Fuzzy Soft Set-Based Identification of Best Chaotic System for Security Applications
DOI:
https://doi.org/10.14429/dsj.74.19877Keywords:
Information security, Cryptography, Chaotic system, Chaotic characteristics, System identificationAbstract
In order to ensure reliable and secure data exchange, chaos-based cipher systems are often considered for their excellent performance in information security. Identifying the most suitable chaotic system among several such systems to embed in a cipher system is an important problem to meet adequate information security for safeguarding vital information from adversaries. Any flaw in choosing the best chaotic system is very detrimental as it can lead to compromising the security of important information. The paper presents an identification methodology based on fuzzy soft set criteria to find one of the most suitable chaotic system. The values of attributes of a chaotic system which appear in graphical form are quantified by measuring proportionate region covered in the graphs of chaotic characteristics and then used in identification. The methodology takes the decision on the basis of fuzzy soft set, dominancy matrix and score values. This methodology can be applied to identity the best chaotic system based on its desired attributes as single or multiple attributes. Simulation results indicate that the identification methodology provides the best suitable chaotic system correctly without any ambiguity or stuck. The identification methodology may help developer also to find weaker chaotic systems and improve them suitably by modifying their weak attributes to arrive for meeting the desired security strength
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Defence Scientific Information & Documentation Centre (DESIDOC) Where otherwise noted, the Articles on this site are licensed under Creative Commons License: CC Attribution-Noncommercial-No Derivative Works 2.5 India