Optimizing the selection of the secret parameters for public key cryptosystems by using interval linear programming and fully fuzzy linear programming
One of the basic tasks in public key cryptosystems is to determine the secret parameters. This paper proposes multi-objective interval linear programming and multi-objective fully fuzzy linear programming (FFLP) models to determine the optimum interval numbers and triangular fuzzy numbers (TFNs) of...
Gespeichert in:
| Veröffentlicht in: | Engineering applications of artificial intelligence Jg. 144; S. 110168 |
|---|---|
| 1. Verfasser: | |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
Elsevier Ltd
15.03.2025
|
| Schlagworte: | |
| ISSN: | 0952-1976 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | One of the basic tasks in public key cryptosystems is to determine the secret parameters. This paper proposes multi-objective interval linear programming and multi-objective fully fuzzy linear programming (FFLP) models to determine the optimum interval numbers and triangular fuzzy numbers (TFNs) of the secret parameters in the public key cryptosystems. The public and private (secret) objective function(s) and constraints can be considered such that the optimum interval numbers and optimum TFNs for the secret parameters can be obtained from which the random selection of the secret parameters can be made for each algorithm's execution. Adapting the general model to the Rivest, Shamir, Adleman (RSA) public key cryptosystem is also illustrated. In the interval programming model for the RSA, the linear combination method combines multiple objective functions into a single objective function, and nonlinear constraints are linearized using the Taylor series expansion method. No multiple objective functions are obtained in the FFLP model of the RSA, but the nonlinear constraints are again linearized using the Taylor series expansion method. The numerical application for the RSA public key cryptosystem is made for both models by considering five cases and twenty-four subcases, and the results are analyzed. To the best of our knowledge, there is no study in the literature that considers interval linear programming and/or FFLP to obtain the optimum interval numbers and TFNs for the secret parameters of the public key cryptosystems. The proposed methodology is systematic and generic and can also be adapted for other public key cryptosystems easily. |
|---|---|
| AbstractList | One of the basic tasks in public key cryptosystems is to determine the secret parameters. This paper proposes multi-objective interval linear programming and multi-objective fully fuzzy linear programming (FFLP) models to determine the optimum interval numbers and triangular fuzzy numbers (TFNs) of the secret parameters in the public key cryptosystems. The public and private (secret) objective function(s) and constraints can be considered such that the optimum interval numbers and optimum TFNs for the secret parameters can be obtained from which the random selection of the secret parameters can be made for each algorithm's execution. Adapting the general model to the Rivest, Shamir, Adleman (RSA) public key cryptosystem is also illustrated. In the interval programming model for the RSA, the linear combination method combines multiple objective functions into a single objective function, and nonlinear constraints are linearized using the Taylor series expansion method. No multiple objective functions are obtained in the FFLP model of the RSA, but the nonlinear constraints are again linearized using the Taylor series expansion method. The numerical application for the RSA public key cryptosystem is made for both models by considering five cases and twenty-four subcases, and the results are analyzed. To the best of our knowledge, there is no study in the literature that considers interval linear programming and/or FFLP to obtain the optimum interval numbers and TFNs for the secret parameters of the public key cryptosystems. The proposed methodology is systematic and generic and can also be adapted for other public key cryptosystems easily. |
