Open Access   Article Go Back

Affine Neural Network Cryptography

Vikas Thada1 , Utpal Shrivastava2

  1. Amity Institute of computer science and Engineering,Amity University, Haryana, India.
  2. Amity Institute of computer science and Engineering,Amity University, Haryana, India.

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-5 , Page no. 448-453, May-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i5.448453

Online published on May 31, 2018

Copyright © Vikas Thada, Utpal Shrivastava . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Vikas Thada, Utpal Shrivastava, “Affine Neural Network Cryptography,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.448-453, 2018.

MLA Style Citation: Vikas Thada, Utpal Shrivastava "Affine Neural Network Cryptography." International Journal of Computer Sciences and Engineering 6.5 (2018): 448-453.

APA Style Citation: Vikas Thada, Utpal Shrivastava, (2018). Affine Neural Network Cryptography. International Journal of Computer Sciences and Engineering, 6(5), 448-453.

BibTex Style Citation:
@article{Thada_2018,
author = {Vikas Thada, Utpal Shrivastava},
title = {Affine Neural Network Cryptography},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2018},
volume = {6},
Issue = {5},
month = {5},
year = {2018},
issn = {2347-2693},
pages = {448-453},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2002},
doi = {https://doi.org/10.26438/ijcse/v6i5.448453}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i5.448453}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2002
TI - Affine Neural Network Cryptography
T2 - International Journal of Computer Sciences and Engineering
AU - Vikas Thada, Utpal Shrivastava
PY - 2018
DA - 2018/05/31
PB - IJCSE, Indore, INDIA
SP - 448-453
IS - 5
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
408 218 downloads 185 downloads
  
  
           

Abstract

In the recent years the main concern in computers and internet has been information security. Researchers and developers are mainly concerned with services which provides secure exchange of information over the internet and networks. The focus has been on 3 security triads: Confidentiality, Integrity, and Availability. The one simple way of achieving security is by the use of cryptography. There are number of features a chaotic systems possess and can be utilized within cryptography. Features like sensitivity to initial conditions/system parameters,ergodicity, mixing properties, deterministic dynamics, and structure complexity. Cryptosystems which are chaos based as compare to conventional provide high levels of security and yields betterresults [2].In this paper a hybrid approach using the concept of affine cipher and chaotic neural network (CNN) is proposed. Data is first encrypted using affine cipher and result of this is fed to the CNN. The reverse operation is performed for decryption. The experiment was carried out in MATLAB 2012a. Secrecy of the proposed work comes from the fact that total four keys need to be kept secret: two from affine and two from CNN. Further the chaos as part of CNN also add to the security.

Key-Words / Index Term

affine, encryption, decryption, chaotic, neural, network

References

[1] Aihara, K., Takabe, T., & Toyoda, M. (1990). Chaotic neural networks. Physics Letters A, 144(6–7), 333–340. http://doi.org/10.1016/0375-9601(90)90136-C
[2] Singla, P., Sachdeva, P., & Ahmad, M. (2014). A Chaotic Neural Network Based Cryptographic Pseudo-Random Sequence Design. 2014 Fourth International Conference on Advanced Computing & Communication Technologies, 301–306. http://doi.org/10.1109/ACCT.2014.38
[3] Lokesh, S., &Kounte, M. R. (2016). Chaotic neural network based pseudo-random sequence generator for cryptographic applications. Proceedings of the 2015 International Conference on Applied and Theoretical Computing and Communication Technology, ICATccT 2015, 1–5. http://doi.org/10.1109/ICATCCT.2015.7456845
[4] Abdoun, N., El Assad, S., Taha, M. A., Assaf, R., Deforges, O., & Khalil, M. (2016). Secure Hash Algorithm based on Efficient Chaotic Neural Network. 2016 International Conference on Communications (COMM), 405–410. http://doi.org/10.1109/ICComm.2016.7528304
[5] Kaur, H., &Panag, T. S. (2011). Cryptography using chaotic neural network, 4(2), 417–422. http://doi.org/10.5923/j.ajsp.20140401.04
[6] Kaur, H., &Panag, T. S. (2011). Cryptography using chaotic neural network, 4(2), 417–422. http://doi.org/10.5923/j.ajsp.20140401.04
[7] Qin, K., &Oommen, B. J. (n.d.). Cryptanalysis of a cryptographic Algorithm that Utilize Chaotic Neural Network, (61300093), 1–8.
[8] Yu, W., & Cao, J. (2006). Cryptography based on delayed chaotic neural networks. Physics Letters, Section A: General, Atomic and Solid State Physics, 356(4–5), 333–338. http://doi.org/10.1016/j.physleta.2006.03.069
[9] Dalkıran, İ., &Danışman, K. (2010). Artificial neural network based chaotic generator for cryptology. Turk J Elec Eng& Comp Sci, 18(2), 225–240. http://doi.org/10.3906/elk-0907-140
[10] Crook, N., & Scheper, T. O. (2001). A Novel Chaotic Neural Network Architecture. ESANN’2001 Proceedings - European Symposium on Artificial Neural Networks, (April), 295–300. http://doi.org/10.1109/TNN.2009.2015943
[11] He, Z., Zhang, Y., & Yang, L. (1999). The Study of Chaotic Neural Network and its Applications in Associative Memory. Neural Processing Letters, 163–175.
[12] Singh, J., Shyam, P., & Yadav, S. (2014). Implementation of Caesar Cipher and Chaotic Neural network by using MATLAB Simulator, 2(6), 16–20.
[13] Chauhan, M., & Prajapati, R. (2014). Image Encryption Using Chaotic Cryptosystems and Artificial Neural Network Cryptosystems: A Review, 5(5), 52–55.
[14] Mhetras, A., &Charniya, N. (2016). Cryptography based on Artificial Neural Networks and Chaos Theory. International Journal of Computer Applications, 133(4), 25–30. http://doi.org/10.5120/ijca2016907743
[15] Jain, A., & Rajpal, N. (2012). Cryptanalysis of a Chaotic Neural Network Based Chaotic Cipher. Proc. Int. Conf. on Control System and Power Electronics, CSPE, 333, 538–544.