ryptography is the exchange of information among the users without leakage of information to others. Many public key cryptography are available which are based on number theory but it has the drawback of requirement of large computational power, complexity and time consumption during generation of key [1].
Cryptosystems are commonly used for protecting the integrity, confidentiality, and authenticity of information resources. In addition to meeting standard specifications relating to encryption and decryption, such systems must meet increasingly stringent specifications concerning information security. This is mostly due to the steady demand to protect data and resources from disclosure, to guarantee the authenticity of data, and to protect systems from web based attacks. For these reasons, the development and evaluation of cryptographic algorithms is a challenging task [2].
This paper is study and performance of ANN Based Chaotic Generator in the filed of Cryptography. The rest of the paper is organized as follows: section 2 discusses background and related work in the field of chaotic neural network based cryptography, section 3
Author ? ? ? : VITS Jabalpur, University of R.G.P.V. Bhopal M.P. e-mails: [email protected], [email protected] discusses implementation section 4 discusses experimental report and test result and finally section 5 discusses conclusion.
Ilker DALKIRAN, Kenan DANIS¸MAN introduced a research paper on Artificial neural network based chaotic generator for cryptology. In this paper, to overcome disadvantages of chaotic systems, the dynamics of Chua's circuit namely x, y and z were modeled using Arti ficial Neural Network (ANN). ANNs have some distinctive capabilities like learning from experiences, generalizing from a few data and nonlinear relationship between inputs and outputs. The proposed ANN was trained in diffrent structures using different learning algorithms. To train the ANN, 24 different sets including the initial conditions of Chua's circuit were used and each set consisted of about 1800 input-output data. The experimental results showed that a feedforward Multi Layer Perceptron (MLP), trained with Bayesian Regulation back propagation algorithm, was found as the suitable network structure. As a case study, a message was first encrypted and then decrypted by the chaotic dynamics obtained from the proposed ANN and a comparison was made between the proposed ANN and the numerical solution of Chua's circuit about encrypted and decrypted messages [
In Cryptography, secret key generation scheme was proposed by ANN based Chaotic Generator. ANN based chaotic Generator system used chaotic neural network scheme for encryption and decryption [7]. In this paper ANN based chaotic generator is proposed for data encryption and decryption, it produces the outputs according to initial conditions and control parameter .We improve the level of performance of chaos based cryptography [10] using binary value of ASCII Code of A to Z letter instead of decimal value. A plain-text was encrypted and then obtained cipher text was decrypted by using the chaotic dynamics (control parameter and initial point), initial condition and control parameter act as a secret key in the field of cryptography. It is accepted that the initial conditions which were used in the training phase of the ANN model and the system parameters are known by both the transmitter and the receiver.
We adopted ANN based chaotic generator approach from et.al. [3] and increase the level of security from et. al.
[10] and demonstrate by experimental result.
A network is called chaotic neural network if its weights and biases are determined by chaotic sequence. In this section we use a algorithm for performing encryption and decryption using chaotic neural network. ANN based chaotic generator Using CNN scheme for encryption and decryption.
Step 1. The chaotic Logistic map.
Step 2. The secret key is the control parameter ? and the initial point x (0) of the Logistic map, which are all Lbit binary decimals. Determine parameter ? and initial point x (0).
Step 3. The initialization procedure:
Generate the chaotic sequence x(1), x(2), x(3)? .
. Step 4. The encryption procedure:
Depending upon the chaotic sequence a weight matrix and a bias matrix is obtained and the net input is obtained. Then a hard limiter is applied as a transfer function in order to obtain the digital encrypted data. For decryption the same network is used and the same initial value is used to generate the chaotic sequence and for decrypting the data successfully. Step 5. The decryption procedure The decryption procedure is the same as the above one except that the input signal to the decryption Chaotic neural network should be g'(n) and its output signal should be g"(n). V.
It is clear that the binary value sequence of ASCII CODE is encrypted and decrypted correctly by knowing the exact values of x (0) and µ otherwise we get the wrong value sequences .And also clear that the binanry value is more strong enough as compre to decimal values. In this paper we successfully perform encryption and decryption with the help of Chaotic neural network and improve the level of security with the help of using binanry value of ASCII Code instead of decimal values . Network was trained with the help of back propagation algorithm in neural network. Above experiment clear that the Binary value of ASCII CODE is encrypted and its decrypted with same value of parameter , encrypted value is decrypt only correctly by knowing the exact values of x (0) and µ otherwise we get the wrong generated value sequences . ANN based Chaotic generator provide high range of security in the field of cryptography.
NETWORKS IN CRYPTOSYSTEMS. This paper presents | ||||
a review of the literature on the use of artificial neutral | ||||
networks in cryptography. Different neural network | ||||
based approaches have been categorized based on | ||||
their applications to different components of | ||||
cryptosystems such as secret key protocols, visual | ||||
cryptography, design of random generators, digital | ||||
watermarking, and steganalysis[2]. | ||||
KARAM M. Z. OTHMAN , MOHAMMED H. AL | ||||
JAMMAS introduced IMPLEMENTATION OF NEURAL - | ||||
CRYPTOGRAPHIC SYSTEM USING FPGA. In this work, | ||||
a Pseudo Random Number Generator (PRNG) based on | ||||
artificial Neural Networks (ANN) has been designed. | ||||
This PRNG has been used to design stream cipher | ||||
system with high statistical randomness properties of its | ||||
key sequence using ANN. Software simulation has been | ||||
build using MATLAB to firstly, ensure passing four well- | ||||
known statistical tests that guaranteed randomness | ||||
characteristics [6]. | ||||
An Empirical Investigation of Using ANN Based | ||||
N- | ||||
Keywords: ann based chaotic generator, chaotic neural | ||||
network, cryptography. | ||||
3]. | ||||
Jason L. Wright , Milos Manic Proposed a | ||||
research paper on | Neural Network Approach to | |||
Locating Cryptography in Object Code. In this paper, | ||||
artificial neural networks are used to classify functional | ||||
blocks from a disassembled program as being either | ||||
cryptography related or not. The resulting system, | ||||
referred to as NNLC (Neural Net for Locating | ||||
Cryptography) is presented and results of applying this | ||||
system to various libraries are described.[4]. | ||||
Eva | Volna, | Martin | Kotyrba, | Vaclav |
Kocian,Michal Janosek developed a CRYPTOGRAPHY | ||||
BASED ON NEURAL NETWORK. This paper deals with | ||||
using neural network in cryptography, e.g. designing | ||||
such neural network that would be practically used in | ||||
the area of cryptography. This paper also includes an | ||||
experimental demonstration [5]. |
Nawgaje-a triple-key chaotic neural network for cryptography in image processing. International Journal of Engineering Sciences & Emerging Technologies 2231 -6604. April 2012. 2 (1) p. .