| ArticleNumber | 110168 |
| Author | Bas, Esra |
| Author_xml | – sequence: 1 givenname: Esra orcidid: 0000-0002-7101-3074 surname: Bas fullname: Bas, Esra email: atace@itu.edu.tr organization: Istanbul Technical University, Department of Industrial Engineering, Macka, 34367, Istanbul, Turkey |
| BookMark | eNqFkE1qwzAQhbVIoUnaKxRdwKkk27K9awn9g0A27VrI8ihVaktGUgLOQXre2iTdFbqZgTfvPYZvgWbWWUDojpIVJZTf71dgd7LvpVkxwvIVndRyhuakyllCq4Jfo0UIe0JIWmZ8jr63fTSdORm7w_ETcIAWVDTOYqcvgvIQcS-97CCCD1g7j_tD3RqFv2DAyg99dGEIEbqA6wEfwlRm7Gg-yha3xoIcE97txopuuknbYH1o22Gcp9Pwh-UGXWnZBri97CX6eH56X78mm-3L2_pxkyiWVzFRRcXKnBecZYowmUsJKde8rqhmpMpkw_OKKKozxkvGSs1ZXvMiSwtapJxTlS4RP_cq70LwoEXvTSf9ICgREzuxF79ExURUnImOwYdzEMbvjga8CMqAVdAYPwIUjTP_VfwADTuKXw |
| Cites_doi | 10.1007/s00500-019-04519-w 10.1016/j.engappai.2023.107581 10.1016/j.apm.2008.10.020 10.1016/j.knosys.2015.09.020 10.1007/s10623-013-9879-3 10.1109/18.54902 10.31181/jdaic10020042023n 10.3390/math11061559 10.1016/j.apm.2013.01.040 10.31181/sor2120257 10.31181/sdmap21202510 10.3390/math11214428 10.1145/359340.359342 10.31181/sor2120256 10.1016/j.apm.2013.02.039 10.1016/j.camwa.2011.11.057 10.1007/BF03024123 10.1016/0165-0114(92)90223-Q 10.1016/j.apm.2010.07.037 10.1016/j.sigpro.2021.108122 10.1016/j.seps.2023.101614 |
| ContentType | Journal Article |
| Copyright | 2025 Elsevier Ltd |
| Copyright_xml | – notice: 2025 Elsevier Ltd |
| DBID | AAYXX CITATION |
| DOI | 10.1016/j.engappai.2025.110168 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Applied Sciences Computer Science |
| ExternalDocumentID | 10_1016_j_engappai_2025_110168 S095219762500168X |
| GroupedDBID | --K --M .DC .~1 0R~ 1B1 1~. 1~5 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN AABNK AAEDT AAEDW AAIKJ AAKOC AALRI AAOAW AAQFI AATTM AAXKI AAXUO AAYFN AAYWO ABBOA ABJNI ABMAC ACDAQ ACGFS ACRLP ACVFH ACZNC ADBBV ADCNI ADEZE ADTZH AEBSH AECPX AEIPS AEKER AENEX AEUPX AFJKZ AFPUW AFTJW AFXIZ AGCQF AGHFR AGRNS AGUBO AGYEJ AHHHB AHJVU AHZHX AIALX AIEXJ AIGII AIIUN AIKHN AITUG AKBMS AKRWK AKYEP ALMA_UNASSIGNED_HOLDINGS AMRAJ ANKPU AOUOD APXCP AXJTR BJAXD BKOJK BLXMC BNPGV CS3 DU5 EBS EFJIC EFKBS EO8 EO9 EP2 EP3 F5P FDB FIRID FNPLU FYGXN G-Q GBLVA GBOLZ IHE J1W JJJVA KOM LG9 LY7 M41 MO0 N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. Q38 ROL RPZ SDF SDG SDP SES SEW SPC SPCBC SST SSV SSZ T5K TN5 ~G- 29G 9DU AAQXK AAYXX ABWVN ABXDB ACLOT ACNNM ACRPL ADJOM ADMUD ADNMO AGQPQ ASPBG AVWKF AZFZN CITATION EFLBG EJD FEDTE FGOYB G-2 HLZ HVGLF HZ~ R2- SBC SET UHS WUQ ZMT ~HD |
| ID | FETCH-LOGICAL-c259t-c7928567624c02a5aae36f6b91f2094ad6590c1f4268228f625b67437173661c3 |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001422250600001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0952-1976 |
| IngestDate | Sat Nov 29 07:52:18 EST 2025 Tue Jul 29 20:15:08 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Shamir Adleman public key cryptosystem Public key cryptosystem Multi-objective optimization Rivest Interval linear programming Fully fuzzy linear programming |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c259t-c7928567624c02a5aae36f6b91f2094ad6590c1f4268228f625b67437173661c3 |
| ORCID | 0000-0002-7101-3074 |
| ParticipantIDs | crossref_primary_10_1016_j_engappai_2025_110168 elsevier_sciencedirect_doi_10_1016_j_engappai_2025_110168 |
| PublicationCentury | 2000 |
| PublicationDate | 2025-03-15 |
| PublicationDateYYYYMMDD | 2025-03-15 |
| PublicationDate_xml | – month: 03 year: 2025 text: 2025-03-15 day: 15 |
| PublicationDecade | 2020 |
