CFP last date
22 April 2024
Reseach Article

An Virtuous Key Spawning using Neural Networks

by Ch. Swathi, S. Mythreya, T. Sushma Latha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 160 - Number 9
Year of Publication: 2017
Authors: Ch. Swathi, S. Mythreya, T. Sushma Latha
10.5120/ijca2017913098

Ch. Swathi, S. Mythreya, T. Sushma Latha . An Virtuous Key Spawning using Neural Networks. International Journal of Computer Applications. 160, 9 ( Feb 2017), 42-45. DOI=10.5120/ijca2017913098

@article{ 10.5120/ijca2017913098,
author = { Ch. Swathi, S. Mythreya, T. Sushma Latha },
title = { An Virtuous Key Spawning using Neural Networks },
journal = { International Journal of Computer Applications },
issue_date = { Feb 2017 },
volume = { 160 },
number = { 9 },
month = { Feb },
year = { 2017 },
issn = { 0975-8887 },
pages = { 42-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume160/number9/27108-2017913098/ },
doi = { 10.5120/ijca2017913098 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:06:19.151010+05:30
%A Ch. Swathi
%A S. Mythreya
%A T. Sushma Latha
%T An Virtuous Key Spawning using Neural Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 160
%N 9
%P 42-45
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cryptography or cryptology is look at of strategies for comfy verbal exchange in the presence of third parties called adversaries. Extra normally, cryptography is ready constructing and analysing protocols that prevent third events or the public from studying non-public messages. Many public key cryptography are available which are based totally on range idea however it has the downside of requirement of big computational strength, complexity and time intake for the duration of technology of key. To overcome these drawbacks, we analysed neural network is the quality way to generate mystery key. A neural network is a device which is designed to work like mind. It has the capability to perform complex calculations easily. The important thing fashioned by means of neural network is within the form of weights and neuronal functions that's difficult to break. Right here, textual content records might be use as an input statistics for cryptography in order that facts become unreadable for attackers and remains secure from them. Two neural networks are required for use here, one for encryption procedure and any other for decryption manner

References
  1. William Stallings, Cryptography and Network Security.
  2. Jacek M. Zurada, Introduction to Artificial Neural Systems.
  3. John A. Bullinaria: Introduction to Neural Networks,2004.
  4. Eric S Imsand, Deon Garrett, John A. Hamilton, Jr., Member, IEEE: User Identification Using GUI Manipulation Patterns and Artificial Neural Networks.
  5. Henry A. Rowley, Shumeet Baluja, and Takeo Kanade: Neural Network-Based Face Detection, January 1998.
  6. John Kelsey, Bruce Schneier, David Wagner, Chris Hall: Cryptanalytic Attacks on Pseudorandom Number Generators.
  7. Peter Gutmann, David Naccache, Charles C. Palmer: Randomness in Cryptography, 2006.
  8. Jorg Muhlbacher, DI Rudolf Hormanseder: Randomness in Cryptography, October 2007.
  9. R. Metzler and W. Kinzel and 1. Kanter, Phys. Rev. E, 62, 2555 (2000).
  10. Kaniter, W. Kinzel and E. Kanter, Europhys. Lett, 57,141-147 (2002).
  11. M. Rosen-Zvi, E. Klein, 1. Kanter and W. Kinzel, "Mutual leamning in a treepanty machine and its application to cryptography", Phys. Rev. E (2002).
  12. Neural Synchronization and Cryptography – Andreas Ruttor. PhD thesis, Bayerische Julius-Maximilians-Universitat Wurzburg, 2006.
  13. Steve Lawrence, C. Lee Giles, Ah Chung Tsoi: Lessons in Neural Network Training: Overfitting May be Harder than Expected, 1997.
  14. R. Urbanczik, private communication
  15. C.P. Williams and S.H. Cleat-water, Explorations in Quantum Computing, Springer Verlag, 1998.
  16. D. R. Stinson, Cryptography: Theory and Practice (CRC Press 2002).
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Neural Network Encryption Decryption