An advanced encryption system based on soft sets

Given the application domains of soft set theory, such as decision-making processes, image processing, machine learning, and data mining, it is natural to consider that this theory could be utilized more effectively in encryption systems. A review of the literature reveals that soft set-based encryp...

Full description

Saved in:
Bibliographic Details
Main Authors: Erdal Bayram, Gülşah Çelik, Mustafa Gezek
Format: Article
Language:English
Published: AIMS Press 2024-11-01
Series:AIMS Mathematics
Subjects:
Online Access:https://www.aimspress.com/article/doi/10.3934/math.20241547?viewType=HTML
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850161716992671744
author Erdal Bayram
Gülşah Çelik
Mustafa Gezek
author_facet Erdal Bayram
Gülşah Çelik
Mustafa Gezek
author_sort Erdal Bayram
collection DOAJ
description Given the application domains of soft set theory, such as decision-making processes, image processing, machine learning, and data mining, it is natural to consider that this theory could be utilized more effectively in encryption systems. A review of the literature reveals that soft set-based encryption systems have been explored in a limited number of studies. This study seeks to develop a new approach for soft sets in encryption systems by utilizing newly introduced algebraic and topological tools. In this system, parties will be able to generate encryption keys independently using soft sets they determine themselves rather than through prior mutual agreement. Additionally, the method of key generation and the size of the key space in the resulting encryption system provides a more secure and distinct alternative compared to existing soft set-based encryption systems.
format Article
id doaj-art-a8dc6a0a2df94481b7798b7c585fd329
institution OA Journals
issn 2473-6988
language English
publishDate 2024-11-01
publisher AIMS Press
record_format Article
series AIMS Mathematics
spelling doaj-art-a8dc6a0a2df94481b7798b7c585fd3292025-08-20T02:22:45ZengAIMS PressAIMS Mathematics2473-69882024-11-01911322323225610.3934/math.20241547An advanced encryption system based on soft setsErdal Bayram 0Gülşah Çelik 1Mustafa Gezek2Department of Mathematics, Tekirdağ Namık Kemal University, Tekirdağ 59030, TürkiyeDepartment of Mathematics, Tekirdağ Namık Kemal University, Tekirdağ 59030, TürkiyeDepartment of Mathematics, Tekirdağ Namık Kemal University, Tekirdağ 59030, TürkiyeGiven the application domains of soft set theory, such as decision-making processes, image processing, machine learning, and data mining, it is natural to consider that this theory could be utilized more effectively in encryption systems. A review of the literature reveals that soft set-based encryption systems have been explored in a limited number of studies. This study seeks to develop a new approach for soft sets in encryption systems by utilizing newly introduced algebraic and topological tools. In this system, parties will be able to generate encryption keys independently using soft sets they determine themselves rather than through prior mutual agreement. Additionally, the method of key generation and the size of the key space in the resulting encryption system provides a more secure and distinct alternative compared to existing soft set-based encryption systems.https://www.aimspress.com/article/doi/10.3934/math.20241547?viewType=HTMLencryptionmaximum and minimum operatorssoft computingsoft cryptosystemsoft sets
spellingShingle Erdal Bayram
Gülşah Çelik
Mustafa Gezek
An advanced encryption system based on soft sets
AIMS Mathematics
encryption
maximum and minimum operators
soft computing
soft cryptosystem
soft sets
title An advanced encryption system based on soft sets
title_full An advanced encryption system based on soft sets
title_fullStr An advanced encryption system based on soft sets
title_full_unstemmed An advanced encryption system based on soft sets
title_short An advanced encryption system based on soft sets
title_sort advanced encryption system based on soft sets
topic encryption
maximum and minimum operators
soft computing
soft cryptosystem
soft sets
url https://www.aimspress.com/article/doi/10.3934/math.20241547?viewType=HTML
work_keys_str_mv AT erdalbayram anadvancedencryptionsystembasedonsoftsets
AT gulsahcelik anadvancedencryptionsystembasedonsoftsets
AT mustafagezek anadvancedencryptionsystembasedonsoftsets
AT erdalbayram advancedencryptionsystembasedonsoftsets
AT gulsahcelik advancedencryptionsystembasedonsoftsets
AT mustafagezek advancedencryptionsystembasedonsoftsets