Next Article in Journal
On Certain Bounds of Harmonic Univalent Functions
Previous Article in Journal
Measuring Semantic Stability: Statistical Estimation of Semantic Projections via Word Embeddings
Previous Article in Special Issue
In Search of L-Fuzzy Contexts Adaptable to Variable Information: A Tool for Time-Varying Data Analysis
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel Approach to Strengthening Cryptography Using RSA, Efficient Domination and Fuzzy Logic

by
Ghulam Muhiuddin
1,
Annamalai Meenakshi
2,*,
Janusz Kacprzyk
3,*,
Ganesan Ambika
4 and
Hossein Rashmamlou
5
1
Department of Mathematics, Faculty of Science, University of Tabuk, Tabuk 71491, Saudi Arabia
2
Department of Mathematics, Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, Avadi, Chennai 600062, India
3
Systems Research Institute, Polish Academy of Sciences, ul. Newelska 6, 01-447 Warsaw, Poland
4
Department of Mathematics, S. A. College of Arts & Science, Thiruverkadu, Chennai 600077, India
5
School of Physics, Damghan University, Damghan 3671641167, Iran
*
Authors to whom correspondence should be addressed.
Axioms 2025, 14(5), 392; https://doi.org/10.3390/axioms14050392
Submission received: 6 March 2025 / Revised: 11 May 2025 / Accepted: 19 May 2025 / Published: 21 May 2025
(This article belongs to the Special Issue Recent Advances in Fuzzy Sets and Related Topics)

Abstract

:
A secured communications system is a structure or infrastructure that is intended to ensure the confidentiality, integrity, and authenticity of data being exchanged between entities. Such systems use various security technologies to guarantee that communications are not tampered with, read, or accessed by unauthorized parties. The intractability of factoring huge composite numbers is a prerequisite for RSA’s security. With big enough key sizes, it is still computationally infeasible for attackers to defeat RSA encryption with today’s technology. Efficient domination is an idea based on graph theory, specifically in the investigation of domination in graphs. Although it has many applications in problems in computation, it is only for cryptography in contexts involving efficient algorithms, combinatorial structures, and optimization for security that it finds uses. This idea provides minimal redundancy in domination, similar to the optimization of resources in a cryptographic scenario. In this work, we concentrate on enhancing the complexity of secure systems using a mathematical model that is based on fuzzy graph networks. The suggested model combines efficient domination, the RSA algorithm, and triangular fuzzy membership functions. By integrating these optimized parameters, we construct a very secure mathematical fuzzy graph network that can efficiently protect secret information.
MSC:
05C30; 68R10; 90C35; 05C72

1. Introduction

Fuzzy graph networks merge fuzzy set theory and graph theory and offer a mechanism to model imprecision, vagueness, and uncertainty in systems and relations. Fuzzy graph networks increasingly find application in cryptography because they can deal with ambiguity and allow flexible solutions for security issues. Fuzzy graph networks are graphs whose nodes and edges possess fuzzy attributes that define uncertain or imprecise relationships between entities. A fuzzy graph is represented by G = ( V , υ, ω), where υ is a mapping from V into [0, 1], a membership function representing the extent of participation of a vertex, and ω is a mapping from V × V into [0, 1], a relation showing the extent of the relationship (edge weight) between two vertices.
If every vertex in the graph is either in the subset or adjacent to at least one vertex in the subset, the subset is known as a dominating set in graph theory. A dominating set in a graph that has the further requirement that just one vertex in the dominating set dominates every vertex in the graph is called an efficient dominating set, often referred to as a perfect dominating set. This ensures that domination is not redundant and is therefore an “efficient” solution. Vertex set D is a subset of V of G = ( V , υ, ω) and is a dominating set if, for each vertex x 1 in V D , the following condition is met: (i) υ( x 1 ) > 0 and the vertex x 1 is in D , or (ii) x 1 is adjacent to vertex x 2 in D , with ω( x 1 , x 2 ) > 0. The edge ( x 1 , x 2 ) connects to x 2 in D and contains a positive membership value. A fuzzy graph network ( F G N ) is a graph network if it satisfies ω( x 1 , x 2 ) min( υ x 1 , υ ( x 2 ) ) for every ( x 1 , x 2 ) in V . A fuzzy graph network is said to be a strong fuzzy graph network ( F G N s ) if ω( x 1 , x 2 ) = min( υ x 1 , υ ( x 2 ) ) for every ( x 1 , x 2 ) in V .
To define the notion of uncertainty in practical situations, Zadeh presented a mathematical theory in 1965 [1]. This was the start of fuzzy graph theory and research on certain kinds of connected graph theoretical structures. Research by Bondy and U.S.R. Murthy delved into graph theory and its diverse applications [2]. Ore [3] studied dominance in graph structures. Haynes et al. [4] initiated research on paired domination. Biggs [5] and Kulli [6] contributed prominently to the theoretical part of domination in graphs. Kulli and Janakiram [7] worked on split domination, whereas Kulli and Patwari [8] worked on graph domination in general. Cockayne and Hedetniemi [9] first proposed the independent domination numbers in graphs. Meenakshi and Baskar Babujee [10] extended the idea of paired equitable domination. Kwon et al. [11] were involved in classifying efficiently dominant sets of circular graphs with a degree of 5. Somasundram A and Somasundram S studied domination and total domination in fuzzy graphs [12]. Nagoorkani and chandrasekaran [13] studied domination in fuzzy graphs. Atanassov [14] laid the basis for intuitionistic fuzzy graphs (IFGs) and intuitionistic fuzzy relations. Enrico Enriquez [15] researched domination in fuzzy directed graphs, while Atanassov worked on intuitionistic fuzzy graphs and their relational structures. Karunambigai et al. later examined a certain subtype of IFGs, as characterized by Shannon and Atanassov [16].
Pius et al. [17] proposed a cryptographic method to encrypt sensitive information to solve data privacy in fuzzy graph theory. Wang et al. [18] gave a more concise derivation for matrix extension by extending the extended visual Cryptography Scheme to encrypt several color pictures with significant shares. Also, the authors proposed new applications for these tagged structures and cryptography to optimize the graph features, particularly in networks that require high efficiency and interconnectedness. The paper presented a mathematical framework and outlined its applications in network security. The work was subsequently followed up by Meenakshi et al. [19] and later generalized to hypergraphs [20]. Wu et al. [21] suggested a security model based on hypergraph structures to model and handle security mechanisms over multiple layers in optical networks. Finally, in [22,23,24,25,26], the authors discussed various types and applications of fuzzy graphs.

Motivation and Novelty

Although many studies have considered fuzzy-logic-based cryptographic systems, most of them consider fuzzy authentication, threshold schemes, or standard fuzzy set uses without incorporating essential structural graph theoretic features. Fuzzy and intuitionistic fuzzy graphs have been considered for modeling uncertainty in networks in previous research, and RSA is a well-established encryption technique. The integration of fuzzy domination principles with traditional cryptographic methods is still unexplored. The innovation of this research is the integration of efficient domination in fuzzy graph networks with RSA cryptosystem, a layered encryption mechanism that increases security through mathematical complexity and structural optimization. In contrast to traditional hybrid cryptosystems, which tend to merge fuzzy logic concepts with encryption schemes, our approach embeds data within fuzzy graph structures that are controlled by effective dominating sets, minimizing redundancy and maximizing control in secure communication. In addition, the employment of triangular fuzzy membership functions and strong fuzzy graph networks in the cryptographic process introduces a new paradigm for handling uncertainty and vagueness in encryption methods. This integrated framework not only enhances encryption but also confers a structural advantage in secure key distribution and decryption, hence presenting a marked improvement over earlier methods.
For the sake of clarity, a list of all symbols and notations employed in this paper is given in Table 1.
Section 2 describes how a fuzzy graph network can be constructed using an efficient dominating set, RSA algorithm, and triangular fuzzy membership function. Section 3, Section 4 and Section 5 present the encryption and decryption algorithms of the designed cryptosystem. Section 6 presents the cryptosystem through an example that explains how to obtain the cipher graph and plaintext of the secret data. Section 7 provides a comparative study of various cryptographic methods against the proposed one. Section 8, Section 9 and Section 10 present the flowchart of the proposed cryptosystem and possible vector attacks and Section 11 presents the conclusion.