| PublicationTitle | Engineering applications of artificial intelligence |
| PublicationYear | 2025 |
| Publisher | Elsevier Ltd |
| Publisher_xml | – name: Elsevier Ltd |
| References | Kaur, Kumar (bib22) 2013; 37 Abdullah, Saifullah, Almagrabi (bib1) 2023; 11 Dubey, Ratan, Verma, Saxena (bib14) 2014; vol. 258 Baykasoğlu, Subulan (bib4) 2015; 90 Kaur, Kumar (bib23) 2016 Lenstra (bib26) 1984; 6 Hsu, Hou (bib19) 2006; 45 Kaufmann, Gupta (bib21) 1985 Mouha, Wang, Gu, Preneel (bib30) 2012; vol. 7537 Ghanbari, Ghorbani-Moghadam, Mahdavi-Amiri (bib17) 2020; 24 Boneh (bib7) 1999; 46 Jiang, Han, Xie (bib20) 2021 Mukherjee, Gazi, Salahshour, Ghosh, Mondal (bib31) 2023; 13 Rivest, Shamir, Adleman (bib36) 1978; 21 Wu, Yao, An (bib42) 2021; 186 Rivest, Kaliski (bib35) 2011 Farràs, Metcalf-Burton, Padró, Vázquez (bib15) 2010; vol. 5973 Abdullah, Almagrabi, Ullah (bib2) 2023; 11 Zhang, Abdullah, Ullah, Ghani (bib43) 2024; 129 Kolk, Lerman (bib24) 1992 Chiandussi, Codegone, Ferrero, Varesio (bib11) 2012; 63 Li, Li, Lai (bib27) 2015; 74 Wiener (bib41) 1990; 36 Alamin, Rahaman, Mondal (bib3) 2025; 2 Borghoff, Knudsen, Stolpe (bib8) 2009 Caballero-Gil, Hernandez-Goya, Bruno-Castaneda (bib9) 2004 Shamir (bib39) 1982 Rivest, Shamir (bib37) 1986; vol. 219 Gazi, Raisa, Biswas, Azizzadeh, Mondal (bib16) 2024; 2 Narang, Kumar, Dhawan (bib34) 2023; 3 Kumar, Kaur, Singh (bib25) 2011; 35 Liou, Wang (bib28) 1992; 50 Hoffstein, Pipher, Silverman (bib18) 2008 Dehghan, Hashemi, Ghatee (bib13) 2006; 179 Dass, Sharma, Bansal, Nygard (bib12) 2013 Nandi, Granata, Jana, Ghorui, Mondal (bib33) 2023; 88 Ross (bib38) 1995 Smart (bib40) 2016 Najafi, Edalatpanah (bib32) 2013; 37 Biswas, Gazi, Sankar, Ghosh (bib5) 2024; 2 Bleichenbacher (bib6) 1998 Cabrero-Holgueras, Pastrana (bib10) 2023; 229 Lotfi, Allahviranloo, Jondabeh, Alizadeh (bib29) 2009; 33 Liou (10.1016/j.engappai.2025.110168_bib28) 1992; 50 Najafi (10.1016/j.engappai.2025.110168_bib32) 2013; 37 Boneh (10.1016/j.engappai.2025.110168_bib7) 1999; 46 Dubey (10.1016/j.engappai.2025.110168_bib14) 2014; vol. 258 Biswas (10.1016/j.engappai.2025.110168_bib5) 2024; 2 Bleichenbacher (10.1016/j.engappai.2025.110168_bib6) 1998 Kaur (10.1016/j.engappai.2025.110168_bib22) 2013; 37 Abdullah (10.1016/j.engappai.2025.110168_bib1) 2023; 11 Rivest (10.1016/j.engappai.2025.110168_bib35) 2011 Cabrero-Holgueras (10.1016/j.engappai.2025.110168_bib10) 2023; 229 Hoffstein (10.1016/j.engappai.2025.110168_bib18) 2008 Baykasoğlu (10.1016/j.engappai.2025.110168_bib4) 2015; 90 Kaufmann (10.1016/j.engappai.2025.110168_bib21) 1985 Zhang (10.1016/j.engappai.2025.110168_bib43) 2024; 129 Gazi (10.1016/j.engappai.2025.110168_bib16) 2024; 2 Nandi (10.1016/j.engappai.2025.110168_bib33) 2023; 88 Hsu (10.1016/j.engappai.2025.110168_bib19) 2006; 45 Smart (10.1016/j.engappai.2025.110168_bib40) 2016 Lenstra (10.1016/j.engappai.2025.110168_bib26) 1984; 6 Dehghan (10.1016/j.engappai.2025.110168_bib13) 2006; 179 Farràs (10.1016/j.engappai.2025.110168_bib15) 2010; vol. 5973 Ross (10.1016/j.engappai.2025.110168_bib38) 1995 Dass (10.1016/j.engappai.2025.110168_bib12) 2013 Narang (10.1016/j.engappai.2025.110168_bib34) 2023; 3 Lotfi (10.1016/j.engappai.2025.110168_bib29) 2009; 33 Kumar (10.1016/j.engappai.2025.110168_bib25) 2011; 35 Shamir (10.1016/j.engappai.2025.110168_bib39) 1982 Mouha (10.1016/j.engappai.2025.110168_bib30) 2012; vol. 7537 Borghoff (10.1016/j.engappai.2025.110168_bib8) 2009 Li (10.1016/j.engappai.2025.110168_bib27) 2015; 74 Chiandussi (10.1016/j.engappai.2025.110168_bib11) 2012; 63 Ghanbari (10.1016/j.engappai.2025.110168_bib17) 2020; 24 Kolk (10.1016/j.engappai.2025.110168_bib24) 1992 Wu (10.1016/j.engappai.2025.110168_bib42) 2021; 186 Alamin (10.1016/j.engappai.2025.110168_bib3) 2025; 2 Rivest (10.1016/j.engappai.2025.110168_bib37) 1986; vol. 219 Mukherjee (10.1016/j.engappai.2025.110168_bib31) 2023; 13 Jiang (10.1016/j.engappai.2025.110168_bib20) 2021 Abdullah (10.1016/j.engappai.2025.110168_bib2) 2023; 11 Caballero-Gil (10.1016/j.engappai.2025.110168_bib9) 2004 Rivest (10.1016/j.engappai.2025.110168_bib36) 1978; 21 Wiener (10.1016/j.engappai.2025.110168_bib41) 1990; 36 Kaur (10.1016/j.engappai.2025.110168_bib23) 2016 |
