xie G., Hou G., Pei Q., & Huang H. (2024). Lightweight Privacy Protection via Adversarial Sample. Electronics, 13(7), 1230.
- 8. Blackledge J., Bezobrazov S., and Tobin P., "Cryptography using artificial intelligence" IJCNN, 2015, pp.1–6.
- 9.
Chakraborty M., Singh M., Balas VE V. E., Mukhopadhyay , "The essence of network security an end-to-end panorama," Singapore, Springer, 2020, pp. 289.
- 10. Rivest R. L., Shamir A., and Adleman L., "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120–126, 1978.
- 11. Chavan A., Jadhav A., Kumbhar S., and Joshi I., "Data transmission using RSA algorithm," Int Res J Eng. Technol., vol. 6, no.3, pp. 34–36, 2019.
- 12. Blackledge J., and Mosola N., "Applications of artificial intelligence to cryptography," Phys. Rev., 2020, 47, pp. 777–780.
- 13. Sun H. M., Yang W. C. and Laih C. S.," On the design of RSA with short exponent," J. Sci. Eng. vol. 18, no. 1, pp. 1–18, 2002.
- 14.
R. J. Hwang, F. F. Su, Y. S. Yeh and C. Y. Chen, "An efficient decryption method for RSA cryptosystem," 19th Int. Conf. Adv. Inf. Netw. Appl. Taipei, Taiwan, IEEE, vol. 1, pp. 585–590, 2005.
- 15.
R. S. Dhakar, A. K. Gupta, and P. Sharma, "Modified RSA Encryption Algorithm (MREA)," Second Int. Conf. Adv. Comput. Commun. Technol., IEEE, 2012, pp. 426–429.
- 16. Thangavel M., Varalakshmi P., Murrali M. and Nithya K., "An Enhanced and Secured RSA Key Generation Scheme (ESRKGS)," JISA, vol. 20, pp. 3–10, 2015.
- 17.
Rivain M., "Securing RSA against Fault Analysis by Double Addition Chain Exponentiation," Berlin, Heidelberg, Springer 2009, pp. 459–480.
- 18.
N. Kumar and P. Chaudhary, "Implementation of modified RSA cryptosystem for data encryption and decryption based on n prime number and bit stuffing," Sec. Inter. Conf. on Info. And Comm. Techn., vol. 05, pp. 1–6, 2016.
- 19. Zadeh L. A., "Fuzzy Sets," Infor. and Control, vol. 8, no. 3, pp. 338–353, Jun. 1965.
- 20. Singh H., Gupta M. M., Meitzler T., Hou Z. G., Garg K. K., Solo A. M. G., and Zadeh L. A., "Real-Life Applications of Fuzzy Logic," Adv. Fuzzy Syst., pp. 1–3, 2013.
- 21. Gupta P., "Applications of Fuzzy Logic in Daily life," IJARCS, vol. 8, no. 5, pp. 1795–1800, 2017.
- 22. Gupta M. M., and Ragade R. K., "Fuzzy set theory and its applications: A survey," IFAC Proceedings, vol. 10, no. 6, pp. 247–259, 1977.
- 23. Zadeh L. A., "The concept of a linguistic variable and its application to approximate reasoning-I," Information Sciences, vol. 8, no. 3, pp. 199–249, 1975a.
- 24. Zadeh L. A., "The concept of a linguistic variable and its application to approximate reasoning-II," Information Sciences, vol. 8, no. 4, pp. 301–357, 1975b.
- 25. Betta J., "Project Customer Requirements Management Using Fuzzy Numbers," JPAPR, vol. 4, pp. 9–15, 2020.
- 26. Buckley J. J. and Eslami E., "An introduction to fuzzy Logic and fuzzy sets," Advances in Soft Computing, Physica, Heidelberg, vol 13, 2002.
- 27. Mukherjee A. K., Gazi K. H., Salahshour S., Ghosh A. and Mondal S. P., "A brief analysis and interpretation on arithmetic operations of fuzzy numbers," RICO, vol. 13, art. no. 100312, 2023.
- 28.
Kahraman C., Gülbay M. and Kabak Ö., "Applications of Fuzzy Sets in Industrial Engineering: A Topical Classification," Fuzzy Application in Industrial Engineering. Studies in Fuzziness and Soft Computing, Berlin, Heidelberg, Springer, 2006, pp. 1–55.
- 29. Atanassov K. T., "Intuitionistic fuzzy sets,” Fuzzy Sets Syst., vol. 20, no. 1, pp. 87–96, 1986.