2. Proposed Cryptosystem

The proposed system consists of (i) the numerical plaintext, (ii) cipher graph, (iii) encryption algorithm, (iv) decryption algorithm and (v) key.
(i)
Numerical plaintext: This is the original, readable, and unencrypted data or message. It is what is fed into an encryption procedure, which scrambles it to make it unreadable in the form of a cipher graph to secure its confidentiality. In this cryptosystem, the numerical plaintext is the non-negative composite number.
(ii)
Cipher graph: This is the encrypted, non-readable data resulting from plaintext having an encryption algorithm applied to it. It is meant to safeguard the original information against unauthorized parties, so its confidentiality can be guaranteed during storage or transmission. In this study, the cipher graph is a fuzzy graph network, and it is denoted by F G N s .
(iii)
Encryption algorithm: This is a mathematical operation to convert plaintext (readable data) into a cipher graph (unreadable data) in order to maintain its confidentiality and security. This algorithm, along with a cryptographic key, specifies how the conversion is performed. In this cryptosystem, the encryption algorithm is constructed based on RSA, efficient domination and the triangular fuzzy membership function.
(iv)
Decryption algorithm: This is an algorithmic process applied to decrypt data that have been encrypted back to their original readable form. It is the inverse of encryption and needs the proper cryptographic key in order to execute the conversion.
(v)
Key: This is a piece of information, often a string of characters, used in conjunction with an encryption or decryption algorithm to secure and unlock data. Keys are a fundamental component of cryptographic systems, determining how data are encrypted or decrypted. The keys used in this methodology are (i) finding efficient dominating nodes in the cipher graph represented as F G N s (key 1), (ii) finding the range of triangular fuzzy triplets (key 2) and (iii) RSA private key d . The decryption process is performed by applying these keys to access the numerical plaintext.

3. Construction of F G N s

Step 1: Let the numerical plain text N P L be
x 11 x 12 x 13 x 1 i 1 / x 21 x 22 x 23 x 2 i 2 / x 31 x 32 x 33 x 3 i 3 / / x ( r 1 ) 1 x ( r 1 ) 2 x ( r 1 ) i ( r 1 ) / x r 1 x r 2 x r i r ,
where k and i r are positive integers.
Partition the N P L as
M 1 = x 11 x 12 x 13 x 1 i 1 , M 2 = x 21 x 22 x 23 x 2 i 2 , M 3 = x 31 x 32 x 23 x 2 i 2 , , M ( r 1 ) = x ( r 1 ) 1 x ( r 1 ) 2 x ( r 1 ) i ( r 1 ) , M r = x r 1 x r 2 x r i r .
Step 2: Using M 1 = x 11 x 12 x 13 x 1 i 1 , the first sub network F G N s 1 is constructed. By using the RSA algorithm, find the encrypted message that says C 1 M 1 e 1   ( m o d N 1 ) , which corresponds to M 1 . Convert C 1 into a triangular fuzzy number and let it be F 1 . Let F 1 = F 11 + F 12 + F 13 + + F 1 i 1 .
Step 3: Let the nodes of F G N s 1 (Figure 1) be a 1 , p 11 , p 12 , p 13 , , p 1 i 1 such that the distance between a 1 and p 1 k ˘ 1 = 1 , where 1 k ˘ 1 i 1 . Regarding the node membership value ( N M V ) , the N M V values of F G N s 1   a 1 , p 11 , p 12 , p 13 , , p 1 i 1 are given by F 1 a , F 11 , F 12 , F 13 , , F 1 i 1 , respectively. The edge membership values ( E M V ) are E M V   ( a 1 , p 11 ) = m i n   ( F 1 a , F 11 ) , E M V ( a 1 , p 12 ) = m i n F 1 a , F 12 , E M V a 1 , p 13 = m i n ( F 1 a , F 13 ) , , and  E M V ( a 1 , p 1 i 1 )   = min ( F 1 a , F 1 i 1 ) , respectively.
Step 4: Using M 2 = x 21 x 22 x 23 x 2 i 2 , the second sub network F G N s 2 is constructed. By using the RSA algorithm, find the encrypted message that says C 2 M 2 e 2   ( m o d N 2 ) , which corresponds to M 2 . Let the nodes of F G N s 2 be a 2 , p 21 , p 22 , p 23 , , p 2 i 2 such that the distance between a 2 and p 2 k 2 is equal to 1, where 1 k ˘ 2 i 2 . The N M V s of a 2 , p 21 , p 22 , p 23 , , p 2 i 2 are F 2 a , F 21 , F 22 , F 23 , , F 2 i 2 , respectively. The E M V of a 2 , p 21 = m i n ( F 2 a , F 21 ) ,   E M V ( a 2 , p 22 ) = min ( F 2 a , F 22 ) , E M V ( a 2 , p 23 ) = min ( F 2 a , F 23 ) , …, and E M V ( a 2 , p 2 i 2 ) = min ( F 2 a , F 2 i 2 ) , respectively.
Step 5: Continuing this until the last step, construct rth sub network F G N s r . Using x r 1 x r 2 x r i r , rth sub network F G N s r is constructed. By using the RSA algorithm, find the encrypted message and let it be C r M r e r ( m o d N r ) , which corresponds to M r . Let the nodes of F G N s r be a r , p r 1 , p r 2 , p r 3 , , p r i r such that the distance between a r and p r k = 1, where 1 k ˘ r i r . The N M V s of a r , p r 1 , p r 2 , p r 3 , , p r i r are F r a , F r 1 , F r 2 , F r 3 , , F r i r , respectively. The E M V ( a r , p r 1 ) = min ( F r a , F r 1 ) , E M V   ( a r , p r 2 ) = min ( F r a , F r 2 ) , E M V   ( a r , p r 3 ) = min ( F r a , F r 3 ) , …, and E M V   ( a r , p r i r ) = min ( F r a , F r i r ) , respectively. The E M V of the rest of the constructed edges is established according to the definition of F G .
Step 6: Let a 1 , a 2 , a 3 , , a r be the nodes of the efficient dominating set, which has N M V s that are F 1 a , F 2 a , F 3 a , , F r a . Construct network F G N s using F G N s 1 , F G N s 2 , , F G N s r as follows. The node set of F G N s is V F G N s = { a 1 , a 2 , a 3 , , a r } { p 1 k ˘ 1 , p 2 k ˘ 2 , p 3 k ˘ 3 , , p r k ˘ r } where 1 k ˘ 1 i 1 , 1 k ˘ 2 i 2 , 1 k ˘ 3 i 3 , , 1 k ˘ r i r . The number of nodes present in F G N s is r + i 1 + i 2 + i 3 + … + i r . The minimum number of edges required for F G N s is calculated as follows.
Step 7: Define E 1 = { ( p 1 k ˘ 1 , p 2 k ˘ 2 ) , ( p 2 k ˘ 2 p 3 k ˘ 3 ) , ( p 3 k ˘ 3 , , p 4 k ˘ 4 ) , , ( p r 2 k ˘ r 2 ) , ( p ( r 1 ) k ˘ ( r 1 ) ) } for only one 1 k ˘ 1 i 1 , 1 k ˘ 2 i 2 , 1 k ˘ 3 i 3 , ; 1 k ˘ r 1 i r 1 .   E 2 = { ( a 1 , p 1 k ˘ 1 ) , ( a 2 , p 2 k ˘ 2 ) , ( a 3 , p 3 k ˘ 3 ) , , ( a r , p r k ˘ r ) } where 1 k ˘ 1 i 1 , 1 k ˘ 2 i 2 , 1 k ˘ 3 i 3 , , 1 k ˘ r i r . The minimum number of edges required for F G N s is E M i n = E 1 E 2 .
Step 8: The maximum number of edges required for F G N s is E M a x = (r + i 1 + i 2 + i 3 + … + i r ) C 2 { ( p 1 k ˘ 1 , a 2 ) , ( p 1 k ˘ 1 , a 3 ) , ( p 1 k ˘ 1 , a 4 ) , , ( p 1 k ˘ 1 , a r )   w h e r e   1 k ˘ 1 i 1 ,   ( p 2 k ˘ 2 , a 1 ) , ( p 2 k ˘ 2 , a 3 ) , ( p 2 k ˘ 2 , a 4 ) , , ( p 2 k ˘ 2 , a r ) ,   w h e r e   1 k ˘ 2 i 2 ,   ( p 3 k ˘ 3 , a 1 ) , ( p 3 k ˘ 3 , a 2 ) , ( p 3 k ˘ 3 , a 4 ) ,   , ( p 3 k ˘ 3 , a r ) ,   w h e r e   1 k ˘ 3 i 3 , ,   ( p r 1 k ˘ r 1 , a 1 ) , ( p r 1 k ˘ r 1 , a 2 ) , ( p r 1 k ˘ r 1 , a 3 ) , , ( p r 1 k ˘ r 1 , a r ) ,   w h e r e   1 k ˘ r 1 i r 1 ,   a n d   ( p r k ˘ r , a 1 ) , ( p r k ˘ r , a 2 ) , ( p r k ˘ r , a 4 ) , , ( p r k ˘ r , a r ) , where 1 k ˘ r i r }.

