FUZZY-LOGIC-DRIVEN APPROACH FOR SECURE TEXT ENCRYPTION

Authors:

Desam Vamsi,Anupama Namburu,

DOI NO:

https://doi.org/10.26782/jmcms.2026.03.00003

Keywords:

Fuzzy Logic,SPN Cryptography,IND-CPA Security,Avalanche Effect,Conditional Entropy,

Abstract

This research introduces an innovative text encryption method based on fuzzy logic, featuring per-session key generation using Ks = HMAC- SHA256(Km, N || session_id), non-deterministic character substitution, and six rounds of Substitution-Permutation Network processing on 8-character blocks. The design eliminates positional leakage through cross-block diffusion and secret-dependent transformations while providing provable IND-CPA security with adversary advantage bounded by 2???. Extensive testing confirms 49.7% ± 1.2% avalanche effect, conditional entropy H(C|P) = 3.91 bits/character (91% of theoretical 4.32 maximum), and 17.3?s encryption time for 8-byte blocks on standard computing platforms.

Refference:

I. An, Haoyang, et al. "An identity-based dynamic group signature scheme for reputation evaluation systems." Journal of Systems Architecture 139 (2023): 102875. 10.1016/j.sysarc.2023.102875
II. Arogundade, Oluwasanmi Richard. "Network security concepts, dangers, and defense best practical." Computer Engineering and Intelligent Systems 14.2 (2023). 10.7176/CEIS/14-2-03
III. Bardin, Jeffrey S. "Cyber warfare." Computer and Information Security Handbook. Morgan Kaufmann, 2025. 1345-1380. 10.1016/B978-0-443-13223-0.00087-4
IV. Cascavilla, Giuseppe, Damian A. Tamburri, and Willem-Jan Van Den Heuvel. "Cybercrime threat intelligence: A systematic multi-vocal literature review." Computers & Security 105 (2021): 102258. 10.1016/j.cose.2021.102258
V. Dhawan, Sachin, et al. "Secure and resilient improved image steganography using hybrid fuzzy neural network with fuzzy logic." Journal of Safety Science and Resilience 5.1 (2024): 91-101. 10.1016/j.jnlssr.2023.12.003
VI. Ge, Xinrui, et al. "Enabling efficient verifiable fuzzy keyword search over encrypted data in cloud computing." IEEE Access 6 (2018): 45725-45739. 10.1109/ACCESS.2018.2866031
VII. Gupta, Brij B., Akshat Gaurav, and Varsha Arya. "Fuzzy logic and biometric-based lightweight cryptographic authentication for metaverse security." Applied Soft Computing 164 (2024): 111973. 10.1016/j.asoc.2024.111973
VIII. Jin, Jie, et al. "A fuzzy activation function based zeroing neural network for dynamic Arnold map image cryptography." Mathematics and Computers in Simulation 230 (2025): 456-469. 10.1016/j.matcom.2024.10.031
IX. Kchaou, Mourad, et al. "Security control for a fuzzy system under dynamic protocols and cyber-attacks with engineering applications." Mathematics 12.13 (2024): 2112. 10.3390/math12132112
X. Kritika, Er. "A comprehensive literature review on ransomware detection using deep learning." Cyber Security and Applications 3 (2025): 100078. 10.1016/j.csa.2024.100078
XI. Malik, Manisha, Maitreyee Dutta, and Jorge Granjal. "A survey of key bootstrapping protocols based on public key cryptography in the Internet of Things." IEEE Access 7 (2019): 27443-27464. 10.1109/ACCESS.2019.2900957
XII. Muthumeenakshi, M., T. Archana, and P. Muralikrishna. "Fuzzy application in secured data transmission." International Journal of Pure and Applied Mathematics 116.3 (2017): 711-715. 10.12732/ijpam.v116i3.17
XIII. Rana, Subhabrata, et al. "A comprehensive survey of cryptography key management systems." Journal of Information Security and Applications 78 (2023): 103607. 10.1016/j.jisa.2023.103607
XIV. Ratnavelu, Kuru, et al. "Image encryption method based on chaotic fuzzy cellular neural networks." Signal Processing 140 (2017): 87-96. 10.1016/j.sigpro.2017.05.002
XV. ?anl?baba, ?brahim. "Full-fuzzy soft sets and application of absolute aggregation amount." Information Sciences (2025): 122885. 10.1016/j.ins.2025.122885
XVI. Ullah, Shamsher, et al. "Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey." Computer Science Review 47 (2023): 100530. 10.1016/j.cosrev.2022.100530
XVII. Vasco, María Isabel González, Florian Hess, and Rainer Steinwandt. "Combined schemes for signature and encryption: The public-key and the identity-based setting." Information and Computation 247 (2016): 1-10. 10.1016/j.ic.2015.11.001
XVIII. Yang, Chun-Wei, et al. "An improved semi-quantum secret sharing protocol with enhanced verification to counter man-in-the-middle attacks." Chinese Journal of Physics (2025). 10.1016/j.cjph.2025.07.032
XIX. Yousafzai, Faisal, et al. "Quadratic Diophantine fuzzy sentiment-based nonlinear decision-making for medical diagnostics through soft sets and cognitive maps." Results in Control and Optimization (2025): 100622. 10.1016/j.rico.2025.100622
XX. Desam, Vamsi, and Pradeep Reddy CH. "Hybrid partial differential elliptical Rubik’s cube algorithm on image security analysis." Journal of Engineering, Design and Technology 22.6 (2024): 2063-2085. 10.1108/JEDT-02-2022-0098

View Download