You are on page 1of 5

International Journal of Application or Innovation in Engineering & Management (IJAIEM)

Web Site: www.ijaiem.org Email: editor@ijaiem.org


Volume 4, Issue 8, August 2015

ISSN 2319 - 4847

CRYPTOGRAPHY BASED ON ARTIFICIAL


NEURAL NETWORK
S hit al D aulat J ag t ap 1 , Mr. P. B ala R amudu 2
1

PG Student (Electronics and Telecommunication)Sahyadri Valley College of Engineering and Technology,Rajuri, Pune.
2

Professor(Electronics and Telecommunication)Sahyadri Valley College of Engineering and Technology,Rajuri, Pune.

ABSTRACT
A Neural Network is a machine that is designed to model the way in which the brain performs a task or function of interest. It
has the ability to perform complex computations with ease. The objective of this project was to investigate the use of ANNs in
various kinds of digital circuits as well as in the field of Cryptography. During our project, we have studied different neural
network architectures and training algorithms. Cryptography is a technique to make information unreadable for unauthorized
users. Today, building a secure channel is one of the most challenging areas for research in communication systems. Many
forms of public key cryptography are available, but it requires more complex techniques and needs more computational power.
This paper aims at implementation of cryptography using neural networks that will alleviate these problems. Neural network
and cryptography together can make a great help in field of networks security. The key formed by neural network is in the form
of weights and neuronal functions which is difficult to break. Here, text data would be use as an input data for cryptography so
that data become unreadable for attackers and remains secure from them. Two neural networks are required to be used here,
one for encryption process and another for decryption process.

Keywords:- Artificial neural network, chaotic map, Cryptography, Decryption, Encryption, Key generation

1.INTRODUCTION
Work on artificial neural network has been motivated right from its inception by the recognition that the human brain
computes in an entirely different way from the conventional digital computer. The brain is a highly complex, nonlinear
and parallel information processing system. It has the capability to organize its structural constituents, known as
neurons, so as to perform certain computations many times faster than the fastest digital computer in existence today.
The brain routinely accomplishes perceptual recognition tasks, e.g. recognizing a familiar face embedded in an
unfamiliar scene, in approximately 100-200 ms, whereas tasks of much lesser complexity may take days on a
conventional computer. A neural network is a machine that is designed to model the way in which the brain performs a
particular task. The network is implemented by using electronic components or is simulated in software on a digital
computer. A neural network is a massively parallel distributed processor made up of simple processing units, which has
a natural propensity for storing experimental knowledge and making it available for use.

2.BIOLOGICAL MODEL
The human nervous system can be broken down into three stages that may be represented as follows:

Figure 1: Block Diagram of a Human Nervous System.


There are approximately 10 billion neurons in the human cortex. Each biological neuron is connected to several
thousands of other neurons. The typical operating speed of biological neurons is measured in milliseconds.The majority
of neurons encode their activations or outputs as a series of brief electrical pulses. The neurons cell body processes the
incoming activations and converts the into output activations. The neurons nucleus contains the genetic material in the
form of DNA. This exists in most types of cells. Dendrites are fibers which emanate from the cell body and provide the
receptive zones that receive activation from other neurons. Axons are fibers acting as transmission lines that send
activation to other neurons. The junctions that allow signal transmission between axons and dendrites are called
synapses.

Volume 4, Issue 8, August 2015

Page 1

International Journal of Application or Innovation in Engineering & Management (IJAIEM)


Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 4, Issue 8, August 2015

ISSN 2319 - 4847

Figure 2 : The basic components of an artificial neural network

3.ARTIFICIAL NEURAL NETWORK (ANN)


Artificial Neural Network is an information processing and modeling system which mimics the learning ability of
biological systems in understanding unknown process or its behaviour.
ANN is configured for a specific application, such as pattern recognition or data classification, through a learning
process. Learning in biological systems involves adjustments to the synaptic connections that exist between the
neurons. This is true of ANNs as well.
ANNS have developed as generalizations of mathematical models of human cognition or neural biology. Based on the
assumptions that :
1. Information procures at many simple elements called neuron.
2. Signals are passed between neurons over connection links.
2. Each connection link has associated weight. Which in a typical neural net multiplies the signal transmitted?
4. Each neuron applies an activation function usually nonlinear to its net input (sum of weighted input signals) to
determine its output signal.
An Artificial Neural Network is a network of many very simple processors (units), each possibly having a (small
amount of) local memory. The units are connected by unidirectional communication channels which carry numeric
data. The units operate only on their local data and on the inputs they receive via the connections. The design
motivation is what distinguishes neural networks from other mathematical techniques: A neural network is a
processing device, either an algorithm, or actual hardware, whose design was motivated by the design and functioning
of human brains and components .
There are many different types of Neural Networks, each of which has different strengths particular to their
applications. The abilities of different networks can be related to their structure, dynamics and learning methods.