4. Encryption Procedure

Input: N P L :   x 11 x 12 x 13 x 1 i 1 x 21 x 22 x 23 x 2 i 2 x r 1 x r 2 x r i r where N P L > 0 .
Output: Cipher graph F G N s .
Step 1: Let the numerical plaintext N P L be x 11 x 12 x 13 x 1 i 1 / x 21 x 22 x 23 x 2 i 2 / / x r 1 x r 2 x r i r , where k and ir are positive integers.
Partition the N P L as M 1 = x 11 x 12 x 13 x 1 i 1 , M 2 = x 21 x 22 x 23 x 2 i 2 , M 3 = x 31 x 32 x 33 x 3 i 3 , …, and M r = x r 1 x r 2 x r i r . Using M 1 = x 11 x 12 x 13 x 1 i 1 , the first sub network is constructed.
Step 2: For M 1 , choose P 11 ,   P 12 , P 13 , , P 1 l 1 , (where l < i) and all are prime numbers (if preferred, choose the number P 1 s 1 , where 1 s 1 l 1 , and it may be one digit or two digits or something else).
For M 2 , choose P 21 ,   P 22 , P 23 , , P 2 l 2 , (where l < i) and all are prime numbers (if preferred, choose the number P 2 s 2 , where 1 s 2 l 2 , and it may be one digit or two digits or something else). Proceeding to M k , choose P r 1 ,   P r 2 , P r 3 , , P r l r , (where l < i) and all are prime numbers (if preferred, choose the number P r s r , where 1 s r l r , and it may be one digit or two digits or something else).
Step 3: Let N 1 =   P 11     P 12 P 1 l 1 , such that N 1 > M 1 . Let ξ 1 N 1 =   ( P 11 1 )     ( P 12 1 ) ( P 1 l 1 1 ) . By using the RSA algorithm, find suitable e 1 and d 1 such that d 1 e 1 , which is congruent to 1 mod ( ξ 1 N 1 ) . Compute the encrypted message C 1 M 1 e 1 ( m o d N 1 ) , which corresponds to M 1 . Let N 2 =   P 21     P 22 P 2 l 2 , such that N 2 > M 2 . Let ξ 1 N 2 =   ( P 21 1 )     ( P 22 1 ) ( P 2 l 2 1 ) . By using the RSA algorithm, find suitable e 2 and d 2 such that d 2 e 2   1 mod ( ξ 1 N 2 ) .
Compute the encrypted message C 2   M 2 e 2   ( m o d   N 2 ) , which corresponds to M 2 . Continue this until the last value is calculated.
Let N k =   P r 1     P r 2 P r l r , such that N k > M k . Let ξ 1 N k =   ( P r 1 1 )     ( P r 2 1 ) ( P r l r 1 ) . By using the RSA algorithm, find suitable e k and d k such that d k e k 1 mod ( ξ 1 N k ) . Compute the encrypted message C k M k e k   m o d N k .
Step 4: Using triangular fuzzy membership functions, convert C 1 into a triangular fuzzy number, say F 1 . Then, the fuzzy number Ψ F 1 is as follows:
Ψ ( F 1 )   =   0   i f   x 1 < r 1 x 1 r 1 s 1 r 1     i f   r x 1 s 1 t 1 x 1 t 1 s 1   i f   s 1 x 1 t 1 0   i f   x 1 > t 1 .
Let F 1 = F 11 + F 12 + F 13 + + F 1 i 1 . Using triangular fuzzy membership functions, convert C 2 into a triangular fuzzy number, say F 2 . Let F 2   =   F 21 + F 22 + F 23 + + F 2 i 2 . Continuing this until the last value is calculated, using triangular fuzzy membership functions, convert C k into a triangular fuzzy number, say F k . Let F r   =   F r 1 + F r 2 + F r 3 + + F r i r .
Step 5: Fuzzy graph sub network construction F G N s 1 : Let the nodes of F G N s 1 be a 1 , p 11 , p 12 , p 13 , p 14 , p 15 , p 16 such that distance between a 1 and p 1 k ˘ 1 = 1 , where 1 k ˘ 1 i 1 . The N M V s of a 1 , p 11 , p 12 , p 13 , p 14 , p 15 , p 16 are given by F 1 a , F 11 ,   F 12 , F 13 , , F 1 i 1 , respectively. The E M V   ( a 1 , p 11 ) = min( F 1 a , F 11 ) ,   E M V ( a 1 , p 12 ) = min ( F 1 a , F 12 ) , a n d   E M V a 1 , p 13 = min ( F 1 a , F 13 ) , , and the E M V of a 1 and p 1 i 1 is a minimum of ( a 1 , p 1 i 1 ) , where 1 k 2 i 2 .
Fuzzy graph sub network construction F G N s 2 : Let the nodes of F G N s 2 be a 2 , p 21 , p 22 , p 23 , , p 2 i 2 such that the distance between a 2 and p 2 k 2 = 1 , where 1 k 2 i 2 . The N M V s of a 2 , p 21 , p 22 , p 23 , , p 2 i 2 are F 2 a , F 21 , F 22 , F 23 , , F 2 i 2 , respectively. The E M V of   a 2   and p 2 k 2 is a minimum of ( a 2 , p 2 k 2 ) , ,   a n d the E M V of a 2 and p 2 i 2 is a minimum of ( a 2 ,   p 2 i 2 ) , where 1 k 2 i 2 .
Fuzzy graph sub network construction F G N s r : Let the nodes of F G N s r be a r , p r 1 , p r 2 , p r 3 , , p r i r such that the distance between a r and p r i r = 1, where 1 k r i r . The N M V s of a r , p r 1 , p r 2 , p r 3 , , p r i r are F r a , F r 1 , F r 2 , F r 3 , , F r i r , respectively. The E M V s of a r and p r i r are a minimum of ( a r , p r i r ), where 1 i r k r . The E M V s of the rest of the constructed edges follow the definition of F G N s . The nodes a 1 , a 2 , a 3 , , a r are the centers of F G N s 1 ,   F G N s 2 , …   , F G N s r . They are members of the efficient dominating set E D S of the F G N s .
End

