International Journal of Advances in Applied Computational Intelligence

Journal DOI

https://doi.org/10.54216/IJAACI

Submit Your Paper

2833-5600ISSN (Online)

Volume 6 , Issue 1 , PP: 30-35, 2024 | Cite this article as | XML | Html | PDF | Full Length Article

A Review on the Neutrosophic Number Theory Based Cryptography and Neutrosophic Public Key Crypto-Systems

Ali Allouf 1

  • 1 Tishreen University, Faculty of computer engineering and automation, Latakia, Syria - (Ali.allouf@gmail.com)
  • Doi: https://doi.org/10.54216/IJAACI.060103

    Received: November 2, 2023 Revised: January 24, 2024 Accepted: June 12, 2024
    Abstract

    The main objective of this chapter is to introduce the concept of neutrosophic number theory, and to demonstrate its potential applications in modern cybernetic systems. The chapter will also explore the possibility of utilizing neutrosophic theory to enhance existing security algorithms, including a detailed explanation of the neutrosophic version of the RSA algorithm. Furthermore, the chapter will present a novel neutrosophic version of the Diffie-Hellman key exchange algorithm.

    Keywords :

    Neutrosophic Cryptography , Neutrosophic RSA Algorithm , Public key Cryptography , Fusion Neutrosophic Number Theory , Diffie-Hellman key exchange algorithm

    References

    Celik, M., & Olgun, N. (2022). An introduction to neutrosophic real Banach and Hillbert spaces. Galoitica Journal of Mathematical Structures and Applications, 2(1), 8-13.

    [2]  Celik, M., & Olgun, N. (2022). On the classification of neutrosophic complex inner product spaces. Galoitica Journal of Mathematical Structures and Applications, 2022(1), 14-23.

    [3] Abobala, M. (2021). Partial foundation of neutrosophic number theory. Neutrosophic Sets and Systems, 39, 120-132.

    [4]  Smarandache, F., & Kandasamy, W. B. V. (2011). Finite neutrosophic complex numbers. arXiv.org.

    [5]  Agboola, A. A. A., Akinola, A. D., & Oyebola, O. Y. (2011). Neutrosophic rings I. International Journal of Math Combinatorics, 4, 1-14.

    [6]  Adeleke, E. O., Agboola, A. A. A., & Smarandache, F. (2020). Refined neutrosophic rings I. International Journal of Neutrosophic Science, 2(2), 77-81.

    [7]  Abobala, M. (2021). On some algebraic properties of n-refined neutrosophic elements and n-refined neutrosophic linear equations. Mathematical Problems in Engineering, 2021, 1-7.

    [8]  Abobala, M. (2021). On refined neutrosophic matrices and their applications in refined neutrosophic algebraic equations. Journal of Mathematics, 2021, 5531093.

    [9]  Cozzens, M. Miller, S.J. (2013). The Mathematics of Encryption: An Elementary Introduction, American Mathematical Society.

    [10]  Wahab Sait, A. R., Pustokhina, I., & Ilayaraja, M. (2019). Modeling of multiple share creation with optimal signcryption technique for digital image security. Journal of Intelligent Systems and Internet of Things, 0(1), 26-36.

    [11]  Sankari, H., and Abobala, M., "Neutrosophic Linear Diophantine Equations With two Variables", Neutrosophic Sets and Systems, Vol. 38, pp. 22-30, 2020.

    [12]  Ibrahim, M., & Abobala, M. (2021). An introduction to refined neutrosophic number theory. Neutrosophic Sets and Systems, 45, 1-10.

    [13]  Merkepci, M., Abobala, M., & Allouf, A. (2023). The applications of fusion neutrosophic number theory in public key cryptography and the improvement of RSA algorithm. Fusion: Practice and Applications (FPA), 10(2), 69-74.

    Cite This Article As :
    Allouf, Ali. A Review on the Neutrosophic Number Theory Based Cryptography and Neutrosophic Public Key Crypto-Systems. International Journal of Advances in Applied Computational Intelligence, vol. , no. , 2024, pp. 30-35. DOI: https://doi.org/10.54216/IJAACI.060103
    Allouf, A. (2024). A Review on the Neutrosophic Number Theory Based Cryptography and Neutrosophic Public Key Crypto-Systems. International Journal of Advances in Applied Computational Intelligence, (), 30-35. DOI: https://doi.org/10.54216/IJAACI.060103
    Allouf, Ali. A Review on the Neutrosophic Number Theory Based Cryptography and Neutrosophic Public Key Crypto-Systems. International Journal of Advances in Applied Computational Intelligence , no. (2024): 30-35. DOI: https://doi.org/10.54216/IJAACI.060103
    Allouf, A. (2024) . A Review on the Neutrosophic Number Theory Based Cryptography and Neutrosophic Public Key Crypto-Systems. International Journal of Advances in Applied Computational Intelligence , () , 30-35 . DOI: https://doi.org/10.54216/IJAACI.060103
    Allouf A. [2024]. A Review on the Neutrosophic Number Theory Based Cryptography and Neutrosophic Public Key Crypto-Systems. International Journal of Advances in Applied Computational Intelligence. (): 30-35. DOI: https://doi.org/10.54216/IJAACI.060103
    Allouf, A. "A Review on the Neutrosophic Number Theory Based Cryptography and Neutrosophic Public Key Crypto-Systems," International Journal of Advances in Applied Computational Intelligence, vol. , no. , pp. 30-35, 2024. DOI: https://doi.org/10.54216/IJAACI.060103