Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

Cryptography based on Artificial Neural Networks and Chaos Theory

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Authors:
Aditya S. Mhetras, Nadir N. Charniya
10.5120/ijca2016907743

Aditya S Mhetras and Nadir N Charniya. Article: Cryptography based on Artificial Neural Networks and Chaos Theory. International Journal of Computer Applications 133(4):25-30, January 2016. Published by Foundation of Computer Science (FCS), NY, USA. BibTeX

@article{key:article,
	author = {Aditya S. Mhetras and Nadir N. Charniya},
	title = {Article: Cryptography based on Artificial Neural Networks and Chaos Theory},
	journal = {International Journal of Computer Applications},
	year = {2016},
	volume = {133},
	number = {4},
	pages = {25-30},
	month = {January},
	note = {Published by Foundation of Computer Science (FCS), NY, USA}
}

Abstract

Cryptography is a skill of sending the data in such a form that only those for whom it is intended can read it. There are number of methods to perform cryptography, one of such methods is Chaos theory which studies the behavior of a dynamical systems that are highly sensitive to initial conditions. Even slight changes in initial conditions result in extensively deviating outcomes for such dynamical systems, hence making long-standing estimate unmanageable. The limitations of applying Chaos Theory are choosing the input parameters and synchronization. The computation of these input parameters lies on the dynamics underlying the data and the highly complex analysis, not always accurate. Artificial neural networks (ANN) well known for learning and generalization are hence used to model the dynamics of Chua’s circuit viz. x, y and z. The designed ANN was trained by varying its structures and using different learning algorithms. ANN was trained using 9 different sets which were formed with the initial conditions of Chua’s circuit and each set consisted of about 1700 input-output data. A feed-forward Multi-Layer Perceptron (MLP) network structure, trained with Levenberg-Marquardt backpropagation algorithm, produced best outcome. Further a case study in which a plain text was first encoded and then decoded by both the chaotic dynamics obtained from the proposed ANN and the numerical solution of Chua’s circuit and are compared with each other.

References

  1. A.J. Menezes, P.C. Van Oorschot, S.A. Vanstone, Handbook of Applied Cryptography, New York, CRC Press, 1996
  2. B. Schneier, Applied Cryptography, New York, John Wiley & Sons Inc., 1996.
  3. H.C.A. Van Tilborg, Fundamentals of Cryptology, New York, Kluwer Academic Publishers, 2000.
  4. William Stallings, “Cryptography and Network Security: Principles and Practice”, (5th Edition), Prentice Hall, 2010.
  5. T. P. Wasnik , Vishal S. Patil , Sushant A. Patinge , Sachin R. Dave , Gaurav J. Sayasikamal, “Cryptography as an instrument to network security”, International Journal of Application or Innovation in Engineering & Management (IJAIEM), Vol. 2, Issue 3, 72-80, 2013.
  6. Danforth, Christopher M. (April 2013). "Chaos in an Atmosphere Hanging on a Wall", Mathematics of Planet Earth 2013. Retrieved 4 April 2013.
  7. S. Haykin, Neural Networks: A Comprehensive Foundation, Second Ed., New Jersey, Prentice Hall, 1999.
  8. L.O. Chua, C.W. Wu, “A universal circuit for studying and generating chaos”, IEEE Trans. on Circuits and Sys.-I: Fundamental Theory and Applications, Vol. 40, pp. 732-745, 1993.
  9. Michel Kennedy, “Three Steps to Chaos-Part II: A Chua’s Circuit Primer”, IEEE Trans. on Circuits and Sys.-I: Fundamental Theory and Applications, Vol. 40, No. 10, October 1993.
  10. R. M. Hristev, The ANN Book, Edition-1, 1998.
  11. Ilker Dalkiran, Kenan Danisman, “Artificial neural network based chaotic generator for cryptology”, Turk J Elec Eng & Comp Sci, Vol.18, No.2, 2010, © TUBITAK.
  12. Pooja Kaushik and Yuvraj Sharma, “Comparison of Different Image Enhancement Techniques Based Upon Psnr & Mse”, International Journal of Applied Engineering Research, Vol.7 No.11 (2012).

Keywords

Encryption, decryption, chaos theory, chaotic dynamics.