5. Decryption Procedure

Input: Cipher graph F G N s .
Output: x 11 x 12 x 13 x 1 r x 21 x 22 x 23 x 2 r x 31 x 32 x 33 x 3 r x 41 x 42 x 43 x 4 r x r 1 x r 2 x r r .
Begin
Step 1: Determine the E D S   a 1 , a 2 , a 3 , , a r of F G N s , whose N M V s are denoted by F 1 a , F 2 a F 3 a , , F r a .
Step 2: Let the membership values of triangular fuzzy number of C 1 ,   C 2 , C 3 , C 4 , , C r be Ψ ( F 1 ) , Ψ ( F 2 ) ,   Ψ ( F 3 ) Ψ ( F r ) and its triplet parameters are given as < r 1 , s 1 , t 1 > , < r 2 , s 2 , t 2 > , < r 3 , s 3 , t 3 > , , < r r , s r , t r > , respectively.
Step 3: Let the triangular fuzzy number of C 1   be < r 1 , s 1 , t 1 > and its range be s 1 r 1 = R 1 , meaning r 1 = s 1 { R 1 Ψ ( F 1 ) } , and likewise, find t 1 . Continue this for C r ,   whose triangular triplets are < r r , s r , t r > and its range is s r r r = R r , meaning r r = s r R r Ψ ( F r ) , and likewise, find t r . Similarly, find the values of s 2 , s 3 , , s r from F 2 , F 3 , , F r , respectively.
Step 4: By using the RSA algorithm, obtain M 1 while decrypting s 1 using M 1 C 1 d 1 (mod N 1 ) . Obtain M 2 while decrypting s 2 using M 2 C 2 d 2 (mod N 2 ) and continue this until the last value is obtained, and obtain M r while decrypting s r using M r C r d r (mod N r ) .
Step 5: Concatenate the values M 1 M 2 M 3 M r , which gives the N P L .