| References_xml | – volume: 11 start-page: 1559 year: 2023 ident: bib2 article-title: New approach to artificial intelligent based three-way decision making and analyzing s-box image encryption using TOPSIS method publication-title: Mathematics – volume: 6 start-page: 14 year: 1984 end-page: 21 ident: bib26 article-title: Integer programming and cryptography publication-title: Math. Intel. – year: 2008 ident: bib18 article-title: An Introduction to Mathematical Cryptography – volume: 35 start-page: 817 year: 2011 end-page: 823 ident: bib25 article-title: A new method for solving fully fuzzy linear programming problems publication-title: Appl. Math. Model. – year: 1982 ident: bib39 article-title: A Polynomial Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem – start-page: 126 year: 2013 end-page: 131 ident: bib12 article-title: Meta heuristics for prime factorization problem publication-title: World Congress on Nature and Biologically Inspired Computing – volume: 3 start-page: 33 year: 2023 end-page: 46 ident: bib34 article-title: A fuzzy extension of MEREC method using parabolic measure and its applications publication-title: J. Decis. Anal. Int. Comp. – volume: 90 start-page: 165 year: 2015 end-page: 184 ident: bib4 article-title: An analysis of fully fuzzy linear programming with fuzzy decision variables through logistics network design problem publication-title: Knowl.-Based Syst. – start-page: 773 year: 2004 end-page: 777 ident: bib9 article-title: A game-theoretic model for two-party cryptographic protocols publication-title: International Conference on Information Technology: Coding and Computing – volume: 33 start-page: 3151 year: 2009 end-page: 3156 ident: bib29 article-title: Solving a full fuzzy linear programming using lexicography method and fuzzy approximate solution publication-title: Appl. Math. Model. – year: 1992 ident: bib24 article-title: Linearization publication-title: Nonlinear System Dynamics – volume: 37 start-page: 7142 year: 2013 end-page: 7153 ident: bib22 article-title: Mehar's method for solving fully fuzzy linear programming problems with L-R fuzzy parameters publication-title: Appl. Math. Model. – volume: 129 year: 2024 ident: bib43 article-title: A new approach to neural network via double hierarchy linguistic information: application in robot selection publication-title: Eng. Appl. Artif. Intell. – volume: 46 start-page: 203 year: 1999 end-page: 213 ident: bib7 article-title: Twenty years of attacks on the RSA cryptosystem publication-title: Not. Am. Math. Soc. – year: 2011 ident: bib35 article-title: RSA problem publication-title: Encyclopedia of Cryptography and Security – year: 1995 ident: bib38 article-title: Fuzzy Logic with Engineering Applications – volume: 2 start-page: 61 year: 2025 end-page: 71 ident: bib3 article-title: Geometric approach for solving first order non-homogenous fuzzy difference equation publication-title: Spec. Oper. Res. – volume: 74 start-page: 623 year: 2015 end-page: 644 ident: bib27 article-title: Optimal assignment schemes for general access structures based on linear programming publication-title: Des. Codes Cryptogr. – volume: vol. 258 year: 2014 ident: bib14 article-title: Cryptanalytic attacks and countermeasures on RSA publication-title: Proceedings of the Third International Conference on Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing – volume: 179 start-page: 328 year: 2006 end-page: 343 ident: bib13 