CFP last date
20 May 2024
Reseach Article

Alternate Approach for Implementation of SHA-2 Algorithm using Feed forward Neural Network

by Prof.V R Kulkarni, Dr. S S Apte
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 28 - Number 5
Year of Publication: 2011
Authors: Prof.V R Kulkarni, Dr. S S Apte
10.5120/3382-4690

Prof.V R Kulkarni, Dr. S S Apte . Alternate Approach for Implementation of SHA-2 Algorithm using Feed forward Neural Network. International Journal of Computer Applications. 28, 5 ( August 2011), 29-34. DOI=10.5120/3382-4690

@article{ 10.5120/3382-4690,
author = { Prof.V R Kulkarni, Dr. S S Apte },
title = { Alternate Approach for Implementation of SHA-2 Algorithm using Feed forward Neural Network },
journal = { International Journal of Computer Applications },
issue_date = { August 2011 },
volume = { 28 },
number = { 5 },
month = { August },
year = { 2011 },
issn = { 0975-8887 },
pages = { 29-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume28/number5/3382-4690/ },
doi = { 10.5120/3382-4690 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:13:59.363123+05:30
%A Prof.V R Kulkarni
%A Dr. S S Apte
%T Alternate Approach for Implementation of SHA-2 Algorithm using Feed forward Neural Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 28
%N 5
%P 29-34
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper an algorithm for one-way hash function construction based on a two layer feed forward neural network along with the piece-wise linear (pwl) chaotic map is proposed. Where SHA-2 is cryptographic hash function designed by NSA(National Security Agency). Based on chaotic neural networks, a SHA-2 Hash function is constructed, which makes use of neural networks' diffusion property and chaos' confusion property. This function encodes the plaintext of arbitrary length into the hash value of fixed length (typically, 128-bit, 256-bit or 512-bit). Theoretical analysis and experimental results show that this hash function is one-way, with high key sensitivity and plaintext sensitivity, and secure against birthday attacks or meet-in-the-middle attacks. These properties make it a suitable choice for data signature or authentication.

References
  1. L.P. Yee, D. L.C. Silva, "Application of Multilayer Perceptron Network as a One-way Hash Function” International Joint Conference on Neural Networks, Vol. 2,2002.
  2. Li, C., S. Li, D. Zhang and G. Chen,”Cryptanalysis of a chaotic neural network based multimedia encryption scheme”. Advances in Multimedia Information Processing PCM ,2004 .
  3. Khalil Shihab, “A Backpropagation Neural Network for Computer Network Security” Journal of Computer Science 2 (9): 710-715, 2006.
  4. Shiguo Lian, Zhongxuan Liu, Zhen Ren, Haila Wang, “Hash Function Based on Chaotic Neural Networks” IEEE, 2006.
  5. Shiguo Lian,Jinsheng Sun,Zhiquan Wang, “ One-way Hash Function Based on Neural Network” Journal of Information Assurance and Security,2006
  6. Yi Du, Detang Lu, Daolun Li,“An Effective Hash-based Method for Generating Synthetic Well Log” 2008 IEEE.
  7. Qun-ting Yang,Tie-gang Gao,Li Fan,Qiao-lun Gu, “ Analysis of One-way Alterable Length Hash Function Based on Cell Neural Network” Fifth Intenational Conference on Information Assurance and Security,2009
  8. Qinghua Zhang,Han Zhang and Zhaohui Li,”One-way Hash Function Construction Based on Conservative Chaotic Systems” Journal of Information Assurance and Security, 5, pp.171-178, 2010
  9. Network Security Essential applications and Standards-William Stallings,Person Education,2000.
  10. R. Rivest: The MD5 Message Digest Algorithm. RFC 1321, 1992.
  11. Neural Network by Christos Stergiou and Dimitrios Siganos.
Index Terms

Computer Science
Information Sciences

Keywords

Artificial Neural Network Hash Function Feed Forward Plaintext Sensitivity