Open access peer-reviewed chapter - ONLINE FIRST

An Era of Cryptography Based on Neutrosophic Number Theory

Written By

Ali Allouf

Submitted: 01 March 2024 Reviewed: 09 April 2024 Published: 04 July 2024

DOI: 10.5772/intechopen.114975

The Role of Cybersecurity in the Industry 5.0 Era IntechOpen
The Role of Cybersecurity in the Industry 5.0 Era Edited by Christos Kalloniatis

From the Edited Volume

The Role of Cybersecurity in the Industry 5.0 Era [Working Title]

Associate Prof. Christos Kalloniatis

Chapter metrics overview

11 Chapter Downloads

View Full Metrics

Abstract

The main objective of this chapter is to introduce the concept of neutrosophic number theory and to demonstrate its potential applications in modern cybernetic systems. The chapter will also explore the possibility of utilizing neutrosophic theory to enhance existing security algorithms, including a detailed explanation of the neutrosophic version of the RSA algorithm. Furthermore, the chapter will present a novel neutrosophic version of the Diffie-Hellman key exchange algorithm.

Keywords

  • neutrosophic cryptography
  • neutrosophic RSA algorithm
  • public key cryptography
  • fusion neutrosophic number theory
  • diffie-hellman key exchange algorithm

1. Introduction

The advent of Industry 5.0, the fifth industrial revolution, has ushered in an era of unprecedented technological advancements. This revolution is marked by the convergence of cyber-physical systems, the Internet of Things (IoT), and artificial intelligence (AI), leading to the creation of intelligent, autonomous, and interconnected systems. As these systems become increasingly complex and integrated, the need for robust and secure communication channels has never been more pressing.

Enter neutrosophic cryptography, a novel and emerging field that leverages the principles of neutrosophic logic to enhance the security and resilience of cryptographic systems. Neutrosophic logic, an extension of fuzzy logic, introduces the concept of indeterminacy, allowing for the representation and analysis of information with inherent uncertainties and inconsistencies.

Neutrosophic algebra, introduced by Kandasamy and Smarandache [1], lays the foundation for various neutrosophic algebraic structures, such as neutrosophic groups and rings [2, 3]. The inclusion of an indeterminate element (denoted by an “I) offers a unique logical property, fostering significant advancements in the study of algebraic structures (see references [4, 5, 6, 7, 8, 9, 10, 11, 12]).

The year 2020 marked the birth of neutrosophic number theory, where concepts, such as neutrosophic greatest common divisor (gcd), neutrosophic Diophantine equations, neutrosophic Euler’s function, and neutrosophic congruences, were established and explored by several researchers (see references [6, 11]).

Drawing an analogy, cryptography can be viewed as the practical application of number theory concepts. As various scientific fields, particularly computing, cryptography, and security systems, witness rapid advancements, the need for more robust security measures becomes increasingly crucial. This very need has fueled the development of neutrosophic cryptography theory.

Advertisement

2. Mathematical definitions and issues

Definition 2.1: [6]

Let Z be the ring of integers, we say that (I) = {a + bI; abZ} is the neutrosophic ring of integers.

Definition 2.2: [6]

  1. let a +bI, andc + dI are two neutrosophic integers, then:

    a + bIc + dI if and only if a ≤, a + bc + d.

  2. a + bI is called positive neutrosophic integer if a > 0 and a + b > 0.

Example 2.3:

5 + 2I is a positive neutrosophic integer, that is because 5 > 0, 5 + 2 = 7 > 0.

Definition 2.5: [6] (Addition)

Let a+bI,c+dI:

a+bI+c+dI=a+c+b+dIE1

Definition 2.6: [6] (Multiplication)

Let a+bI,c+dI:

a+bI·c+dI=ac+adI+bcI+bdI2ac+I(ad+bc+bdE2

Definition 2.7: [6] (Neutrosophic Exponentiation)

Let a+bI,c+dI:

a+bIc+dI=ac+Ia+bc+dacE3

Definition 2.8: [6] (Greatest Common Divisor)

Let a+bI,c+dI:

gcdac+gcda+bc+dgcdacIE4

Definition 2.9: [6] (Division)

Let (I) = {a +bI; a, bZ} the neutrosophic ring of integers. For any x, y ∈ (I), we say that x|y if there is rZ(I); r. x = y.

