<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                                                <journal-id>jnrs</journal-id>
            <journal-title-group>
                                                                                    <journal-title>Journal of New Results in Science</journal-title>
            </journal-title-group>
                                        <issn pub-type="epub">1304-7981</issn>
                                                                                            <publisher>
                    <publisher-name>Tokat Gaziosmanpasa University</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id/>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Symbolic Calculation</subject>
                                                            <subject>Mathematical Logic, Set Theory, Lattices and Universal Algebra</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Sembolik Hesaplama</subject>
                                                            <subject>Matematiksel Mantık, Kümeler Teorisi, Kafesler ve Evrensel Cebir</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                                                            <article-title>Partitioned Soft Sets and Their Application to Cryptology</article-title>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0003-3037-1868</contrib-id>
                                                                <name>
                                    <surname>Çağman</surname>
                                    <given-names>Naim</given-names>
                                </name>
                                                                    <aff>TOKAT GAZİOSMANPAŞA ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0009-0001-3661-3779</contrib-id>
                                                                <name>
                                    <surname>Çifçi</surname>
                                    <given-names>Fikret</given-names>
                                </name>
                                                                    <aff>TOKAT GAZİOSMANPAŞA ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0009-0000-6906-9020</contrib-id>
                                                                <name>
                                    <surname>Kanat</surname>
                                    <given-names>İbrahim Halil</given-names>
                                </name>
                                                                    <aff>TOKAT GAZİOSMANPAŞA ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20260430">
                    <day>04</day>
                    <month>30</month>
                    <year>2026</year>
                </pub-date>
                                        <volume>15</volume>
                                        <issue>1</issue>
                                        <fpage>15</fpage>
                                        <lpage>28</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20250604">
                        <day>06</day>
                        <month>04</month>
                        <year>2025</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20260210">
                        <day>02</day>
                        <month>10</month>
                        <year>2026</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2012, Journal of New Results in Science</copyright-statement>
                    <copyright-year>2012</copyright-year>
                    <copyright-holder>Journal of New Results in Science</copyright-holder>
                </permissions>
            
                                                                                                                        <abstract><p>Soft set theory, introduced by Molodtsov in 1999, is a mathematical tool for dealing with uncertainty and vagueness in a parameterized way. Cryptology is a method of protecting information and communications so that only those for whom the information is intended can read and process it. In this article, we defined partitioned soft sets, which represent a new concept in soft set theory. Using these partitioned soft sets, we then constructed a new type of cipher method called a soft cipher. It is a variation of a cipher method. Finally, we developed a computer program with examples for the soft cipher method.</p></abstract>
                                                            
            
                                                                                        <kwd-group>
                                                    <kwd>Soft sets</kwd>
                                                    <kwd>  partitioned soft sets</kwd>
                                                    <kwd>  cryptology</kwd>
                                                    <kwd>  caesar cipher</kwd>
                                                    <kwd>  soft cipher</kwd>
                                            </kwd-group>
                            
                                                                                                                                                    </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">D. Molodstov, Soft set theory-first results, Computers and Mathematics with Applications 37 (4-5) (1999) 19–31.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">H. Aktaş, N. Çağman, Soft sets and soft groups, Information Science 177 (13) (2007) 2726–2735.</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">U. Acar, F. Koyuncu, B. Tanay, Soft sets and soft rings, Computers and Mathematics with Applications 59 (11) (2010) 3458–3463.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">D. Singh, I. A. Onyeozili, On the ring structure of soft set theory, International Journal of Scientific and Technology Research 2 (3) (2013) 96–101.</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">Y. Yang, X. Xin, P. He, Applications of soft union sets in the ring theory, Journal of Applied Mathematics 2013 (1) (2013) 474890.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">P. K. Maji, A. R. Roy, R. Biswas, An application of soft sets in a decision making problem, Computers Mathematics with Applications 44 (8-9) (2002) 1077–1083.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">F. Fatimah, D. Rosadi, R. F. Hakim, J. C. R. Alcantud, Probabilistic soft sets and dual probabilistic soft sets in decision-making, Neural Computing and Applications 31 (1) (2019) 397–407.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">Y. Liu, K. Qin, L. Mart´ınez, Improving decision making approaches based on fuzzy soft sets and rough soft sets, Applied Soft Computing 65 (2018) 320–332.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">Y. B. Jun, C. H. Park, Applications of soft sets in Hilbert algebras, Iranian Journal of Fuzzy Systems 6 (2) (2009) 75–86.</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">P. Yadav, R. Singh, El-Algebra in soft sets, Journal of Algebraic Statistics 13 (2) (2022) 1455–1462.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">J. Zhan, Y. B. Jun, Soft BL-algebras based on fuzzy sets, Computers and Mathematics with Applications 59 (6) (2010) 2037–2046.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">N. Çağman, S. Karataş, S. Enginoglu, Soft topology, Computers and Mathematics with Applications 62 (1) (2011) 351–358.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">S. Enginoğlu, N. Çağman, S. Karataş, T. Aydın, On soft topology, El-Cezeri Journal of Science and Engineering 2 (3) (2015) 23–38.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">Z. Li, T. Xie, The relationship among soft sets, soft rough sets and topologies, Soft Computing 18 (4) (2014) 717–728.</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">S. Singh, The code book: The science of secrecy from ancient Egypt to quantum cryptography, Doubleday, 1999.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">D. Kahn, The codebreakers: The story of secret writing, Macmillan, 1967.</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">B. Schneier, Applied cryptography: Protocols, algorithms, and source code in C, 2nd Edition, John Wiley &amp; Sons, 1996.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">N. Çağman, Integer theory and applications (in Turkish: Tamsayılar teorisi ve uygulamaları), Kutlu Yayinevi, 2025.</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">A. Sinkov, Elementary cryptanalysis – A mathematical approach, Vol 22, 2nd Edition, The Mathematical Association of America, 1966.</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">C. Paar, J. Pelzl, Understanding cryptography: A textbook for students and practitioners, 1st Edition, Springer, 2010.</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">J. H. Silverman, J. Pipher, J. Hoffstein, An introduction to mathematical cryptography, 1st Edition, Springer, 2008.</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">W. Stallings, Cryptography and network security: Principles and practice, Global Edition, 8th Edition, Pearson, 2024.</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">F. Çifçi, Decomposed soft sets and soft encryption, Master’s Thesis Gaziosmanpaşa University (2024) Tokat.</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">N. Çağman, Contributions to the theory of soft sets, Journal of New Results in Science 3 (4) (2014) 33–41.</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">S. J. John, Soft sets, Soft Sets: Theory and Applications, Vol. 400 of Studies in Fuzziness and Soft Computing, Springer, 2021, pp. 3–36.</mixed-citation>
                    </ref>
                                    <ref id="ref26">
                        <label>26</label>
                        <mixed-citation publication-type="journal">P. K. Maji, R. Biswas, A. R. Roy, Soft set theory, Computers and Mathematics with Applications 45 (4-5) (2003) 555–562.</mixed-citation>
                    </ref>
                                    <ref id="ref27">
                        <label>27</label>
                        <mixed-citation publication-type="journal">N. Polat, Soft set theory applications: Time series as soft sets and ratio based similarity measure on soft sets, AIMS Mathematics 10 (9) (2025) 21994–22022.</mixed-citation>
                    </ref>
                                    <ref id="ref28">
                        <label>28</label>
                        <mixed-citation publication-type="journal">N. Demirta¸s, O. Dalkılı¸c, Bipolar fuzzy soft set theory applied to medical diagnosis, Turkish Journal of Mathematics and Computer Science 16 (2) (2024) 314–324.</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