4.CRYPTOGRAPHY USING ARTIFICIAL NEURAL NETWORK


The block diagram of the proposed ANN model is given in Figure3 . As shown in the figure, three initial conditions
and time variable were applied to the inputs and three chaotic dynamics x, y and z were obtained from the outputs of
the ANN. For the training and test phases of the ANN, approximately 1800 input-output data pairs which belong to 24
different initial condition sets were obtained from Equation (4). A quarter of those 1800 data pairs were sorted to use in
the test phase and the rest of data were used in the training phase

Figure 3:The block diagram of trained ANN model.

Volume 4, Issue 8, August 2015

Page 2

International Journal of Application or Innovation in Engineering & Management (IJAIEM)


Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 4, Issue 8, August 2015

ISSN 2319 - 4847

4.1CRYPTOGRAPHY
Cryptography is the science of providing secure services. Until 1970s cryptography was considered the domain of
military and governments only. However the ubiquitous use computers and the advent of internet has made it an
integral part of our daily lives. Today cryptography is at the heart of many secure applications such as online banking,
online shopping, online government services such personal income taxes, cellular phones, and wireless LANS (Local
Area Networks) etc. In this paragraph we provide an introduction to some cryptographic primitives which are used to
design secure applications.
4.2 REQUIREMENTS FOR CRYPTOGRAPHY
Cryptography is generally used in practice to provide four services: privacy, authentication, data integrity and nonrepudiation. The goal of privacy is to ensure that communication between two parties remain secret. This often means
that the contents of communication are secret; however in certain situations the of fact communication took place and
must be a secret as well. Encryption is generally used to provide privacy in modern communication. Authentication of
one or both parties during a communication is required to ensure that information is exchanged with the legitimate
party. Passwords are common examples of one-way authentication in which users authenticate themselves to gain
access to system.

5.SYMMETRIC KEY ENCRYPTION


In symmetric key encryption a secret key is shared between the sender and receiver. The word "symmetric" refers to the
fact that both sender and receiver use the same key to encrypt and decrypt the information.
Block Ciphers: A block cipher is symmetric key cryptographic primitive which takes as input an n-bit block of plaintext
and a secret key and outputs an n-bit block of cipher text using a fixed transformation. Figure 4 shows the general
structure of a block cipher. The common block sizes are 64 bits, 128 bits and 256 bits. For a fixed key the block cipher
defines a permutation on the n-bit input.

Figure:4 General structure of a block cipher

6.BLOCK DIAGRAM OF PROCESS OF A BEHAVIOR OF NEURAL NETWORKS


This model presents an attempt to design an encryption system based on artificial neural networks of the
backpropagation type. The proposed ANN has been tested for various numbers of plain text. The simulation results
have shown very good results. The neural network works reliably and absolutely no errors are found in the outputs
during encryption; the neural network also works reliably during the decryption process, which is the reverse of the
encryption process.

Volume 4, Issue 8, August 2015

Page 3

International Journal of Application or Innovation in Engineering & Management (IJAIEM)


Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 4, Issue 8, August 2015

ISSN 2319 - 4847

Figures 5: Tested process of a behavior of neural networks

7.LIMITATIONS OF CRYPTOSYSTEM
The limitations of this type of system are few, but potentially significant.
This is effectively a secret-key system, with the key being the weights and architecture of the network. With the weights
and the architecture, breaking the encryption becomes trivial. However, both the weights and the architecture are
needed for encryption and decryption. Knowing only one or the other is not enough to break it.