6. Illustration

Step 1: Let the numerical plaintext N P L   x 11 x 12 x 13 x 18 x 21 x 22 x 23 x 28 x 31 x 32 x 33 x 36 x 41 x 42 x 43 x 49 x 51 x 52 x 55 be 11,985,920/21,450,625/245,394/149,528,879/77,343.
Divide the N P L into components M 1 , M 2 , M 3 , M 4 , a n d   M 5 .
Let M 1 = x 11 x 12 x 13 x 18 = 11,985,920, M 2 = x 21 x 22 x 23 x 28 = 21,450,625, M 3 = 245,394, M 4 = 149,528,879, and M 5 = 77,343.
Step 2: Using M 1 = x 11 x 12 x 13 x 18 , the first sub network F G N s 1 is constructed. An illustration of F G N 1 is given in Figure 2. Let the nodes of F G N s 1 be a 1 ,   p 11 , p 12 , p 13 , , p 16 such that the distance between a 1 and p 1 k ˘ 1 = 1 , where 1 k ˘ 1 6 .
Let G = ( V , υ, ω) be a graph. Subset D V is an efficient dominating set if v V , |{ u D | v N u | = 1 , where N u denotes the neighboring vertices of u . The N M V s of a 1 , p 11 , p 12 , p 13 , , p 16 are given by F 1 a , F 11 , F 12 , F 13 , , F 16 respectively. The E M V of a 1 , p 11 = min ( F 1 a , F 11 ) ,   E M V   o f   ( a 1 , p 12 ) = m i n F 1 a , F 12 ,   E M V of a 1 , p 13 = min ( F 1 a , F 13 ) ,…, and E M V   o f   ( a 1 , p 16 )   = min ( F 1 a , F 16 ) , respectively.
Step 3: Using M 2 = x 21 x 22 x 23 x 28 , the second sub network F G N s 2 is constructed. Let the nodes of the F G N s 2 be a 2 , p 21 , p 22 , p 23 , , p 26 such that the distance between a 2 and p 2 k ˘ 2 = 1 , where 1 k ˘ 2 6 . The N M V s of a 2 , p 21 , p 22 , p 23 , , p 26 are F 2 a , F 21 , F 22 , F 23 , , F 26 , respectively. The E M V of ( F 2 a , F 21 ) = min ( F 2 a , F 21 ) , E M V of ( F 2 a , F 22 ) = m i n ( F 2 a , F 22 ) , E M V of ( F 2 a , F 23 ) = m i n ( F 2 a , F 23 ) , …, and E M V of ( F 2 a , F 26 ) = m i n ( F 2 a , F 26 ) , respectively.
Step 4: Similarly, construct F G N s 3 ,   F G N s 4 , F G N s 5 . Using x 51 x 52 x 55 , the fifth sub network F G N s 5 is constructed. Let the nodes of F F G N s 5 be a 5 , p 51 ,   p 52 , p 53 , , p 55 such that the distance between a 5 and p 55 = 1 , where 1 k ˘ 5 i 5 . The N M V s of a 5 , p 51 , p 52 , p 53 , , p 55 are F 5 a , F 51 , F 52 , F 53 , F 53 , F 55 , respectively. The E M V of ( F 5 a , p 51 ) = m i n ( F 5 a , p 51 ) , E M V of ( F 5 a , p 52 ) = min ( F 5 a , p 52 ) , E M V of ( F 5 , p 53 ) = min ( F 5 a , p 53 ) , …, and E M V   o f   ( F 5 a , F r 5 ) = m i n ( F 5 a , p 55 ) , respectively.
Step 5: The E M V of the rest of the constructed edges follows the definition of F G N s .   Let a 1 , a 2 , a 3 , , a 5 be the nodes of the efficient dominating set, which have N M V s that are F 1 a , F 2 a F 3 a , , F 5 a . Construct the network F G N s using F G N s 1 , F G N s 2 , , F G N s 5 as follows. The node set of F G N s is V F G N s = { a 1 , a 2 , a 3 , a 4 , a 5 } { p 1 k ˘ 1 , p 2 k ˘ 2 , p 3 k ˘ 3 , p 4 k ˘ 4 , p 5 k ˘ 5 } where 1 k ˘ 1 6 , 1 k ˘ 2 6 , 1 k ˘ 3 7 , 1 k ˘ 4 5 , 1 k ˘ 5 5 . The number of nodes present in F G N s is 5 + 6 + 6 + 7 + 5 + 5 = 34 . The minimum number of edges required for F G N s is calculated as follows.
Define E 1 = { ( p 1 k ˘ 1 , p 2 k ˘ 2 ) , ( p 2 k ˘ 2 p 3 k ˘ 3 ) , ( p 3 k ˘ 3 , , p 4 k ˘ 4 ) , , ( p 4 k ˘ 4 , p 5 k ˘ 5 ) } for only one 1 k ˘ 1 6 , 1 k ˘ 2 6 , 1 k ˘ 3 7 , 1 k ˘ 4 5 , 1 k ˘ 5 5 .   E 2 = { ( a 1 , p 1 k ˘ 1 ) , ( a 2 , p 2 k ˘ 2 ) , ( a 3 , p 3 k ˘ 3 ) , , ( a r , p r k ˘ r ) } where 1 k ˘ 1 6 , 1 k ˘ 2 6 , 1 k ˘ 3 7 , 1 k ˘ 4 5 , 1 k ˘ 5 5 .
The minimum number of edges required for F G N s is E M i n = E 1     E 2 .
Step 6: The maximum number of edges required for F G N s is E M a x = ( 5 + 6 + 6 + 7 + 5 + 5 ) C 2     { ( p 1 k ˘ 1 , a 2 ) , ( p 1 k ˘ 1 , a 3 ) , ( p 1 k ˘ 1 , a 4 ) , , ( p 1 k ˘ 1 , a 5 ) , where 1 k ˘ 1 6 , ( p 2 k ˘ 2 , a 1 ) , ( p 2 k ˘ 2 , a 3 ) , ( p 2 k ˘ 2 , a 4 ) , ( p 2 k ˘ 2 , a 5 ) ,   where   1     k ˘ 2 6 , ( p 3 k ˘ 3 , a 1 ) , ( p 3 k ˘ 3 , a 2 ) , ( p 3 k ˘ 3 , a 4 ) , ( p 3 k ˘ 3 , a 5 ) ,   w h e r e   1     k ˘ 3 7 , ( p 4 k ˘ 4 , a 1 ) , ( p 4 k ˘ 4 , a 2 ) , ( p 4 k ˘ 4 , a 3 ) , ( p 4 k ˘ 4 , a 5 ) ,   w h e r e   1     k ˘ 4 5 , and ( p 5 k ˘ 5 , a 1 ) , ( p 5 k ˘ 5 , a 2 ) , ( p 5 k ˘ 5 , a 3 ) , ( p 5 k ˘ 5 , a 4 ) w h e r e   1     k ˘ 5 5 } .
(i)
Encryption Algorithm
Input: Numerical plaintext
x 11 x 12 x 13 x 18 x 21 x 22 x 23 x 28 x 31 x 32 x 33 x 36 x 41 x 42 x 43 x 49 x 51 x 52 x 55 , which are all positive integers.
Output: Cipher graph F G N s .
Begin
Step 1: Let the numerical plaintext N P L be 11,985,920/21,450,625/245,394/149,528,879/77,343. Divide the N P L into components M 1 , M 2 ,   M 3 , M 4 , M 5 , respectively, where M 1 = 11,985,920, M 2 = 21,450,625, M 3 = 245,394, M 4 = 149,528,879, and   M 5 = 77,343.
Step 2: Consider M 1 = 11,985,920. M 1 is encrypted using the RSA algorithm. Let us consider the prime numbers P 11 = 53,   P 12 = 59 ,     P 13 = 79 ,     a n d   P 14 = 89   (it may be two digits or three digits). N 1 =   P 11     P 12 P 12 P 14 = 21,985,937, such that N 1 > M 1 .
Step 3: Let the function ξ 1 N 1 =   ( P 11 1 )   ( P 12 1 ) ( P 13 1 ) ( P 14 1 )   =   52   58 78 88 =   20,701,824 .