Definition 2.10: [6] (Congruence)

In the neutrosophic ring denoted by Z(I), let x = a + bI, y = c + dI, and z = m + nI be three elements. We say that x is congruent to y modulo z (denoted by x ≡ (modz)) if and only if z divides the difference between x and y.

An element z in Z(I) is called the greatest common divisor (GCD) of x and y if it satisfies the following conditions:

  1. Divisibility:z divides both x and y: z | xandz | y.

  2. Maximality: For any other element c dividing both x and y (i.e., c | xandc | y), c must also divide z (i.e., c | z).

Definition 2.11: [6] (primes)

Let Z(I) = {a + bI; a, bZ} denote the neutrosophic ring of integers. An arbitrary element x ∈ Z(I) is called a prime element if, whenever x divides the product of two elements y and z, it divides at least one of the factors y or z.

The concept of utilizing neutrosophic numbers in cryptography was first introduced by Merkepci et al. in [13].

Definition 2.12: [10] (RSA algorithm)

Neutrosophic Euler’s Identity:

Let a + bI and c + dI be two relatively prime neutrosophic positive integers (meaning their greatest common divisor is the neutrosophic integer 1). Then, the following equation holds:

a+bIφc+dI=1modc+dIE5

To encrypt a plaintext message m using the RSA algorithm, we follow these steps:

  1. We pick two positive integers p, andq and compute n = pq.

  2. Compute (n).

  3. We pick a positive integer 1 < e < (n) such that gcd(e,φ(n)) = 1.

  4. We use the formula Cmemodn to get the encryption of (m).

  5. To decrypt the original text (m), calc de1 such that e. d ≡ 1(modφ(n)).

  6. Then we compute mCdmodn to get the original text.

We call the pair (e, n) the public key, and we call the pair (d, n) the private key.

The RSA algorithm’s security relies on the difficulty of factoring large natural numbers (integers) into their prime components. Choosing a large number n for n makes it computationally challenging to break the code, as this process requires factoring n.

Example 2.13:

Consider that m = 11 is the plain text, then we pick p = 17, q = 11, then n = pq = 187, (n) = (p – 1) (q – 1) = 160.

We choose a small value for e, e = 7 (satisfying gcd(e, φ(n)) = 1).

Then the encrypted message:

CmemodnE6
C117mod187=154E7

To decrypt the previous message, then:

Using the Extended Euclidean Algorithm, we can find d such that: d·e1(modφ(n)). In this case, d = 23.

mCdmodnE8
m15423mod187=11E9
Advertisement

3. Enhanced neutrosophic RSA algorithm

The primary goal of cryptography is to keep messages confidential. The RSA algorithm relies on the difficulty of factoring large integers into their prime factors. Neutrosophic integers offer a higher level of complexity, making them suitable for cryptographic applications. Analyzing positive neutrosophic integers is significantly more challenging than analyzing regular integers (see [13]).

For example, n = 20 + 52I can be split into many different formulas such as (4 + 2I) (5 + 7I), (4 − I) (5 + 9I), (2 + I) (18 + 14I) and so on.

This implies that constructing a neutrosophic version of the RSA algorithm will yield a higher level of complexity, making it even more challenging to crack the algorithm.

In our published research paper entitled “The Applications of Fusion Neutrosophic Number Theory in Public Key Cryptography and the Improvement of RSA Algorithm,” Mehmet Merkepci and Mohammad Abobala introduced a novel formula for the Euler totient function:

(x+yI)=φ(x).φ(x+y); x, x+y>0.E10

The Euler phi function counts the number of positive neutrosophic integers, such as a+bIx+yI and that are relatively prime to gcda+bIx+yI=1.