8..ADVANTAGES OF CRYPTOSYSTEM
The advantages to this system are that it appears to be exceedingly difficult to break without knowledge of the
methodology behind it.
It is tolerant to noise. Most messages cannot be altered by even one bit in a standard encryption scheme.
The system based on neural networks allows the encoded message to fluctuate and still be accurate.
Neural networks are ideal in recognising diseases using scans since there is no need to provide a specific algorithm
on how to identify the disease.
ANNs are used experimentally to implement electronic noses. Electronic noses have several potential applications
in telemedicine. Telemedicine is the practice of medicine over long distances via a communication link.
There is a marketing application which has been integrated with a neural network system. The Airline Marketing
Tactician (a trademark abbreviated as AMT) is a computer system made of various intelligent technologies
including expert systems.

9.RESULTS & CONCLUSION


9.1A General n-state Sequential Machine
A general n-state Sequential Machine was implemented as described in the last chapter. As an example, the serial
adder was implemented using this machine. The following figures show different stages of the execution:

Figure 6: Entering the training data in the sequential machine

Volume 4, Issue 8, August 2015

Page 4

International Journal of Application or Innovation in Engineering & Management (IJAIEM)


Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 4, Issue 8, August 2015

ISSN 2319 - 4847

Figure 7: The plotted graph of the error function after the learning process
The data from the state table of the Serial Adder is entered into the program as shown in figure 6. The current state
represents any previous carry that might be present whereas the next state represents the output carry. Thus, this
sequential machine consists of 2 input, 1 output and 2 states. After the training data has been entered into the program,
the back-propagation algorithm, to minimize the error function, executes. Figure 7 shows the plot of the error function
against the number of iterations.

REFERENCES
[1] William Stallings, Cryptography and Network Security: Principles and Practices, second edition.
[2] Aloha Sinha, Kehar Singh, "A Technique for Image Encryption using Digital Signature", Optics
Communications, Vol.2 No.8 (2203), 229-234.
[3] M. Zeghid, M. Machhout, L. Khriji, A. Baganne, R. Tourki, A Modified AES Based Algorithm for Image
Encryption, World Academy of Science, Engineering and Technology 27 2007.
[4] K.Deergha Rao, Ch. Gangadhar, Modified Chaotic Key-Based Algorithm for Image Encryption and its VLSI
Realization, IEEE, 15th International. Conference on Digital Signal Processing (DSP), 2007.
[5] Saroj Kumar Panigrahy, Bibhudendra Acharya, Debasish Jen, Image Encryption Using Self-Invertible Key Matrix
of Hill Cipher Algorithm, 1st International Conference on Advances in Computing, Chikhli, India, 21-22
February 2008.
[6] Zhang Yun-peng, Liu Wei, Cao Shui-ping, Zhai Zheng-jun, Nie Xuan, Dai Wei-di, Digital Image Encryption
Algorithm Based on Chaos and Improved DES, IEEE International Conference on Systems, Man and
Cybernetics, 2009.
[7] Min Long, Li Tan, A chaos-Based Data Encryption Algorithm for Image/Video, IEEE, Second International
Conference on Multimedia and Information Technology, 2010.
[8] HiralRathod, Mahendra Singh Sisodia, Sanjay Kumar Sharma, Design and Implementation of Image Encryption
Algorithm by using Block Based Symmetric Transformation Algorithm (Hyper Image Encryption Algorithm)
International Journal of Computer Technology and Electronics Engineering (IJCTEE), Vol.1, No.3 (2010/2011).
[9] Kuldeep Singh, Komalpreet Kaur, Image Encryption using Chaotic Maps and DNA Addition Operation and
Noise Effects on it, International Journal of Computer Applications (0975 - 8887) Vol.23, No.6, June 2011.
[10] Qais H. Alsafasfeh, Aouda A. Arfoa, Image Encryption Based on the General Approach for Multiple Chaotic
Systems, Journal of Signal and Information Processing, 2011.

AUTHOR
Shital DaulatJagtap was born on October 24, 1987. She received the Bachelor of Engineering
degree in Electronics from KarmavirDadasahebKannamawar College of Engineering, Nagpur, India,
in 2011. Currently, she is pursuing the Master of Engineering degree in Electronics and
Telecommunication from Sahyadri Valley College of Engineering and Technology,Rajuri,Pune, India.

Volume 4, Issue 8, August 2015

Page 5

You might also like