Step 4: Find suitable e 1 and d 1   such that d 1     e 1 , which is congruent to 1 mod ( ξ 1 N 1 ) , and find the encrypted message that says M 1 C 1 d 1 (mod N 1 ) , which corresponds to M 1 . Find a suitable e 1 , where 1 < e 1 < ξ 1 N 1 such that gcd( e 1 , ξ 1 N 1 )   =   1 . Let e 1 = 65,537 .
Step 5: Find d 1 , such that d 1 e 1 1 mod ( ξ 1 N 1 ) . d 1 = 8,606,465. Now, let the cipher integer C 1 = M 1 e 1 mod N 1 = 7,517,755.
Step 6: Convert C 1 into a triangular fuzzy number, say F 1   =   < r 1 , s 1 , t 1 > , and let its range be s 1 r 1 = R 1 , meaning r 1 = s 1 { R 1 Ψ ( F 1 ) } , and likewise, find t 1 . For the x value, choose any number between < r 1 , t 1 > and then the fuzzy number.
Step 7: Let the triangular fuzzy number of C 1 be < r 1 , s 1 , t 1 > and its range be s 1 r 1 = R 1 , meaning r 1 = s 1 { R 1 Ψ ( F 1 ) } , and likewise, find t 1 . Let F 1 = F 11 + F 12 + F 13 + + F 16 . Convert the cipher integer to TFNs < r 1 , s 1 , t 1 > . For the x value, choose any number between < r 1 , t 1 > . Then, the fuzzy number Ψ ( F 1 ) is as follows:
Ψ ( F 1 ) = 0   i f   x 1 < r 1 x 1 r 1 s 1 r 1     i f   r x 1 s 1 t 1 x 1 t 1 s 1   i f   s 1 x 1 t 1 0   i f   x 1 > t 1 .
Here, the cipher graph C 1 = 7,517,755 is given as < r 1 , s 1 , t 1 > , where r 1 = 7,492,212 ,   s 1 = 7,517,755 and t 1 = 7,543,298 and its range is R 1 = 25,543 .
Let x 1 = 7,519,755 .   Ψ F 1 = t 1 x 1 t 1 s 1 s 1 x 1 t 1
Ψ F 1 = 0.92
Step 8: Now, Ψ F 1 is split into six parts and assigned as a membership value for the vertices of the network, as in Table 2. F 1 = 0.1536 + 0.1536 + 0.1532 + 0.1532 + 0.1021 + 0.2043 .
Step 9: Let the nodes of F G N s 1 be a 1 , p 11 , p 12 , p 13 , p 14 , p 15 , p 16 such that the distance between a 1 and p 1 k ˘ 1 is equal to 1, where 1 k ˘ 1 i 1 . The N M V s of a 1 , p 11 , p 12 , p 13 , p 14 , p 15 , p 16 are given by F 1 a , F 11 , F 12 , F 13 , , F 1 i 1 , respectively. The E M V of ( a 1 , p 11 ) = min ( F 1 a , F 11 ) ,   E M V   o f   ( a 1 , p 12 ) = min ( F 1 a , F 12 ) , E M V of a 1 , p 13 = min ( F 1 a , F 13 ) , …, and E M V   o f   ( a 1 , p 16 ) = min ( F 1 a , F 16 ) , respectively, as in Table 3.
Step 10: Similarly, construct F G N s 2 , F G N s 3 , F G N s 4 , F G N s 5 from M 2 = 21,450,625, M 3 = 245,394, M 4 = 149,528,879, and M 5 = 77,343, respectively.
Step 11: Now, the networks F G N s 1 , F G N s 2 , F G N s 3 , F G N s 4 , F G N s 5 are connected using edges from set E 1   t o   c o n s t r u c t   t h e   network F G N (Figure 3), where E 1 = { ( p 1 k ˘ 1 , p 2 k ˘ 2 ) , ( p 2 k ˘ 2 p 3 k ˘ 3 ) , ( p 3 k ˘ 3 , , p 4 k ˘ 4 )   , ( p 4 k ˘ 4 , , p 5 k ˘ 5 )   } for only one 1 k ˘ 1 6 ,   1 k ˘ 2 6 ,   1 k ˘ 3 7 ,   1 k ˘ 4 5 ,   1 k ˘ 5 5 .   The E M V of the above constructed edges follows from the definition of F G N s . Let a 1 , a 2 , a 3 , a 4 ,   a 5 be the nodes of the E D S , which have N M V s F 1 a , F 2 a F 3 a , F 4 a , F 5 a .
Step 12: The network is expanded by adding additional edges, as in Figure 4, while adhering to the given constraints, resulting in a moderately connected structure as in Table 4.
Step 13: The maximum number of edges required for F G N is E M a x = ( 5 + 6 + 6 + 7 + 5 + 5 )C2 − { ( p 1 k ˘ 1 , a 2 ) , ( p 1 k ˘ 1 , a 3 ) , ( p 1 k ˘ 1 , a 4 ) , ( p 1 k ˘ 1 , a 5 ) , where 1 k ˘ 1 6 , ( p 2 k ˘ 2 , a 1 ) , ( p 2 k ˘ 2 , a 3 ) , ( p 2 k ˘ 2 , a 4 ) , ( p 2 k ˘ 2 , a 5 ) ,   where   1     k ˘ 2 6 , ( p 3 k ˘ 3 , a 1 ) , ( p 3 k ˘ 3 , a 2 ) , ( p 3 k ˘ 3 , a 4 ) , ( p 3 k ˘ 3 , a 5 ) ,   w h e r e   1     k ˘ 3 7 , ( p 4 k ˘ 4 , a 1 ) , ( p 4 k ˘ 4 , a 2 ) , ( p 4 k ˘ 4 , a 4 ) , ( p 4 k ˘ 4 , a 5 ) ,   w h e r e   1     k ˘ 4 5 , and ( p 5 k ˘ 5 , a 1 ) , ( p 5 k ˘ 5 , a 2 ) , ( p 5 k ˘ 5 , a 4 ) , ( p 5 k ˘ 5 , a 5 ) w h e r e   1     k ˘ 5 5 } .
This is shown in F G N s M a x ,  Figure 5.
End.
(ii)
Decryption Algorithm
Input: Cipher graph F G N s .
Output: x 11 x 12 x 13 x 18 x 21 x 22 x 23 x 28 x 31 x 32 x 33 x 36 x 41 x 42 x 43 x 49 x 51 x 52 x 55 .
Begin
Step 1: Determine the E D S   a 1 , a 2 , a 3 , , a 5 of F G N s . whose N M V s are denoted by F 1 a , F 2 a F 3 a , , F 5 a .
Step 2: Let the membership values of the triangular fuzzy number of C 1 ,   C 2 , C 3 ,   C 4 ,   a n d   C 5 be Ψ ( F 1 ) , Ψ ( F 2 ) ,   Ψ ( F 3 ) , Ψ ( F 4 ) ,   a n d   Ψ ( F 5 ) and its triplet parameters are given as < r 1 , s 1 , t 1 > , < r 2 , s 2 , t 2 > , < r 3 , s 3 , t 3 > , < r 4 , s 4 , t 4 >   ,   a n d   < r 5 , s 5 , t 5 > , respectively.
Step 3: Let the triangular fuzzy number of C 1 be < r 1 , s 1 , t 1 > and its range be s 1 r 1 = R 1 , meaning r 1 = s 1 { R 1 Ψ ( F 1 ) } , and likewise, find t 1 .
Ψ ( x 1 ) = F 1 × R 1 t 1 s 1   where   t 1 s 1 = R 1
7,543,298 s 1 = 25,543 ,   s 1 = 7,517,755
Similarly, find the values of s 2 , s 3 , s 4 , s 5 from F 2 , F 3 , F 4 , F 5 , respectively.
Step 4: By using the RSA algorithm, obtain M 1 while decrypting s 1 using M 1 C 1 d 1 (mod N 1 ) .
M 1 7,517,755 8,606,465 ( mod   21,985,937 ) = 11,985,920 .
Likewise, obtain M 2 while decrypting s 2 using M 2 C 2 d 2 (mod N 2 ) and continue this until the last value is obtained, and obtain M 5 while decrypting s 5 using M 5 C 5 d 5 (mod N 5 ) .
Step 5: Concatenate values M 1 M 2 M 3 M 5 to obtain the N P L .
  11,985,920 / 21,450,625 / 245,394 / 149,528,879 / 7734