article-title: Computational methods for solving fully fuzzy linear systems publication-title: Appl. Math. Comput. – year: 1985 ident: bib21 article-title: Introduction to Fuzzy Arithmetic Theory and Applications – volume: 186 year: 2021 ident: bib42 article-title: Extended XOR-based visual cryptography schemes by integer linear program publication-title: Signal Process. – year: 2021 ident: bib20 article-title: The basic principles of interval analysis publication-title: Nonlinear Interval Optimization for Uncertain Problems. Springer Tracts in Mechanical Engineering – year: 2009 ident: bib8 article-title: Bivium as a mixed-integer linear programming problem publication-title: Cryptography and Coding. IMACC 2009 – volume: 36 start-page: 553 year: 1990 end-page: 558 ident: bib41 article-title: Cryptanalysis of short RSA secret exponents publication-title: IEEE Trans. Inf. Theor. – volume: 11 start-page: 4428 year: 2023 ident: bib1 article-title: An integrated group decision-making framework for the evaluation of artificial intelligence cloud platforms based on fractional fuzzy sets publication-title: Mathematics – volume: 229 year: 2023 ident: bib10 article-title: Towards automated homomorphic encryption parameter selection with fuzzy logic and linear programming publication-title: Expert Syst. Appl. – year: 2016 ident: bib23 article-title: Fuzzy optimal solution of fully fuzzy linear programming problems with inequality constraints having LR flat fuzzy numbers publication-title: An Introduction to Fuzzy Linear Programming Problems. Studies in Fuzziness and Soft Computing – volume: 45 year: 2006 ident: bib19 article-title: Goal-programming-assisted visual cryptography method with unexpanded shadow images for general access structures publication-title: Opt. Eng. – volume: 2 start-page: 1 year: 2024 end-page: 26 ident: bib5 article-title: A decision-making framework for sustainable highway restaurant site selection: AHP-TOPSIS approach based on the fuzzy numbers publication-title: Spec. Oper. Res. – year: 1998 ident: bib6 article-title: Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1 publication-title: Advances in Cryptology - CRYPTO '98 – volume: 21 start-page: 120 year: 1978 end-page: 126 ident: bib36 article-title: A method for obtaining digital signature and public-key cryptosystems publication-title: Commun. ACM – volume: vol. 219 year: 1986 ident: bib37 article-title: Efficient factoring based on partial information publication-title: Advances in Cryptology-EUROCRYPT’ 85 – volume: 2 start-page: 28 year: 2024 end-page: 52 ident: bib16 article-title: Finding most important criteria in women's empowerment for sports sector by pentagonal fuzzy DEMATEL methodology publication-title: Spec. Decis. Mak. Appl. – volume: 24 start-page: 10043 year: 2020 end-page: 10073 ident: bib17 article-title: Fuzzy linear programming problems: models and solutions publication-title: Soft Comput. – volume: vol. 5973 year: 2010 ident: bib15 article-title: On the optimization of bipartite secret sharing schemes publication-title: Information Theoretic Security. ICITS 2009 – volume: 13 year: 2023 ident: bib31 article-title: A brief analysis and interpretation on arithmetic operations of fuzzy numbers publication-title: Results Control Optim – volume: 63 start-page: 912 year: 2012 end-page: 942 ident: bib11 article-title: Comparison of multi-objective optimization methodologies for engineering applications publication-title: Comput. Math. Appl. – volume: 88 year: 2023 ident: bib33 article-title: Evaluation of the treatment options for COVID-19 patients using generalized hesitant fuzzy- multi criteria decision making techniques publication-title: Soc. Econ. Plann. Sci. – volume: vol. 7537 year: 2012 ident: bib30 article-title: Differential and linear cryptanalysis using mixed-integer