- 30. Son L. H., Abdel-Basset M., Nagan R. T., Giang N. L., Ali M., Priyan M. K., and Fujita H., A new representation of intuitionistic fuzzy systems and their applications in critical decision making, IEEE Intell. Syst., vol. 35, no. 1, pp. 6–17, 2019.
- 31. Ahmad Y., Husain S., and Asthanvi I. S., Study on the development of decision making using intuitionistic fuzzy set and interval valued intuitionistic fuzzy set IOSR j. Eng. vol. 3, no. 4, pp. 34–42, 2013.
- 32. Beg I. and Rashid T., Intuitionistic fuzzy similarity measure: Theory and applications, J. Intell. Fuzzy Syst., vol. 30, no. 2, pp. 821–829, 2016.
- 33. Annamalai C., Intuitionistic fuzzy sets: new approach and applications, IJRCCT, vol. 3, no. 3, pp. 283–285, 2014.
- 34. Ejegwa P.A., Tyoakaa G.U. and Ayenge A.M., Application of intuitionistic fuzzy sets in electoral system, IJMA, vol. 10, no. 1, pp. 35–40, 2016.
- 35. Garg H., An improved cosine similarity measure for intuitionistic fuzzy sets and their applications to decision-making process, Hacettepe, J. Math. Stat. vol. 47, no. 6, pp. 1578–1594, 2018.
- 36. Ejegwa P. A., An improved correlation coefficient between intuitionistic fuzzy sets and its applications to real-life decision-making problems, Notes Intuitionistic Fuzzy Sets, vol. 26, no. 2, pp. 1–4, 2020.
- 37.
Atanassov K. T., Gargov G. K., Intuitionistic fuzzy logic, Berlin: Springer International Publishing, 2017.
- 38. Atanassov K. T. and Georgiev C., Intuitionistic fuzzy prolog, Fuzzy Sets Syst., vol. 53, no. 2, pp. 121–128, 1993.
- 39. De S. K., Biswas R., and Roy A. R., An application of intuitionistic fuzzy sets in medical diagnosis, Fuzzy Sets Syst., vol. 117, no. 2, pp. 209–213, 2001.
- 40.
E. Szmidt and J. Kacprzyk, "Intuitionistic fuzzy sets in some medical applications, international conference on computational intelligence, Springer, Berlin, Heidelberg, 2001, pp. 148–151.
- 41. Davvaz B. and Sadrabadi E. H., An application of intuitionistic fuzzy sets in medicine, Int. J. Biomath. vol. 9, no. 3, pp. 1650037–1650052, 2016.
- 42. Samuel A. E. and Rajakumar S., Intuitionistic fuzzy set with new operators in medical diagnosis, IJMTT vol. 55, no. 3, 2018.
- 43.
M. N. Iqbal1 and U. Rizwan, "Some applications of intuitionistic fuzzy sets using new similarity measure", JAIHC, pp. 1–15, 2019.
- 44. Ejegwa P. A., Akubo A. J. and Joshua O. M., "Intuitionistic fuzzy set and its application career determination via normalized Euclidean distance method", Eur. Sci. J., vol. 10, no. 5, pp. 529–536, 2014.
- 45. Ejegwa P. A., Akub A. J. and Joshu O. M., "Intuitionistic fuzzy sets in career determination", J. Inf. Comput. Sci. vol. 9, no. 4, pp. 285–288, 2014.
- 46. Tugrul F., Gezercan M. and Citil M., Application of intuitionistic fuzzy sets in high school determination via normalized Euclidean distance method, Notes Intuitionistic Fuzzy Sets, vol.23, no. 1, pp. 42–47, 2017.
- 47. Meena K. and Ponnappen L., An application of intuitionistic fuzzy sets in choice of discipline of study, Global J. Pure Appl. Math, vol.14, no. 6, pp. 867–871, 2018.
- 48. Kozae A. M., Shokry M., and Omran M., Intuitionistic Fuzzy Set and Its Application in Corona Covid-19, Appl. Comput. Math., vol. 9, no. 5, pp. 146–154, 2020.
- 49. Citil M., "Application of the Intuitionistic Fuzzy Logic in Education," CMA, vol. 10, no. 1, pp. 131–143, Dec. 2018.
- 50. Kozae A. M., Elshenawy A., and Omran M., "Intuitionistic Fuzzy Set and Its Application in Selecting Specialization: A Case Study for Engineering Students," J. Math. Anal. Appl. vol. 2, no. 6, pp. 74–78, 2015.
- 51. Aggarwal H., Arora H.D., and Kumar V., "A Decision-making Problem as an Applications of Intuitionistic Fuzzy Set, "IJEAT, vol. 9, no. 2, pp. 5259–5261, 2019.
