Fuzzy Soft Set-Based Identification of Best Chaotic System for Security Applications

Authors

DOI:

https://doi.org/10.14429/dsj.74.19877

Keywords:

Information security, Cryptography, Chaotic system, Chaotic characteristics, System identification

Abstract

In order to ensure reliable and secure data exchange, chaos-based cipher systems are often considered for their excellent performance in information security. Identifying the most suitable chaotic system among several such systems to embed in a cipher system is an important problem to meet adequate information security for safeguarding vital information from adversaries. Any flaw in choosing the best chaotic system is very detrimental as it can lead to compromising the security of important information. The paper presents an identification methodology based on fuzzy soft set criteria to find one of the most suitable chaotic system. The values of attributes of a chaotic system which appear in graphical form are quantified by measuring proportionate region covered in the graphs of chaotic characteristics and then used in identification. The methodology takes the decision on the basis of fuzzy soft set, dominancy matrix and score values. This methodology can be applied to identity the best chaotic system based on its desired attributes as single or multiple attributes. Simulation results indicate that the identification methodology provides the best suitable chaotic system correctly without any ambiguity or stuck. The identification methodology may help developer also to find weaker chaotic systems and improve them suitably by modifying their weak attributes to arrive for meeting the desired security strength

Downloads

Published

2024-11-25

How to Cite

Meenakshi Agarwal, Arvind, Chaman Arya, & Ratan, R. (2024). Fuzzy Soft Set-Based Identification of Best Chaotic System for Security Applications. Defence Science Journal, 74(6), 893–903. https://doi.org/10.14429/dsj.74.19877

Issue

Section

Computers & Systems Studies