Cryptography Based On Neural Network
2012, ECMS 2012 Proceedings edited by: K. G. Troitzsch, M. Moehring, U. Lotzmann
https://doi.org/10.7148/2012-0386-0391Abstract
The goal of cryptography is to make it impossible to take a cipher and reproduce the original plain text without the corresponding key. With good cryptography, your messages are encrypted in such a way that brute force attacks against the algorithm or the key are all but impossible. Good cryptography gets its security by using incredibly long keys and using encryption algorithms that are resistant to other form attack. The neural net application represents a way of the next development in good cryptography. This paper deals with using neural network in cryptography, e.g. designing such neural network that would be practically used in the area of cryptography. This paper also includes an experimental demonstration.
FAQs
AI
What advantages does neural cryptography offer compared to traditional methods?
Neural cryptography demonstrates high resistance to breaking due to the secret-key nature of its weights and architecture, making unauthorized decryption challenging. Additionally, it shows noise tolerance, allowing encrypted messages to maintain accuracy even with minor alterations.
How does the backpropagation algorithm contribute to encryption processes in neural networks?
The backpropagation algorithm enables effective weight adjustment within neural networks, facilitating robust learning through minimizing error signals. This approach ensures reliable encryption and decryption cycles, as evidenced by zero errors in the provided encryption tests.
What is the structure of the proposed neural network for encryption tasks?
The proposed neural network consists of three layers: an input layer with 6 nodes, a hidden layer with 6 nodes, and an output layer, also with 6 nodes. This multilayer design effectively supports the transformation of 6-bit plain text into cipher text.
What limitations are noted for the ANN-based encryption system?
A significant limitation of the ANN-based encryption system is its vulnerability if either the weights or architecture is compromised, which could easily facilitate decryption. The key's effectiveness relies on having both components, emphasizing the need for strict security measures.
How does the training method enhance the neural network's performance in cryptography?
Using carefully designed training sets based on binary representations of symbols ensures the neural network learns effectively, improving encryption and decryption accuracy. The application of adaptive weights through the training process allows the network to generate secure, dynamic cryptographic keys.
References (10)
- Fausett, L.V. 1994 Fundamentals of Neural Networks. Prentice-Hall, Inc., Englewood Cliffs, New Jersey Ferguson, N., Schneier, B., Kohno, T. 2010 Cryptography Engineering: Design Principles and Practical Applications. Wiley Publishing ISBN:0470474246 9780470474242
- Garfinger, S. 1998. PGP: Pretty Good Privanci. Computer Press, Praha.
- Kanter, I., Kinzel, W., 2002. Neural cryptography. In: Proceedings of the 9th International conference on Neural Information Processing. Singapore.
- Khaled, M. Noaman, G., Jalab, H.A. 2005. Data security based On neural networks. TASK Quarterly 9 No 4, pp. 409-414
- Kinzel, W., 2002 Theory of Interacting Neural Network. Preprint [cont.-mat/020454].
- Prabakaran, N., Loganathan, P. and Vivekanandan, P. 2008. Neural Cryptography with Multiple Transfers Functions and Multiple Learning Rule. International Journal of Soft Computing, 3: 177-181.
- Ruttor, A., Reents, G., Kinzel, W. 2004. Synchronization of random walk with reflecting boundaries. J. Phys. A: Math.Gen, 37: 8609 [cont- mat/0405369].
- Seung, S. 2002. Multilayer perceptrons and backpropagation learning. 9.641 Lecture 4. 1-6. Available from: http://hebb.mit.edu/courses/9.641/2002/lectures/lect ure04.pdf
- Volná, E. 2000. Using Neural network in cryptography. In P. Sinčák, J. Vaščák, V. Kvasnička, R. Mesiar (eds.): The State of the Art in Computational Intelligence. Physica-Verlag Heidelberg. pp.262- 267. ISBN 3-7908-1322-2, ISSN 1615-3871.
- Ruttor, A., Kanter, I., Kinzel, W, 2006. Dynamics of neural cryptography. [cont-mat/061257/21].