7. Comparative Study

Cryptographic encryption methods are essential to protect data from unauthorized access. Conventional techniques like RSA and AES have been extensively employed, while hybrid techniques use more than one encryption method for better security. This research compares the available methods with the new encryption method proposed in this research, using the RSA algorithm, fuzzy logic, and graph-based transformations to offer a highly secure and efficient cryptographic system. The encryption techniques are assessed on the basis of the following four crucial criteria’s namely security strength, computational efficiency, resistance to attacks and complexity. The comparative assessment, as represented in the graph (Figure 6) and Table 5, reflects the following:
RSA Encryption: Though popular, RSA has less security and resistance to attacks but it is computationally intensive.
AES Encryption: It offers greater security and efficiency than RSA and is thus best for rapid encryption but vulnerable to quantum attacks.
Hybrid (RSA + AES): It provides a well-balanced trade-off between efficiency and security, improving resistance against attacks.
Proposed Method: It outperforms all other current methods, with better security and attack resistance without compromising computational efficiency. Fuzzy logic combined with graph-based encryption provides a greater level of complexity, and therefore, decryption is very difficult for an unauthorized user.

8. Flowchart

This workplan outlines a multi layer encryption process where a very large numerical plaintext is encrypted in structured steps and then converted into a complex fuzzy graph network. A flowchart is essential to visualize each stage from plaintext to ciphertext and finally back to plaintext in decryption. The flowchart is given in Figure 7.

9. Applications in Secure Cloud Storage and Access Control

Cloud computing has emerged as the core infrastructure for the storage of data and delivery of services, but the open and distributed nature of cloud computing poses great challenges to security-sensitive information. Classical security systems tend to bank on static access control and binary authentication, which can be inadequate to manage the dynamic and contextual nature of user access in today’s cloud computing environment. The fuzzy graph-based model proposed here overcomes these shortcomings by combining RSA encryption, effective domination in graph theory, and fuzzy logic to create an adaptive and robust security system.
How the Working Model Operates in a Cloud Scenario:
(i)
RSA for Data Privacy and Authentication: The entire sensitive information kept in the cloud is encrypted with the help of RSA, so even if storage is hacked, the data cannot be read without the private key. RSA also facilitates secure key exchange and digital signatures, enabling both cloud service providers and users to authenticate each other.
(ii)
Efficient Domination for Fine-Tuned Access Control Structures: The cloud infrastructure can be modeled as a graph in which the nodes are either users, devices, or access points and the edges are communication or control relationships. Using efficient domination, the system is able to determine a minimum subset of key control points (dominating nodes) that are capable of monitoring and controlling access across the network. This minimizes redundancy, decreases overhead, and provides efficient monitoring and policy enforcement.
(iii)
Fuzzy Logic for Context-Aware Access Decisions: In contrast to static access control systems, the fuzzy logic module presents triangular fuzzy membership functions to analyze contextual variables such as the following: access time (e.g., working hours vs. non-working hours), geography (e.g., familiar vs. unfamiliar IPs), user activity (e.g., frequent vs. suspicious usage) and device trust level (e.g., personal vs. public device).
Given these fuzzy inputs, the system allocates access permissions on a graded basis (e.g., full access, reduced access, or denial), enhancing flexibility without sacrificing security.
Advantages of the Model in Cloud Environments
(i)
Dynamic Access Control: Access decisions are taken dynamically according to contextual information, enhancing responsiveness to threats or anomalies.
(ii)
Resource Optimization: Efficient domination decreases the workload by minimizing the nodes that need to actively control access and security enforcement.
(iii)
Greater Resilience: The hybrid model incorporates additional layers of security—cryptographic strength provided by RSA, structural optimization by graph theory, and flexibility by fuzzy logic.
(iv)
Improved User Experience: Legitimate users stand less chance of denial of access because of strict rules since the fuzzy system checks intent and context more astutely.
This model demonstrates that the suggested fuzzy graph network model provides a big improvement over standard access control and encryption methods used in cloud computing. It can provide both secure protection of information and intelligent management of access and is particularly best suited for conditions where flexibility, scalability, and real-time decisions are needed.

10. Possible Attack Vectors of the Proposed Model

Although the model proposed here is an innovative blend of RSA, efficient domination, and fuzzy logic used to improve security, it is important to keep in mind possible attack surfaces that could threaten system integrity. The detection of these vulnerabilities aids in making the model more resilient and consistent with typical threat models used in cryptography.
  • Chosen-Cipher Text Attack: An attacker presents a decryption oracle with random cipher texts to obtain respective plaintexts, potentially exposing patterns or secret keys.
  • Graph Theoretic Structural Attacks: Efficient domination determines key nodes in a graph. If the attacker can determine and take out these dominating nodes, they can potentially achieve higher-level access or interfere with communication channels.
  • Fuzzy Inference Manipulation: Attackers can take advantage of the fuzzy logic layer by providing specially designed input values to control decision outputs (e.g., gain unauthorized access via marginal input conditions).

