You are on page 1of 33

VISVESVARAYA TECHNOLOGICAL UNIVERSITY

“Jnana Sangama”, Belagavi - 590 018, Karnataka, India

MINI PROJECT REPORT


On
“PERFORMANCE ANALYSIS OF ENCRYPTION AND
DECRYPTION USING CHAOTIC NEURAL NETWORK”
Submitted in partial fulfillment of the requirements for the award of the Degree

BACHELOR OF ENGINEERING
in
ELECTRONICS AND COMMUNICATION ENGINEERING
by
KEERTI NAGESH SHETTY USN: 1DA16EC055
KIRAN KOLAGAD USN: 1DA16EC056
LOKANADAM J K S SAI GANESH USN: 1DA16EC061
MOHIT N RAATE USN: 1DA16EC068

Under the Guidance of


NITHYASHREE S
Assistant Professor, Department of ECE, Dr. AIT, Bengaluru - 560056

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

Dr. AMBEDKAR INSTITUTE OF TECHNOLOGY


Mallathahalli, Outer Ring Road, Bengaluru – 560056
2018-19
Dr. AMBEDKAR INSTITUTE OF TECHNOLOGY
Mallathahalli, Bengaluru - 560056
Department of Electronics & Communication Engineering

Certificate
Certified that the project workentitled “PERFORMANCE ANALYSIS OF
ENCRYPTION AND DECRYPTIONUSING CHAOTIC NEURAL NETWORK”,
carried out by KEERTI NAGESH SHETTY , bearing USN:1DA16EC055, KIRAN
KOLAGAD, bearing USN:1DA16EC056, LOKANADAM J K S SAI GANESH, bearing
USN:1DA16EC061, MOHIT N RAATE, bearing USN:1DA16EC068 bonafide students of
Dr. Ambedkar Institute of Technology, Bengaluru – 560056 in partial fulfillment for the
award of Bachelor of Engineering in Electronics and Communication Engineering of the
Visvesvaraya Technological University, Belagavi during the year 2018–2019. It is certified
that all the corrections/suggestions indicated for Internal Assessment have been incorporated
in the Report deposited in the departmental library. The project report has been approved as it
satisfies the academic requirements.

Signature of the guide Signature of the HOD Signature of the Principal

(NITHYASHREE.S) (Dr.G.V.JAYARAMAIAH) (Dr. C.NANJUNDASWAMY)

External Viva
Name oftheExaminers Signature withDate

1.

2.
Dr. AMBEDKAR INSTITUTE OF TECHNOLOGY
Mallathahalli, Bengaluru - 560056
Department of Electronics & Communication Engineering

Declaration

We, KEERTI NAGESH SHETTY, bearing USN: 1DA16EC055, KIRAN KOLAGAD,


bearing USN: 1DA16EC056, LOKANADAM J K S SAI GANESH, bearing USN: 1DA16EC061,
MOHIT N RAATE, bearing USN: 1DA16EC068, herebydeclare that, the project work entitled
“PERFORMANCE ANALYSIS OF ENCRYPTION AND DECRYPTIONUSING
CHAOTIC NEURAL NETWORK” is independently carried out by us at Department of
Electronics and Communication Engineering, Dr. Ambedkar Institute of Technology, Bengaluru-
560056, under the guidance of NITHYASHREE S, Assistant Professor, Department of Electronics
and Communication Engineering, Dr. Ambedkar Institute of Technology. The Project work is carried
out in partial fulfillment of the requirement for the award of degree of Bachelor of Engineering in
Electronics and Communication Engineering during the academic year 2018-2019.

Place: Bengaluru

Date:

Name and Signature of students:


KEERTI NAGESH SHEETY

KIRAN KOLAGAD

LOKANADAM J K S SAI GANESH

MOHIT N RAATE
ACKNOWLEDEMENT

The satisfaction that accompanies the successful completion of this mini project would be
complete only with the mention of the people who made it possible, whose support rewarded
our effort with success.

We are grateful to Dr. Ambedkar Institute of Technology for its ideals and its inspirations
for having provided us with the facilities that have made this mini project a success.

We are grateful to our Principal Dr. C Nanjundaswamy who gave a continuous support and
provided us comfortable environment to work in.

We express our sincere gratitude to Dr. G V Jayaramaiah, Head of Department, Electronics


and Communication.

We express our sincere thanks to our guide Nithyashree S, Assistant Professor, Department
of Electronics and Communication and project coordinator Tanuja P, Associate Professor,
Department of Electronics and Communication for their advice, supervision and guidance
throughout the course of the project.

We are also grateful to all the other members of the faculty of Electronics and Communication
Department for this cooperation.

Finally, we wish to thank our parents, all my dear friends and other people who have directly
or indirectly been a support from the start of the project, for their whole-hearted co-operation,
support and encouragement.