Steps for implementing the neutrosophic algorithm: [6]

Assume that Bob and Alice, Bob wants to send an encrypted text to Alice. Suppose that M = m + nI is the text, to encrypt M, Bob should follow these steps:

  1. Bob picks two neutrosophic positive integers, P = a + bI, = c + dI and compute N = PQ = ac + (ad +bc + bd).

  2. Bob computes φ (N) = φ (P).φ (Q), where:

    φP=a1+Iφa+ba1=a1+Ia+b1a+1=a1+bI.E11
    φsQ=a1+Iφc+da1=c1+dI.E12

  3. Bob picks an arbitrary neutrosophic positive integer E = e1 + e2I with gc(E,φ (N)) = 1 and 1 < E < φ (N), the public key is (E, N).

  4. Bob encrypts the text M by the formula:

CMemodn=m+nIe1+e2Imodn=(me1+I[m+n)e1+e2m)e1modnE13

Bob sends C to Alice.

The private key is calculated as follows:

d=(e11+Ie1+e2)1e11modφsn=s1+s2Imodφsn.E14

This is how Alice decrypts the message:

MCdmodnE15

Example 3.1:

Assuming that Bob has the message M=3+2I and P=3+2I,Q=5+6I>0.

N=PQ=5×3+I5×2+6×3+6×2=15+I10+18+12=15+40I.
φN=4+6I2+2I=8+I4×2+6×2+6×2=8+32I.

We choose e to satisfy 1<e<φN, e=3+6I.

CMemodN=3+2I3+6Imod8+32IC=12+8I.
d=3+6IMCdmodN=12+8I3+6Imod8+32I=+353I=3+2I.

In our published research, we provided theoretical proofs and demonstrations of the correctness of the algorithm’s operation. Additionally, we raised the complexity of the RSA algorithm to the square, making it more resistant and secure against attacks (see [13]).

Advertisement

4. Neutrosophic diffie-hellman key exchange

The Diffie-Hellman key exchange is a foundational cryptographic method that allows two parties to securely agree on a shared secret key, even if they are communicating over an insecure channel where others might be listening. This shared secret key can then be used to encrypt and decrypt messages, providing confidentiality for their communication. The magic of Diffie-Hellman lies in modular arithmetic and one-way functions:

  1. Shared public parameters: Two parties, Alice and Bob, begin by agreeing on a large prime number (p) and a generator (g) within a finite field. These are public values and can be known by anyone.

  2. Private keys: Alice and Bob each choose a secret and random number. Alice’s is called a, and Bob’s is called b. These are kept absolutely private.

  3. Public Key Calculation:

    • Alice calculates: A=gamodp and sends the result (A) to Bob.

    • Bob calculates: B=gbmodp and sends the result (B) to Alice.

  4. Shared Secret Calculation:

    • Alice receives B and computes Bamodp.

    • Bob receives A and computes Abmodp.

Crucially, due to the properties of modular arithmetic, both Alice and Bob will arrive at the same shared secret value.

Advertisement

5. Proposed neutrosophic algorithm

The description of neutrosophic Diffie-Hellman algorithm:

  1. Alice and Bob agree on a neutrosophic prime p=p1+p2I, that is, p1, p1+p2 are classical primes and a base g=g1+g2I>0, that is, g1, g1+g2>0.

  2. Alice chose a secret number a=a1+a2I>0 and sends Bob gamodp. [Remark that gamodp=ga1modp1+I[g1+g2)a1+a2modp1+p2ga1modp1.

  3. Bob chose a secret number b=b1+b2I>0 and sends Alicegbmodp.

  4. Alice computes gbamodp=ga1b11modp+I[g1+g2)a1+a2b1+b2modp1+p2ga1b11modp1.

  5. Bob computes gabmodp.

Example 5.1:

Assume that Alice and Bob have agreed on p=3+4I, and g=5+I.

