CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Cryptography based on Artificial Neural Networks and Chaos Theory

by Aditya S. Mhetras, Nadir N. Charniya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 133 - Number 4
Year of Publication: 2016
Authors: Aditya S. Mhetras, Nadir N. Charniya
10.5120/ijca2016907743

Aditya S. Mhetras, Nadir N. Charniya . Cryptography based on Artificial Neural Networks and Chaos Theory. International Journal of Computer Applications. 133, 4 ( January 2016), 25-30. DOI=10.5120/ijca2016907743

@article{ 10.5120/ijca2016907743,
author = { Aditya S. Mhetras, Nadir N. Charniya },
title = { Cryptography based on Artificial Neural Networks and Chaos Theory },
journal = { International Journal of Computer Applications },
issue_date = { January 2016 },
volume = { 133 },
number = { 4 },
month = { January },
year = { 2016 },
issn = { 0975-8887 },
pages = { 25-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume133/number4/23775-2016907743/ },
doi = { 10.5120/ijca2016907743 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:30:14.317112+05:30
%A Aditya S. Mhetras
%A Nadir N. Charniya
%T Cryptography based on Artificial Neural Networks and Chaos Theory
%J International Journal of Computer Applications
%@ 0975-8887
%V 133
%N 4
%P 25-30
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cryptography is a skill of sending the data in such a form that only those for whom it is intended can read it. There are number of methods to perform cryptography, one of such methods is Chaos theory which studies the behavior of a dynamical systems that are highly sensitive to initial conditions. Even slight changes in initial conditions result in extensively deviating outcomes for such dynamical systems, hence making long-standing estimate unmanageable. The limitations of applying Chaos Theory are choosing the input parameters and synchronization. The computation of these input parameters lies on the dynamics underlying the data and the highly complex analysis, not always accurate. Artificial neural networks (ANN) well known for learning and generalization are hence used to model the dynamics of Chua’s circuit viz. x, y and z. The designed ANN was trained by varying its structures and using different learning algorithms. ANN was trained using 9 different sets which were formed with the initial conditions of Chua’s circuit and each set consisted of about 1700 input-output data. A feed-forward Multi-Layer Perceptron (MLP) network structure, trained with Levenberg-Marquardt backpropagation algorithm, produced best outcome. Further a case study in which a plain text was first encoded and then decoded by both the chaotic dynamics obtained from the proposed ANN and the numerical solution of Chua’s circuit and are compared with each other.

References
  1. A.J. Menezes, P.C. Van Oorschot, S.A. Vanstone, Handbook of Applied Cryptography, New York, CRC Press, 1996
  2. B. Schneier, Applied Cryptography, New York, John Wiley & Sons Inc., 1996.
  3. H.C.A. Van Tilborg, Fundamentals of Cryptology, New York, Kluwer Academic Publishers, 2000.
  4. William Stallings, “Cryptography and Network Security: Principles and Practice”, (5th Edition), Prentice Hall, 2010.
  5. T. P. Wasnik , Vishal S. Patil , Sushant A. Patinge , Sachin R. Dave , Gaurav J. Sayasikamal, “Cryptography as an instrument to network security”, International Journal of Application or Innovation in Engineering & Management (IJAIEM), Vol. 2, Issue 3, 72-80, 2013.
  6. Danforth, Christopher M. (April 2013). "Chaos in an Atmosphere Hanging on a Wall", Mathematics of Planet Earth 2013. Retrieved 4 April 2013.
  7. S. Haykin, Neural Networks: A Comprehensive Foundation, Second Ed., New Jersey, Prentice Hall, 1999.
  8. L.O. Chua, C.W. Wu, “A universal circuit for studying and generating chaos”, IEEE Trans. on Circuits and Sys.-I: Fundamental Theory and Applications, Vol. 40, pp. 732-745, 1993.
  9. Michel Kennedy, “Three Steps to Chaos-Part II: A Chua’s Circuit Primer”, IEEE Trans. on Circuits and Sys.-I: Fundamental Theory and Applications, Vol. 40, No. 10, October 1993.
  10. R. M. Hristev, The ANN Book, Edition-1, 1998.
  11. Ilker Dalkiran, Kenan Danisman, “Artificial neural network based chaotic generator for cryptology”, Turk J Elec Eng & Comp Sci, Vol.18, No.2, 2010, © TUBITAK.
  12. Pooja Kaushik and Yuvraj Sharma, “Comparison of Different Image Enhancement Techniques Based Upon Psnr & Mse”, International Journal of Applied Engineering Research, Vol.7 No.11 (2012).
Index Terms

Computer Science
Information Sciences

Keywords

Encryption decryption chaos theory chaotic dynamics.