linear programming publication-title: Information Security and Cryptology. Inscrypt 2011 – year: 2016 ident: bib40 article-title: Primality testing and factoring publication-title: Cryptography Made Simple. Information Security and Cryptography – volume: 50 start-page: 247 year: 1992 end-page: 255 ident: bib28 article-title: Ranking fuzzy numbers with integral value publication-title: Fuzzy Set Syst. – volume: 37 start-page: 7865 year: 2013 end-page: 7867 ident: bib32 article-title: A note on “A new method for solving fully fuzzy linear programming problems” publication-title: Appl. Math. Model. – volume: 24 start-page: 10043 year: 2020 ident: 10.1016/j.engappai.2025.110168_bib17 article-title: Fuzzy linear programming problems: models and solutions publication-title: Soft Comput. doi: 10.1007/s00500-019-04519-w – volume: 129 year: 2024 ident: 10.1016/j.engappai.2025.110168_bib43 article-title: A new approach to neural network via double hierarchy linguistic information: application in robot selection publication-title: Eng. Appl. Artif. Intell. doi: 10.1016/j.engappai.2023.107581 – volume: 33 start-page: 3151 issue: 7 year: 2009 ident: 10.1016/j.engappai.2025.110168_bib29 article-title: Solving a full fuzzy linear programming using lexicography method and fuzzy approximate solution publication-title: Appl. Math. Model. doi: 10.1016/j.apm.2008.10.020 – year: 1992 ident: 10.1016/j.engappai.2025.110168_bib24 article-title: Linearization – volume: 229 issue: Part A year: 2023 ident: 10.1016/j.engappai.2025.110168_bib10 article-title: Towards automated homomorphic encryption parameter selection with fuzzy logic and linear programming publication-title: Expert Syst. Appl. – year: 2011 ident: 10.1016/j.engappai.2025.110168_bib35 article-title: RSA problem – volume: 90 start-page: 165 year: 2015 ident: 10.1016/j.engappai.2025.110168_bib4 article-title: An analysis of fully fuzzy linear programming with fuzzy decision variables through logistics network design problem publication-title: Knowl.-Based Syst. doi: 10.1016/j.knosys.2015.09.020 – year: 2009 ident: 10.1016/j.engappai.2025.110168_bib8 article-title: Bivium as a mixed-integer linear programming problem – volume: 74 start-page: 623 year: 2015 ident: 10.1016/j.engappai.2025.110168_bib27 article-title: Optimal assignment schemes for general access structures based on linear programming publication-title: Des. Codes Cryptogr. doi: 10.1007/s10623-013-9879-3 – volume: 36 start-page: 553 issue: 3 year: 1990 ident: 10.1016/j.engappai.2025.110168_bib41 article-title: Cryptanalysis of short RSA secret exponents publication-title: IEEE Trans. Inf. Theor. doi: 10.1109/18.54902 – start-page: 126 year: 2013 ident: 10.1016/j.engappai.2025.110168_bib12 article-title: Meta heuristics for prime factorization problem – volume: 45 issue: 9 year: 2006 ident: 10.1016/j.engappai.2025.110168_bib19 article-title: Goal-programming-assisted visual cryptography method with unexpanded shadow images for general access structures publication-title: Opt. Eng. – volume: 3 start-page: 33 issue: 1 year: 2023 ident: 10.1016/j.engappai.2025.110168_bib34 article-title: A fuzzy extension of MEREC method using parabolic measure and its applications publication-title: J. Decis. Anal. Int. Comp. doi: 10.31181/jdaic10020042023n – year: 2016 ident: 10.1016/j.engappai.2025.110168_bib40 article-title: Primality testing and factoring – volume: 11 start-page: 1559 year: 2023 ident: 10.1016/j.engappai.2025.110168_bib2 article-title: New approach to artificial intelligent based three-way decision making and analyzing s-box image encryption using TOPSIS method publication-title: Mathematics doi: 10.3390/math11061559 – volume: 37 start-page: 7142 issue: 12–13 year: 2013 ident: 10.1016/j.engappai.2025.110168_bib22 article-title: Mehar's method for