Alice chose the secret neutrosophic number a=2+3I. Alice sends Bob5+I2+3Imodp=52mod3+I65mod752mod3=1+5I.

Bob chose the secret neutrosophic number b=42I and sends Alice5+I42Imodp=54mod3+I62mod754mod3=1.

Alice computes 12+3Imodp=1.

Bob computes 1+5I42Imodp=1.

Thus, we observe that both parties generated the same secret key value, and therefore the neutrosophic algorithm worked correctly.

Advertisement

6. Conclusion

In this chapter, we presented some of the mathematical foundations of neutrosophic number theory and explained the potential for using it to develop and enhance existing information security algorithms, making them more secure and resistant to attacks. At the end of the chapter, we presented an approach for using neutrosophic numbers in the Diffie-Hellman key exchange algorithm.

Neutrosophic number theory may have a great impact on cryptography, so we suggest researchers define a version of Diffie-Hellman depending on the refined neutrosophic number theoretical approach [12].

We believe that the convergence of neutrosophic cryptography and Industry 5.0 represents a paradigm shift in the way we approach data security and communication in the realm of cyber-physical systems. By embracing the principles of neutrosophic logic and leveraging its ability to handle uncertainties and inconsistencies, neutrosophic cryptography offers a robust and resilient framework for securing data exchange in the interconnected and autonomous systems that characterize the fifth industrial revolution.

References

  1. 1. Smarandache F, Kandasamy WBV. Finite Neutrosophic Complex Numbers. arXiv.org. LicenseCC BY 3.0. 2011
  2. 2. Agboola AAA, Akinola AD, Oyebola OY. Neutrosophic rings I. International Journal of Math Combinatorics. 2011;4:1-14
  3. 3. Abobala M. On some algebraic properties of n-refined neutrosophic elements and n-refined neutrosophic linear equations. Mathematical Problems in Engineering. 2021;2021:1-7
  4. 4. Celik M, Olgun N. An introduction to neutrosophic real Banach and Hillbert spaces. Galoitica Journal of Mathematical Structures and Applications. 2022;2(1):8-13
  5. 5. Celik M, Olgun N. On the classification of neutrosophic complex inner product spaces. Galoitica Journal of Mathematical Structures and Applications. 2022;2022(1):14-23
  6. 6. Abobala M. Partial foundation of neutrosophic number theory. Neutrosophic Sets and Systems. 2021;39:120-132
  7. 7. Adeleke EO, Agboola AAA, Smarandache F. Refined neutrosophic rings I. International Journal of Neutrosophic Science. 2020;2(2):77-81
  8. 8. Abobala M. On refined neutrosophic matrices and their applications in refined neutrosophic algebraic equations. Journal of Mathematics. 2021;2021:5531093
  9. 9. Cozzens M, Miller SJ. The Mathematics of Encryption: An Elementary Introduction. Providence, Rhode Island: American Mathematical Society; 2013. DOI: 10.1090/mawrld/029
  10. 10. Wahab Sait AR, Pustokhina I, Ilayaraja M. Modeling of multiple share creation with optimal signcryption technique for digital image security. Journal of Intelligent Systems and Internet of Things. 2019;0(1):26-36
  11. 11. Sankari H, Abobala M. Neutrosophic linear Diophantine equations with two variables. Neutrosophic Sets and Systems. 2020;38:22-30
  12. 12. Ibrahim M, Abobala M. An introduction to refined neutrosophic number theory. Neutrosophic Sets and Systems. 2021;45:1-10
  13. 13. Merkepci M, Abobala M, Allouf A. The applications of fusion neutrosophic number theory in public key cryptography and the improvement of RSA algorithm. Fusion: Practice and Applications (FPA). 2023;10(2):69-74

Written By

Ali Allouf

Submitted: 01 March 2024 Reviewed: 09 April 2024 Published: 04 July 2024