Affine Neural Network Cryptography
DOI:
https://doi.org/10.26438/ijcse/v6i5.448453Keywords:
affine, encryption, decryption, chaotic, neural, networkAbstract
In the recent years the main concern in computers and internet has been information security. Researchers and developers are mainly concerned with services which provides secure exchange of information over the internet and networks. The focus has been on 3 security triads: Confidentiality, Integrity, and Availability. The one simple way of achieving security is by the use of cryptography. There are number of features a chaotic systems possess and can be utilized within cryptography. Features like sensitivity to initial conditions/system parameters,ergodicity, mixing properties, deterministic dynamics, and structure complexity. Cryptosystems which are chaos based as compare to conventional provide high levels of security and yields betterresults [2].In this paper a hybrid approach using the concept of affine cipher and chaotic neural network (CNN) is proposed. Data is first encrypted using affine cipher and result of this is fed to the CNN. The reverse operation is performed for decryption. The experiment was carried out in MATLAB 2012a. Secrecy of the proposed work comes from the fact that total four keys need to be kept secret: two from affine and two from CNN. Further the chaos as part of CNN also add to the security.
References
Aihara, K., Takabe, T., & Toyoda, M. (1990). Chaotic neural networks. Physics Letters A, 144(6–7), 333–340. http://doi.org/10.1016/0375-9601(90)90136-C
Singla, P., Sachdeva, P., & Ahmad, M. (2014). A Chaotic Neural Network Based Cryptographic Pseudo-Random Sequence Design. 2014 Fourth International Conference on Advanced Computing & Communication Technologies, 301–306. http://doi.org/10.1109/ACCT.2014.38
Lokesh, S., &Kounte, M. R. (2016). Chaotic neural network based pseudo-random sequence generator for cryptographic applications. Proceedings of the 2015 International Conference on Applied and Theoretical Computing and Communication Technology, ICATccT 2015, 1–5. http://doi.org/10.1109/ICATCCT.2015.7456845
Abdoun, N., El Assad, S., Taha, M. A., Assaf, R., Deforges, O., & Khalil, M. (2016). Secure Hash Algorithm based on Efficient Chaotic Neural Network. 2016 International Conference on Communications (COMM), 405–410. http://doi.org/10.1109/ICComm.2016.7528304
Kaur, H., &Panag, T. S. (2011). Cryptography using chaotic neural network, 4(2), 417–422. http://doi.org/10.5923/j.ajsp.20140401.04
Kaur, H., &Panag, T. S. (2011). Cryptography using chaotic neural network, 4(2), 417–422. http://doi.org/10.5923/j.ajsp.20140401.04
Qin, K., &Oommen, B. J. (n.d.). Cryptanalysis of a cryptographic Algorithm that Utilize Chaotic Neural Network, (61300093), 1–8.
Yu, W., & Cao, J. (2006). Cryptography based on delayed chaotic neural networks. Physics Letters, Section A: General, Atomic and Solid State Physics, 356(4–5), 333–338. http://doi.org/10.1016/j.physleta.2006.03.069
Dalkıran, İ., &Danışman, K. (2010). Artificial neural network based chaotic generator for cryptology. Turk J Elec Eng& Comp Sci, 18(2), 225–240. http://doi.org/10.3906/elk-0907-140
Crook, N., & Scheper, T. O. (2001). A Novel Chaotic Neural Network Architecture. ESANN’2001 Proceedings - European Symposium on Artificial Neural Networks, (April), 295–300. http://doi.org/10.1109/TNN.2009.2015943
He, Z., Zhang, Y., & Yang, L. (1999). The Study of Chaotic Neural Network and its Applications in Associative Memory. Neural Processing Letters, 163–175.
Singh, J., Shyam, P., & Yadav, S. (2014). Implementation of Caesar Cipher and Chaotic Neural network by using MATLAB Simulator, 2(6), 16–20.
Chauhan, M., & Prajapati, R. (2014). Image Encryption Using Chaotic Cryptosystems and Artificial Neural Network Cryptosystems: A Review, 5(5), 52–55.
Mhetras, A., &Charniya, N. (2016). Cryptography based on Artificial Neural Networks and Chaos Theory. International Journal of Computer Applications, 133(4), 25–30. http://doi.org/10.5120/ijca2016907743
Jain, A., & Rajpal, N. (2012). Cryptanalysis of a Chaotic Neural Network Based Chaotic Cipher. Proc. Int. Conf. on Control System and Power Electronics, CSPE, 333, 538–544.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