- 52. Ejegwa P. A., Onoja A. M. and Emmanuel I. T., "A Note on Some Models of Intuitionistic Fuzzy Sets in Real Life Situations," JGRMA, vol. 2, no. 5, pp. 42–50, 2014.
- 53.
Z. Gou, Q. Zhang, "A new Approach to Project Risk Evaluation based on Intuitionistic Fuzzy Sets," Sixth International Conference on Fuzzy Systems and Knowledge Discovery, IEEE, 2009, pp. 58–61.
- 54.
L. I. Junhong, L. I. Jian, Y. Chao, and D. Mingjuan, "Multi-attribute decision making method with intuitionistic fuzzy sets," 9th Int. Conf. Fuzzy Syst. Knowl. Discov., IEEE, 2012, pp. 97–101.
- 55.
P. Intarapaiboon, "An Application of Intuitionistic Fuzzy Sets in Text Classification," Int. Conf. Inf. Sci. Electron. Electr. Eng., IEEE, 2014, pp. 604–608.
- 56. Seikh M. R., Nayak P. K. and Pal M., "Notes on triangular intuitionistic fuzzy numbers," Int. J. Math. Oper. Res., vol. 5, no. 4, pp. 446–465, 2013.
- 57. Bharati S. K., "Ranking method of intuitionistic fuzzy numbers," Glob. J. Pure Appl. Math., vol. 13, no. 9, pp. 4595–4608, 2017.
- 58. Aikhuele D. O. and Odofin S., "A generalized triangular intuitionistic fuzzy geometric averaging operator for decision-making in engineering and management," Information, vol. 8, no. 3, art. no. 78, 2017.
- 59. Huang Z., Weng S., Lv Y. and Liu H., "Ranking method of intuitionistic fuzzy numbers and multiple attribute decision-making based on the probabilistic dominance relationship," Symmetry, vol. 15, no. 5, art. no. 1001, 2023.
- 60. Liang C., Zhao S. and Zhang J., "Aggregation operators on triangular intuitionistic fuzzy numbers and its application to multi-criteria decision-making problems," Found. Comput. Decis. Sci., vol. 3, pp. 321326, 2014.
- 61. Das S., Kar S. and Pal T., "Robust decision making using intuitionistic fuzzy numbers," Granul. Comput., vol. 2, pp. 41–54, 2017.
- 62. Nayagam V. L. G., Jeevaraj S. and Sivaraman G., "Complete ranking of intuitionistic fuzzy numbers," Fuzzy Inf. Eng., vol. 8, no. 2, pp. 237–254, 2016.
- 63. Sharma P. K., t-Intuitionistic fuzzy subgroups, Int. J. Fuzzy Syst., vol 3, pp. 233–243, 2012.
- 64. Latif L., Shuaib U., Alolaiyan H., Razaq A., On fundamental theorems of t-intuitionistic fuzzy isomorphism of t-intuitionistic fuzzy subgroups, IEEE Access, vol. 6, pp. 74547–74556, 2018.
- 65. Alolaiyan H., Shuaib U., Latif L., Razaq A., t-intuitionistic fuzzification of Lagrange’s theorem of t-Intuitionistic fuzzy subgroup, IEEE Access, vol 7, pp. 158419–158426, 2019.on
- 66.
R. Madanayake, N. Peiris, G. Ranaweera and U. Jayathilake, Advanced encryption algorithm using fuzzy logic, Int. Conf. in Infor. Comp. Networks, vol. 27, pp. 32–36, 2012.
- 67.
K. Abdullah, S. A. Bakar, N. H. Kamis, and H. Aliamis, RSA cryptosystem with fuzzy set theory for encryption and decryption. AIP Conf. Proc., vol. 190, no.5, pp. 030001–030006, 2017.
- 68.
M. Durcheva and M. Ivanova, "Cryptography Based on Fuzzy Graphs," In Int. Conf. Intell. Fuzzy Syst., Cham: Springer Nature Switzerland, pp. 85–93, 2023.
- 69. Pius A. and Kirubaharan D. R., "Application of cryptography in data privacy using fuzzy graph theory," J. Discrete Math. Sci. Cryptogr., vol. 24, no. 8, pp. 2389–2401, 2021.
- 70.
A. Pius and D. R. Kirubaharan, "An effective analysis of cryptography and importance of implementing cryptography in fuzzy graph theory," Proc. Int. Conf. Commun. Artif. Intell.: ICCAI 2021, Singapore: Springer Nature Singapore, pp. 317–327, 2022.