solving fully fuzzy linear programming problems with L-R fuzzy parameters publication-title: Appl. Math. Model. doi: 10.1016/j.apm.2013.01.040 – volume: 2 start-page: 61 issue: 1 year: 2025 ident: 10.1016/j.engappai.2025.110168_bib3 article-title: Geometric approach for solving first order non-homogenous fuzzy difference equation publication-title: Spec. Oper. Res. doi: 10.31181/sor2120257 – volume: 2 start-page: 28 year: 2024 ident: 10.1016/j.engappai.2025.110168_bib16 article-title: Finding most important criteria in women's empowerment for sports sector by pentagonal fuzzy DEMATEL methodology publication-title: Spec. Decis. Mak. Appl. doi: 10.31181/sdmap21202510 – volume: vol. 7537 year: 2012 ident: 10.1016/j.engappai.2025.110168_bib30 article-title: Differential and linear cryptanalysis using mixed-integer linear programming – volume: 11 start-page: 4428 year: 2023 ident: 10.1016/j.engappai.2025.110168_bib1 article-title: An integrated group decision-making framework for the evaluation of artificial intelligence cloud platforms based on fractional fuzzy sets publication-title: Mathematics doi: 10.3390/math11214428 – volume: 21 start-page: 120 issue: 2 year: 1978 ident: 10.1016/j.engappai.2025.110168_bib36 article-title: A method for obtaining digital signature and public-key cryptosystems publication-title: Commun. ACM doi: 10.1145/359340.359342 – year: 2021 ident: 10.1016/j.engappai.2025.110168_bib20 article-title: The basic principles of interval analysis – volume: 2 start-page: 1 issue: 1 year: 2024 ident: 10.1016/j.engappai.2025.110168_bib5 article-title: A decision-making framework for sustainable highway restaurant site selection: AHP-TOPSIS approach based on the fuzzy numbers publication-title: Spec. Oper. Res. doi: 10.31181/sor2120256 – year: 1998 ident: 10.1016/j.engappai.2025.110168_bib6 article-title: Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1 – volume: 37 start-page: 7865 issue: 14–15 year: 2013 ident: 10.1016/j.engappai.2025.110168_bib32 article-title: A note on “A new method for solving fully fuzzy linear programming problems” publication-title: Appl. Math. Model. doi: 10.1016/j.apm.2013.02.039 – volume: vol. 5973 year: 2010 ident: 10.1016/j.engappai.2025.110168_bib15 article-title: On the optimization of bipartite secret sharing schemes – year: 1985 ident: 10.1016/j.engappai.2025.110168_bib21 – volume: 13 year: 2023 ident: 10.1016/j.engappai.2025.110168_bib31 article-title: A brief analysis and interpretation on arithmetic operations of fuzzy numbers publication-title: Results Control Optim – volume: 63 start-page: 912 year: 2012 ident: 10.1016/j.engappai.2025.110168_bib11 article-title: Comparison of multi-objective optimization methodologies for engineering applications publication-title: Comput. Math. Appl. doi: 10.1016/j.camwa.2011.11.057 – year: 2016 ident: 10.1016/j.engappai.2025.110168_bib23 article-title: Fuzzy optimal solution of fully fuzzy linear programming problems with inequality constraints having LR flat fuzzy numbers – volume: 6 start-page: 14 year: 1984 ident: 10.1016/j.engappai.2025.110168_bib26 article-title: Integer programming and cryptography publication-title: Math. Intel. doi: 10.1007/BF03024123 – year: 1995 ident: 10.1016/j.engappai.2025.110168_bib38 – volume: 179 start-page: 328 issue: 1 year: 2006 ident: 10.1016/j.engappai.2025.110168_bib13 article-title: Computational methods for solving fully fuzzy linear systems publication-title: Appl. Math. Comput. – year: 2008 ident: 10.1016/j.engappai.2025.110168_bib18 – volume: 50 start-page: 247 year: 1992 ident: 10.1016/j.engappai.2025.110168_bib28 article-title: Ranking fuzzy numbers with integral value publication-title: Fuzzy Set Syst. doi: 10.1016/0165-0114(92)90223-Q – volume: vol. 219 year: 1986 ident: 10.1016/j.engappai.2025.110168_bib37 article-title: