A combining encryption and decryption algorithm based on neural networks, cross-variation and FFT

被引:0
|
作者
Huang, Guangqiu [1 ]
Wei, Fang [1 ]
机构
[1] Xian Univ Architecture & Technol, Sch Management, Xian 710055, Peoples R China
关键词
block encryption; neural networks; cross-variation algorithm; fast Fourier transformation;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
Diversity and aperiodicity of populations generated by genetic algorithm and high nonlinearity of fast Fourier transformation (FFI) are absorbed to create a new method of encryption and decryption of important data based on neural networks, cross-variation and FFT algorithm. Through the cross-variation operation of key sequence, the model improves nonlinear relationship between key and initial random seeds; transformation of part of ciphertext avoids the ciphertext-only attack efficiently. The whole model enhances periodicity of key sequence and complexity of the algorithm. Because of realizing the genuine "one-time pad", it can ensure that the encryption system has a very high security standard.
引用
收藏
页码:1380 / 1387
页数:8
相关论文
共 50 条
  • [21] Targeted Fully Homomorphic Encryption Based on a Double Decryption Algorithm for Polynomials
    Yatao Yang
    Shuang Zhang
    Junming Yang
    Jia Li
    Zichen Li
    TsinghuaScienceandTechnology, 2014, 19 (05) : 478 - 485
  • [22] FPGA Based Hardware Implementation of AES Rijndael Algorithm for Encryption and Decryption
    Srinivas, N. S. Sai
    Akramuddin, Md.
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 1769 - 1776
  • [23] Harris hawks optimization based on global cross-variation and tent mapping
    Chen, Lei
    Song, Na
    Ma, Yunpeng
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (05): : 5576 - 5614
  • [24] Targeted Fully Homomorphic Encryption Based on a Double Decryption Algorithm for Polynomials
    Yang, Yatao
    Zhang, Shuang
    Yang, Junming
    Li, Jia
    Li, Zichen
    TSINGHUA SCIENCE AND TECHNOLOGY, 2014, 19 (05) : 478 - 485
  • [25] Design and Implement of a Logistic Chaotic Encryption and Pseudo Decryption Algorithm based on FPGA
    Wu, Hong
    Mu, Shuang
    Jie, Baihao
    PROCEEDINGS OF 2015 INTERNATIONAL CONFERENCE ON ESTIMATION, DETECTION AND INFORMATION FUSION ICEDIF 2015, 2015, : 220 - 224
  • [26] A Comparison between Symmetric and Asymmetric Key Encryption Algorithm based Decryption Mixnets
    Ahmad, Sahan
    Alam, Kazi Md Rokibul
    Rahman, Habibur
    Tamura, Shinsuke
    2015 INTERNATIONAL CONFERENCE ON NETWORKING SYSTEMS AND SECURITY (NSYSS), 2015, : 194 - 198
  • [27] Digital Image Encryption and Decryption Algorithm Based on Wavelet Transform and Chaos System
    Li, Xiaofeng
    Zhang, Yinhui
    PROCEEDINGS OF 2016 IEEE ADVANCED INFORMATION MANAGEMENT, COMMUNICATES, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IMCEC 2016), 2016, : 253 - 257
  • [28] Modified Symmetric Block Encryption-Decryption Algorithm Based on Modular Arithmetic
    Biyashev, Rustem
    Nyssanbayeva, Saule
    Haumen, Armanbek
    Kapalova, Nursulu
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON ADVANCED MATERIALS SCIENCE AND ENVIRONMENTAL ENGINEERING, 2016, 52 : 263 - 265
  • [29] Annotations for symmetric probabilistic encryption algorithm based on chaotic attractors of neural networks
    Liu N.-S.
    Guo D.-H.
    Optoelectronics Letters, 2010, 6 (1) : 57 - 60
  • [30] Annotations for symmetric probabilistic encryption algorithm based on chaotic attractors of neural networks
    刘年生
    郭东辉
    Optoelectronics Letters, 2010, 6 (01) : 57 - 60