11. Conclusions

This research provides a solid mathematical framework for the protection of communication systems by combining fuzzy graph networks, efficient domination, and RSA. The suggested model increases security using the intractability of the prime factorization in RSA and improving resource consumption with efficient domination within fuzzy graphs. Through the addition of triangular fuzzy membership functions, the system provides an extra level of complexity to unauthorized decryption, rendering it very difficult. Hence, this approach guarantees a very secure and computation-friendly cryptographic form, reinforcing the confidentiality and integrity of data within contemporary networks of communication.

Key Takeaways

  • The model merges RSA, fuzzy logic, and graph theory for better security.
  • It incorporates efficient domination in fuzzy graphs for additional structural complexity.
  • It scales well with key size and sub-network design.
  • It is most appropriate for high-security data transmissions.
  • It is no longer quantum-resistant, but additional layers provide added protection.
  • It is flexible for future expansion with post-quantum methods.

Author Contributions

Conceptualization, A.M. and G.M.; data curation, J.K. and G.A.; formal analysis, A.M. and H.R.; investigation, A.M. and G.M.; methodology, J.K. and G.A.; supervision, G.M.; visualization, J.K. and G.M.; writing—original draft, A.M. AMD G.A.; writing—review and editing, A.M., G.M. and H.R. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

No new data were created or analyzed in this study. Data sharing is not applicable to this article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Zadeh, L.A. Fuzzy sets. Inf. Control 1965, 8, 338–353. [Google Scholar] [CrossRef]
  2. Bondy, J.A.; Murthy, U.S.R. Graph Theory with Applications; American Elsevier Publishing Co.: New York, NY, USA, 1976. [Google Scholar]
  3. Ore, O. Theory of Graphs; American Mathematical Society: Providence, RI, USA, 1962. [Google Scholar]
  4. Haynes, T.W.; Slater, P.J. Paired Domination in graphs. Networks 1998, 32, 199–206. [Google Scholar] [CrossRef]
  5. Biggs, N. Perfect codes in graphs. J. Combin. Theory Ser. B 1973, 15, 289–296. [Google Scholar] [CrossRef]
  6. Kulli, V.R. Theory of Domination in Graphs; Vishwa International Publications: Akkalkot, India, 2012. [Google Scholar]
  7. Kulli, V.R.; Janakiram, B. The split domination number of a graph. Graph Theory Notes N. Y. 1997, 32, 16–19. [Google Scholar]
  8. Kulli, V.R.; Patwari, D.K. Total efficient domination in graphs. Int. Res. J. Pure Algebra 2016, 6, 227–232. [Google Scholar]
  9. Cockayne, E.J.; Hedetniemi, S.T. Towards a Theory of Domination in Graphs. Networks 1977, 7, 247–261. [Google Scholar] [CrossRef]
  10. Meenakshi, A.; Baskar Babujee, J. Paired equitable Domination in Graphs. Int. J. Pure Appl. Math. 2016, 109, 75–81. [Google Scholar]
  11. Kwon, Y.S.; Lee, J.; Sohn, M.Y. Classification of efficient dominating sets of circulant graphs of degree 5. Graphs Comb. 2022, 38, 120. [Google Scholar] [CrossRef]
  12. Somasundram, A.; Somasundram, S. Domination in Fuzzy Graphs-I. Pattern Recognit. Lett. 1998, 19, 787–791. [Google Scholar] [CrossRef]
  13. Nagoorgani, A.; Chandrsekaran, V.T. Domination in Fuzzy Graph. Adv. Fuzzy Sets Syst. 2006, 1, 17–26. [Google Scholar]
  14. Atanassov, K.T. Intutionistic Fuzzy Set Theory and Applications Physica; Springer: New York, NY, USA, 1999. [Google Scholar]
  15. Enriquez, E.; Estrada, G.; Loquias, C.; Bacalso, R.J.; Ocampo, L. Domination in fuzzy directed graphs. Mathematics 2021, 9, 2143. [Google Scholar] [CrossRef]
  16. Karunambigai, M.G.; Parvathi, R.; Bhuvaneswari, R. Constant Intuitionistic Fuzzy graphs. Notes Intuitionistic Fuzzy Sets 2011, 17, 37–47. [Google Scholar]
  17. Pius, A.; Kirubaharan, D.R. Application of cryptography in data privacy using fuzzy graph theory. J. Discrete Math. Sci. Cryptogr. 2021, 24, 2389–2401. [Google Scholar] [CrossRef]
  18. Wang, D.; Yi, F.; Li, X.; Luo, P.; Dai, Y. On the analysis and generalization of extended visual cryptography schemes. arXiv 2006, arXiv:cs/0610172. [Google Scholar]
  19. Meenakshi, A.; Kannan, A.; Cep, R.; Elangovan, M. Efficient Graph Network Using Total Magic Labeling and Its Applications. Mathematics 2023, 11, 4132. [Google Scholar] [CrossRef]
  20. Meenakshi, A.; Mythreyi, O.; Mrsic, L.; Kalampakes, A.; Samanta, S. A fuzzy hypergraph based framework for secure encryption and decryption of sensitive messages. Mathematics 2025, 13, 1049. [Google Scholar] [CrossRef]
  21. Wu, Q.; Lu, J. A secure model based on hypergraph in multilayer and multi-domain intelligent optical network. In Proceedings of the Wireless Communications, Networking and Applications: Proceedings of WCNA, Shenzhen, China, 27–28 December 2014; Springer: New Delhi, India, 2016; pp. 35–40. [Google Scholar]
  22. Kosari, S.; Qiang, X.; Ain, J.K.Q.; Rashmanlou, H. A Study on Topological Indices in Fuzzy Graphs with Application in Decision Making Problems. J. Mult.-Valued Log. Soft Comput. 2024, 42, 567–589. [Google Scholar]
  23. Meenakshi, A.; Dhanushiya, S.; Mythreyi, O.; Mishra, J.S. Enhancing Multicriteria Decision-Making through Cryptographic Security Systems. In Multi-Criteria Decision-Making and Optimum Design with Machine Learning; CRC Press: Boca Raton, FL, USA, 2024; pp. 224–232. [Google Scholar]
  24. Shao, Z.; Kosari, S.; Shoaib, M.; Rashmanlou, H. Certain concepts of vague graphs with applications to medical diagnosis. Front. Phys. 2020, 8, 357. [Google Scholar] [CrossRef]
  25. Shi, X.; Kosari, S.; Talebi, A.A.; Sadati, S.H.; Rashmanlou, H. Investigation of the main energies of picture fuzzy graph and its applications. Int. J. Comput. Intell. Syst. 2022, 15, 31. [Google Scholar] [CrossRef]
  26. Romdhini, M.U.; Al-Sharqi, F.; Nawawi, A.; Al-Quran, A.; Rashmanlou, H. Signless Laplacian energy of interval-valued fuzzy graph and its applications. Sains Malays. 2023, 52, 2127–2137. [Google Scholar] [CrossRef]
Figure 1. F G N s 1 .
Figure 1. F G N s 1 .
Axioms 14 00392 g001
Figure 2. Illustration o f   F G N s 1 .
Figure 2. Illustration o f   F G N s 1 .
Axioms 14 00392 g002
Figure 3. F G N s .
Figure 3. F G N s .
Axioms 14 00392 g003
Figure 4. Network with moderate edges.
Figure 4. Network with moderate edges.
Axioms 14 00392 g004
Figure 5. F G N s ( M a x ) .
Figure 5. F G N s ( M a x ) .
Axioms 14 00392 g005
Figure 6. Comparison of cryptographic methods.
Figure 6. Comparison of cryptographic methods.
Axioms 14 00392 g006
Figure 7. Multi-layer encryption and decryption framework using RSA and fuzzy graph networks.
Figure 7. Multi-layer encryption and decryption framework using RSA and fuzzy graph networks.
Axioms 14 00392 g007
Table 1. Glossary.
Table 1. Glossary.
SymbolDescription
G = ( V , υ , ω)Fuzzy graph, where V is the vertex set.
υ ( x i )Fuzzy membership value of vertex x i , where υ: V →[0, 1].
ω ( x i , x j ) Fuzzy membership (edge weight) between vertices x i and   x j , where ω V × V →[0, 1].
D V Dominating set in fuzzy graph.
M 1 , M 2 , , M k Components split from plaintext.
F G N s 1 , F G N s 2 , …, F G N s r Sub networks constructed from each component after encryption process.
x 11 , x 12 , , x 1 i Vertices in the sub network 1, typically used to denote neighbors or elements in subset relations.
F G N Fuzzy graph network.
F G N s Strong fuzzy graph network.
e , n RSA encryption exponent and modulus, respectively.
d RSA decryption exponent.
N P L Numerical plaintext message.
C Cipher text obtained after encryption.
a 1 , a 2 , a 3 , , a r Efficient dominating nodes of complex network.
p 11 , p 12 , , p 1 r Neighboring vertices of efficient dominating nodes.
F 11 , F 12 , F 13 , , F 1 r Node membership values of sub network.
P 11 , P 12 , , P 1 n Prime numbers chosen for RSA encryption.
< r , s , t > Triangular fuzzy numbers.
Ψ ( F r ) Membership values of triangular fuzzy number.
Table 2. N M V of F G N s .
Table 2. N M V of F G N s .
Nodes N M V Nodes N M V Nodes N M V Nodes N M V Nodes N M V
a 1 0.1 a 2 0.02 a 3 0.01 p 37 0.026 a 5 0.01
p 11 0.1536 p 21 0.2013 p 31 0.015 a 4 0.01 p 51 0.026
p 12 0.1536 p 22 0.031 p 32 0.002 p 41 0.0998 p 52 0.026
p 13 0.1532 p 23 0.031 p 33 0.0084 p 42 0.12475 p 53 0.0193
p 14 0.1532 p 24 0.0372 p 34 0.0105 p 43 0.1663 p 54 0.0193
p 15 0.1021 p 25 0.0465 p 35 0.0042 p 44 0.3036 p 55 0.0386
p 16 0.2043 p 26 0.025 p 36 0.026 p 45 0.3036
Table 3. E M V for F G N s .
Table 3. E M V for F G N s .
Edges E M V Edges E M V Edges E M V Edges E M V
a 1 p 11 0.1536 a 2 p 21 0.02 a 3 p 31 0.015 a 4 p 41 0.01
a 1 p 12 0.1536 a 2 p 22 0.02 a 3 p 32 0.002 a 4 p 42 0.01
a 1 p 13 0.1532 a 2 p 23 0.02 a 3 p 33 0.0084 a 4 p 43 0.01
a 1 p 14 0.1532 a 2 p 24 0.02 a 3 p 34 0.0105 a 4 p 44 0.01
a 1 p 15 0.1021 a 2 p 25 0.02 a 3 p 35 0.0042 a 4 p 45 0.01
a 1 p 16 0.1 a 2 p 26 0.025 a 3 p 36 0.01 p 44 p 53 0.018
p 12 p 26 0.011 p 23 p 31 0.010 p 35 p 42 0.0020 a 5 p 51 0.01
a 5 p 52 0.01 a 5 p 53 0.0193 a 5 p 54 0.0193 a 5 p 55 0.01
Table 4. E M V for constructing network with moderate number of edges.
Table 4. E M V for constructing network with moderate number of edges.
Edges E M V Edges E M V Edges E M V Edges E M V
a 1 p 11 0.1536 a 2 p 21 0.02 a 3 p 31 0.015 a 4 p 41 0.01
a 1 p 12 0.1536 a 2 p 22 0.02 a 3 p 32 0.002 a 4 p 42 0.01
a 1 p 13 0.1532 a 2 p 23 0.02 a 3 p 33 0.0084 a 4 p 43 0.01
a 1 p 14 0.1532 a 2 p 24 0.02 a 3 p 34 0.0105 a 4 p 44 0.01
a 1 p 15 0.1021 a 2 p 25 0.02 a 3 p 35 0.0042 a 4 p 45 0.01
a 1 p 16 0.1 a 2 p 26 0.025 a 3 p 36 0.01 p 44 p 53 0.018
p 12 p 26 0.011 p 23 p 31 0.010 p 35 p 42 0.0020 a 5 p 51 0.01
a 5 p 52 0.01 a 5 p 53 0.0193 a 5 p 54 0.0193 a 5 p 55 0.01
p 11 p 12 0.1530 p 14 p 41 0.09 p 37 p 52 0.02 p 51 p 55 0.02
p 16 p 15 0.101 p 14 p 52 0.02 p 36 p 42 0.01 p 44 p 53 0.01
p 21 p 22 0.03 p 13 p 45 0.143 p 43 p 44 0.16 p 32 p 33 0.001
p 25 p 52 0.02 p 13 p 36 0.02 p 23 p 31 0.02 p 23 p 45 0.02
Table 5. Comparative analysis of cryptographic methods.
Table 5. Comparative analysis of cryptographic methods.
MethodMathematical ImportanceSecurity LevelComputational ComplexityAttack ResistanceUse Case
RSABased on number theory, modular arithmetic, prime factorization problemModerate–HighHigh (especially with large keys)Vulnerable to quantum attacksSecure messaging, digital signatures
AESRelies on substitution–permutation networks, algebra over finite fields (GF(28))HighLowStrong against classical and quantum attacks (symmetric)Real-time data encryption, IoT, file systems
Hybrid (RSA + AES)Merges number theory (RSA) with block cipher algebra (AES)Very HighMedium–HighStrong (combines advantages)Key exchange + data encryption (e.g., HTTPS)
Proposed MethodCombines RSA (number theory), fuzzy logic (membership theory), graph theory (domination, topology)Very HighHigh–Very HighVery strong (due to added fuzzy and graph complexity)Highly confidential transmissions, layered security
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Muhiuddin, G.; Meenakshi, A.; Kacprzyk, J.; Ambika, G.; Rashmamlou, H. A Novel Approach to Strengthening Cryptography Using RSA, Efficient Domination and Fuzzy Logic. Axioms 2025, 14, 392. https://doi.org/10.3390/axioms14050392

AMA Style

Muhiuddin G, Meenakshi A, Kacprzyk J, Ambika G, Rashmamlou H. A Novel Approach to Strengthening Cryptography Using RSA, Efficient Domination and Fuzzy Logic. Axioms. 2025; 14(5):392. https://doi.org/10.3390/axioms14050392

Chicago/Turabian Style

Muhiuddin, Ghulam, Annamalai Meenakshi, Janusz Kacprzyk, Ganesan Ambika, and Hossein Rashmamlou. 2025. "A Novel Approach to Strengthening Cryptography Using RSA, Efficient Domination and Fuzzy Logic" Axioms 14, no. 5: 392. https://doi.org/10.3390/axioms14050392

APA Style

Muhiuddin, G., Meenakshi, A., Kacprzyk, J., Ambika, G., & Rashmamlou, H. (2025). A Novel Approach to Strengthening Cryptography Using RSA, Efficient Domination and Fuzzy Logic. Axioms, 14(5), 392. https://doi.org/10.3390/axioms14050392

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop