Design and investigation of a chaotic neural network architecture for cryptographic applications

被引:8
|
作者
Bevi, A. Ruhan [1 ]
Tumu, Sriharini [1 ]
Prasad, N. Varsha [1 ]
机构
[1] SRM Inst Sci & Technol, Dept ECE, Kattankulathur 603203, India
关键词
Chaotic neural network; Memristor; Nonlinear equations; Cubic map; 2D Logistic map; Encryption;
D O I
10.1016/j.compeleceng.2018.09.015
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Artificial neural networks are an integral part of emerging technologies, and ongoing research has shown that they can be applied to a variety of applications. This paper proposes a new cryptographic algorithm using chaotic neural networks, whose function is enhanced by construction with polynomials that exhibit chaos, namely, nonlinear Her mite and Chebyshev polynomials. These polynomials incorporate a memristor conductance, which is used as an activation function in the chaotic neural networks. Further, a function of the weights obtained from the chaotic neural networks, is used to generate the initial values that are used in the cryptographic process. The encryption algorithm employed here is inspired by the Lai-Massey block cipher with cubic and two-dimensional logistic maps, and the evaluation of these chaotic equations is performed using correlation values. The correlation values between the cipher and plain text are also examined to determine the undecipherability of the message to be sent on a public channel. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:179 / 190
页数:12
相关论文
共 50 条
  • [1] Design of Chaotic Neural Network Based Method for Cryptographic Substitution Box
    Ahmad, Musheer
    Malik, Manish
    [J]. 2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 864 - 868
  • [2] A Chaotic Neural Network Based Cryptographic Pseudo-Random Sequence Design
    Singla, Prateek
    Sachdeva, Payal
    Ahmad, Musheer
    [J]. 2014 FOURTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION TECHNOLOGIES (ACCT 2014), 2014, : 301 - 306
  • [3] Chaotic Neural Network Based Pseudo-Random Sequence Generator for Cryptographic Applications
    Lokesh, S.
    Kounte, Manjunath R.
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2015, : 1 - 5
  • [4] Design of a novel asynchronous reconfigurable architecture for cryptographic applications
    Sun, Kang
    Pan, Xuezeng
    Wang, Jiebing
    Wang, Jimin
    [J]. FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 751 - +
  • [5] Design of a Chaotic Neural Network by Using Chaotic Nodes and NDRAM Network
    Taherkhani, A.
    Mohammadi, A.
    Seyyedsalehi, S. A.
    Davande, H.
    [J]. 2008 IEEE INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, VOLS 1-8, 2008, : 3500 - 3504
  • [6] Design of a novel chaotic neural network based encryption system for security applications
    Baalaaji, Arun
    Bevi, Ruhan
    [J]. JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2021, 44 (05) : 424 - 439
  • [7] On Chaotic Neural Network Design: A New Framework
    Qin, Ke
    [J]. NEURAL PROCESSING LETTERS, 2017, 45 (01) : 243 - 261
  • [8] Artificial Neural Network Architecture Design for EEG Time Series Simulation Using Chaotic System
    Zhang, Lei
    [J]. 2018 JOINT 7TH INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION (ICIEV) AND 2018 2ND INTERNATIONAL CONFERENCE ON IMAGING, VISION & PATTERN RECOGNITION (ICIVPR), 2018, : 388 - 393
  • [9] On Chaotic Neural Network Design: A New Framework
    Ke Qin
    [J]. Neural Processing Letters, 2017, 45 : 243 - 261
  • [10] The design of a cryptographic security architecture
    Gutmann, P
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE EIGHTH USENIX SECURITY SYMPOSIUM (SECURITY '99), 1999, : 153 - 168