KEERTI NAGESH SHEETY


KIRAN KOLAGAD
LOKANADAM J K S SAI GANESH
MOHIT N RAATE
PERFORMANCE ANALYSIS OF ENCRYPTION AND DECRYPTION USING CNN

CONTENTS

ABSTRACT i
LIST OF CONTENTS ii
LIST OF FIGURES iii

1. INTRODUCTION
1.1 MOTIVATION
1.2 PROBLEM DEFINITION
1.3 AIM OF PROPOSED SYSTEM

2. LITERATURE SURVEY

3. SYSTEM DESIGN
3.1 BLOCK DIAGRAM
3.2 METHODOLOGY

4. SOFTWARE REQUIREMENTS
4.1 MATLAB

5. SIMULATED OUTPUT
6. APPLICATIONS AND ADVANTAGES
7. CONCLUSION AND FUTURE WORK

BIBILOGRAPHY

Dr.AIT, Bengaluru Dept. of Electronics and Communication


PERFORMANCE ANALYSIS OF ENCRYPTION AND DECRYPTION USING CNN

ABSTRACT

A Neural Network is a machine that is designed to model the way in which the
brain performs a task or function of interest. It has the ability to perform
complex computations with ease. The objective of this project was to investigate
the use of ANNs in various kinds of digital circuits as well as in the field of
Cryptography. During our project, we have studied chaotic neural network and
1-D logistic algorithms.
Using a chaotic sequence, weights and biases are determined.
Two keys are used and Cryptography is achieved by a chaotic neural network
having its weights given by a chaotic sequence.

Dr.AIT, Bengaluru Dept. of Electronics and Communication


PERFORMANCE ANALYSIS OF ENCRYPTION AND DECRYPTION USING CNN

LIST OF FIGURES Page No.

3.1 Artificial Neural Network 3

4.1 Block Diagram 7

5.1 Encryption Output 16

5.2 Decryption Output 17

Dr.AIT, Bengaluru Dept. of Electronics and Communication


PERFORMANCE ANALYSIS OF ENCRYPTION AND DECRYPTION USING CNN

CHAPTER 1
INTRODUCTION

Dr.AIT, Bengaluru Dept. of Electronics and Communication


Page 1
PERFORMANCE ANALYSIS OF ENCRYPTION AND DECRYPTION USING CNN

Chapter 1
INTRODUCTION
Work on artificial neural network has been motivated right from its inception by
the recognition that the human brain computes in an entirely different way from
the conventional digital computer. The brain is a highly complex, nonlinear and
parallel information processing system. It has the capability to organize its
structural constituents, known as neurons, so as to perform certain computations
many times faster than the fastest digital computer in existence today. The brain
routinely accomplishes perceptual recognition tasks, e.g. recognizing a familiar
face embedded in an unfamiliar scene, in approximately 100-200 ms, whereas
tasks of much lesser complexity may take days on a conventional computer. A
neural network is a machine that is designed to model the way in which the brain
performs a particular task. The network is implemented by using electronic
components or is simulated in software on a digital computer. A neural network
is a massively parallel distributed processor made up of simple processing units,
which has a natural propensity for storing experimental knowledge and making it
available for use. It resembles the brain in two respects:
1. Knowledge is acquired by the network from its environment through a learning
process.

2. Interneuron connection strengths, known as synaptic weights, are used to store


theacquired knowledge.

There are many aspects to security and many applications, ranging from secure
commerce and payments to private communications and protecting passwords.
One essential aspect for secure communications is that of cryptography.
Cryptography is the science of writing in secret code and is an ancient art; the first

Dr.AIT, Bengaluru Dept. of Electronics and Communication Page 2


PERFORMANCE ANALYSIS OF ENCRYPTION AND DECRYPTION USING CNN

documented use of cryptography in writing dates back to circa 1900 B.C. when an
Egyptian scribe used non-standard hieroglyphs in an inscription. Some experts
argue that cryptography appeared spontaneously sometime after writing was
invented, with applications ranging from diplomatic missives to war-time battle
plans. It is no surprise, then, that new forms of cryptography came soon after the
widespread development of computer communications. In data and
telecommunications, cryptography is necessary when communicating over any
untrusted medium, which includes just about any network, particularly the
Internet. Cryptography, then, not only protects data from theft or alteration, but
can also be used for user authentication. There are, in general, three types of
cryptographic schemes typically used to accomplish these goals: secret key (or
symmetric) cryptography, public-key (or asymmetric) cryptography, and hash
functions, each of which is described below. In all cases, the initial unencrypted
data is referred to as plaintext. It is encrypted into ciphertext, which will in turn
(usually) be decrypted into usable plaintext.

FIG 2.1 Artificial Neural Network

Dr.AIT, Bengaluru Dept. of Electronics and Communication Page 3


PERFORMANCE ANALYSIS OF ENCRYPTION AND DECRYPTION USING CNN

1.1 MOTIVATION

Nowadays in digital world your data has to be protected from theft or an


unauthorized use of your data and possible fraud. Cryptography offers
authentication, integrity, and confidentiality.