Efficient factoring based on partial information – volume: 35 start-page: 817 issue: 2 year: 2011 ident: 10.1016/j.engappai.2025.110168_bib25 article-title: A new method for solving fully fuzzy linear programming problems publication-title: Appl. Math. Model. doi: 10.1016/j.apm.2010.07.037 – volume: 186 year: 2021 ident: 10.1016/j.engappai.2025.110168_bib42 article-title: Extended XOR-based visual cryptography schemes by integer linear program publication-title: Signal Process. doi: 10.1016/j.sigpro.2021.108122 – start-page: 773 year: 2004 ident: 10.1016/j.engappai.2025.110168_bib9 article-title: A game-theoretic model for two-party cryptographic protocols – volume: 46 start-page: 203 year: 1999 ident: 10.1016/j.engappai.2025.110168_bib7 article-title: Twenty years of attacks on the RSA cryptosystem publication-title: Not. Am. Math. Soc. – volume: vol. 258 year: 2014 ident: 10.1016/j.engappai.2025.110168_bib14 article-title: Cryptanalytic attacks and countermeasures on RSA – year: 1982 ident: 10.1016/j.engappai.2025.110168_bib39 – volume: 88 year: 2023 ident: 10.1016/j.engappai.2025.110168_bib33 article-title: Evaluation of the treatment options for COVID-19 patients using generalized hesitant fuzzy- multi criteria decision making techniques publication-title: Soc. Econ. Plann. Sci. doi: 10.1016/j.seps.2023.101614 |
| SSID | ssj0003846 |
| Score | 2.4208257 |
| Snippet | One of the basic tasks in public key cryptosystems is to determine the secret parameters. This paper proposes multi-objective interval linear programming and... |
| SourceID | crossref elsevier |
| SourceType | Index Database Publisher |
| StartPage | 110168 |
| SubjectTerms | Adleman public key cryptosystem Fully fuzzy linear programming Interval linear programming Multi-objective optimization Public key cryptosystem Rivest Shamir |
| Title | Optimizing the selection of the secret parameters for public key cryptosystems by using interval linear programming and fully fuzzy linear programming |
| URI | https://dx.doi.org/10.1016/j.engappai.2025.110168 |
| Volume | 144 |
| WOSCitedRecordID | wos001422250600001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 issn: 0952-1976 databaseCode: AIEXJ dateStart: 19950201 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.sciencedirect.com omitProxy: false ssIdentifier: ssj0003846 providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELag5cCF8lQfgObAbZWSd-JjVRUBQgWJIu0tcpwEbaXNrpIUdfeH9Pd2xhNvUlgJEOJiRZbjRJkvzufJzDdCvMnDMgp0FDhId1MnDIvcUbmSjg5jTyd5FBesrv8pOT9Pp1P5pQ8rak05gaSu0-trufyvpsY-NDalzv6FuTeTYgceo9GxRbNj-0eG_4yLwHy2tmlQrSl009NC7kCi2E1I83tOsTBGkMHKXeMrPdHNatktWOK5JXp61XLiC0VHokWJmJJANkd2zW2WIznyV9iu16stQ-78ARg0ECfjH-gmJqExwUumlMhILXRwuHL6RNuosb_CjyhgizM22YlmE2mGqCX2RvqOJ7kUzGZhZmXIXxZ59jdcHpf1d7xJNTumy1A-g8cVen4S0P5Kk9PcyPZoyPS-2PWTSOIyvnvy4Wz6cfPlDlJO7LI3M8oo33617WRmRFAuHotH_c4CThgRT8S9sn4q9vpdBvRreItdtpCH7XsmbgbMAEIENpiBRdV3EGZgwAwgZoAxA4gZuIMZyFdgMAMWM8CAgBEgADEDBjNgMLNlyHPx7d3Zxel7py_Y4WjcRXeOTqSfRjE-6VC7voqUKoO4inPpVb4rQ1XEkXS1VyErRF6aVmiRnJJgKBIEeaIOXoidelGX-wLSQvkSdw-56xVhpFypkUaRPht-f_CzlB6It_bJZ0vWZclswOJlZm2Vka0yttWBkNZAWc8umTVmiKvfnHv4D-ceiYfDa_BS7HTNVflKPNA_ulnbvO4heAv6Y6wi |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Optimizing+the+selection+of+the+secret+parameters+for+public+key+cryptosystems+by+using+interval+linear+programming+and+fully+fuzzy+linear+programming&rft.jtitle=Engineering+applications+of+artificial+intelligence&rft.au=Bas%2C+Esra&rft.date=2025-03-15&rft.pub=Elsevier+Ltd&rft.issn=0952-1976&rft.volume=144&rft_id=info:doi/10.1016%2Fj.engappai.2025.110168&rft.externalDocID=S095219762500168X |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0952-1976&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0952-1976&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0952-1976&client=summon |