Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

An Virtuous Key Spawning using Neural Networks

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Ch. Swathi, S. Mythreya, T. Sushma Latha

Ch. Swathi, S Mythreya and Sushma T Latha. An Virtuous Key Spawning using Neural Networks. International Journal of Computer Applications 160(9):42-45, February 2017. BibTeX

	author = {Ch. Swathi and S. Mythreya and T. Sushma Latha},
	title = {An Virtuous Key Spawning using Neural Networks},
	journal = {International Journal of Computer Applications},
	issue_date = {February 2017},
	volume = {160},
	number = {9},
	month = {Feb},
	year = {2017},
	issn = {0975-8887},
	pages = {42-45},
	numpages = {4},
	url = {},
	doi = {10.5120/ijca2017913098},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


Cryptography or cryptology is look at of strategies for comfy verbal exchange in the presence of third parties called adversaries. Extra normally, cryptography is ready constructing and analysing protocols that prevent third events or the public from studying non-public messages. Many public key cryptography are available which are based totally on range idea however it has the downside of requirement of big computational strength, complexity and time intake for the duration of technology of key. To overcome these drawbacks, we analysed neural network is the quality way to generate mystery key. A neural network is a device which is designed to work like mind. It has the capability to perform complex calculations easily. The important thing fashioned by means of neural network is within the form of weights and neuronal functions that's difficult to break. Right here, textual content records might be use as an input statistics for cryptography in order that facts become unreadable for attackers and remains secure from them. Two neural networks are required for use here, one for encryption procedure and any other for decryption manner


  1. William Stallings, Cryptography and Network Security.
  2. Jacek M. Zurada, Introduction to Artificial Neural Systems.
  3. John A. Bullinaria: Introduction to Neural Networks,2004.
  4. Eric S Imsand, Deon Garrett, John A. Hamilton, Jr., Member, IEEE: User Identification Using GUI Manipulation Patterns and Artificial Neural Networks.
  5. Henry A. Rowley, Shumeet Baluja, and Takeo Kanade: Neural Network-Based Face Detection, January 1998.
  6. John Kelsey, Bruce Schneier, David Wagner, Chris Hall: Cryptanalytic Attacks on Pseudorandom Number Generators.
  7. Peter Gutmann, David Naccache, Charles C. Palmer: Randomness in Cryptography, 2006.
  8. Jorg Muhlbacher, DI Rudolf Hormanseder: Randomness in Cryptography, October 2007.
  9. R. Metzler and W. Kinzel and 1. Kanter, Phys. Rev. E, 62, 2555 (2000).
  10. Kaniter, W. Kinzel and E. Kanter, Europhys. Lett, 57,141-147 (2002).
  11. M. Rosen-Zvi, E. Klein, 1. Kanter and W. Kinzel, "Mutual leamning in a treepanty machine and its application to cryptography", Phys. Rev. E (2002).
  12. Neural Synchronization and Cryptography – Andreas Ruttor. PhD thesis, Bayerische Julius-Maximilians-Universitat Wurzburg, 2006.
  13. Steve Lawrence, C. Lee Giles, Ah Chung Tsoi: Lessons in Neural Network Training: Overfitting May be Harder than Expected, 1997.
  14. R. Urbanczik, private communication
  15. C.P. Williams and S.H. Cleat-water, Explorations in Quantum Computing, Springer Verlag, 1998.
  16. D. R. Stinson, Cryptography: Theory and Practice (CRC Press 2002).


Cryptography, Neural Network, Encryption, Decryption