Authentication: Authentication is a process in Cryptography that offers


certificates as a solution, which is called “digital IDs,” coz they can be used to
verify the identity of someone you don’t know. Hence it is up to you to decide
whether someone is authentic or not.

Integrity: Integrity is about how you protect your data, corresponding to those
certificates it can be used in another technique that’s “digital signatures”, to
ensure that nobody can impersonate you. One can easily forge email, but it’s
very hard to forge a digitally signed email message and so on it’s hard for
someone to modify or manipulate a message that you have digitally signed.

Confidentiality: By using Cipher you can keep your information secret


especially when you send sensitive data over a network.It can give you solution
through “cipher”. A cipher is intelligent system that knows how to encrypt and
decrypt data. Before you send sensitive data over a network, or store it on a disk,
you can encrypt it, which turns it unreadable. If you need the data again, you can
use the cipher to decrypt the data. Now you are the only person that can be able
to decrypt the data. If you’re sending data to someone, you can ensure that only
that person is able to decrypt the message. Alsoit is important to learn about key

Dr.AIT, Bengaluru Dept. of Electronics and Communication Page 4


PERFORMANCE ANALYSIS OF ENCRYPTION AND DECRYPTION USING CNN

data management, public and private key encryption, and how to include a
secure talk application that encrypts all data sent over the network.

1.2 PROBLEM FORMULATION

There is a tremendous need for the data to be secured. In order to


overcome this problem, in this project we use chaotic neural network which
generates a chaotic sequence using 1D Logistic Map. Here, we use two keys: mu
and initial value of the sequence. The chaotic sequence determines the weights
and biases required for the encryption using the Chaotic Neural Network.

1.3AIM OF THE PROPOSED SYSTEM

The project purpose is to construct an effective network which encrypts


and decrypts the data without data loss and distortion. The network provides
high security as the chaotic network is unpredictable by the way that the change
in behavior of the system cannot be predicted with the change in input.

Dr.AIT, Bengaluru Dept. of Electronics and Communication Page 5


PERFORMANCE ANALYSIS OF ENCRYPTION AND DECRYPTION USING CNN

CHAPTER 2
LITERATURE SURVEY

Dr.AIT, Bengaluru Dept. of Electronics and Communication Page 6


PERFORMANCE ANALYSIS OF ENCRYPTION AND DECRYPTION USING CNN

2.1 LITERATURE SURVEY

 Original cryptography was implemented to conceal bothdiplomatic and


military secrets from the enemy.

 But today it focuses on protecting data of military as well as financial,


medical, and ecommerce data that might end up in hands of these who
shouldn't access it.

YEAR AUTHOR METHOD

2008 Jakimoski Multiple Huffman table

2009 Cokal and Solak Guan’s Algorithm

2010 Li et al Chaotic Cryptography

Dr.AIT, Bengaluru Dept. of Electronics and Communication Page 7


PERFORMANCE ANALYSIS OF ENCRYPTION AND DECRYPTION USING CNN

CHAPTER 3
SYSTEM DESIGN

Dr.AIT, Bengaluru Dept. of Electronics and Communication Page 8


PERFORMANCE ANALYSIS OF ENCRYPTION AND DECRYPTION USING CNN

Chapter 3

SYSTEM DESIGN

The chapter 2 explains the block diagram of proposed project and its
working. It is important to know the function of each blocks involved in
process.

Fig 3.1. Block Diagram

A new chaotic neural network for digital signal encryption and decryption was
studied in this project. According to a binary sequence generated from a chaotic
system, the biases and weights of neurons are set. The chaotic neural network
can be used to encrypt digital signal. The network's features are as follows:
1) High security

2) No distortion

3) Suitable for system integration.

Dr.AIT, Bengaluru Dept. of Electronics and Communication Page 9


PERFORMANCE ANALYSIS OF ENCRYPTION AND DECRYPTION USING CNN

The MATLAB simulation results are also included for demonstration. It


indicates that the integration of the proposed system and MPEG2 for TV
distribution, communication, and storage is practicable. Among the proposed
encryption techniques, the basic ideas can be classified into three major types:
a. Position permutation - The position permutation algorithms scramble the
positions of original data.

b. Value transformation - The value transformation algorithms transform the


data value of the original signal.

c. The combining form - Finally, the combining form performs both operations.

The encryption scheme belongs to the category of value transformation. Based


on a binary sequence generated from the 1-D logistic map, the biases and
weights of neurons are set in each iteration.

Chaos
Chaos is statistically indistinguishable from randomness, and yet it is
deterministic and not random at all. Chaotic system will produce the same
results if given the same inputs, it is unpredictable in the sense that you can not
predict in what way the system's behavior will change for any change in the
input to that system. A random system will produce different results when
given the same inputs.

Chaotic neural network


Chaotic neural networks offer greatly increase memory capacity. Each memory
is encoded by an Unstable Periodic Orbit (UPO) on the chaotic attractor. A
chaotic attractor is a set of states in a system's state space with very special
property that the set is an attracting set. So the system starting with its initial

Dr.AIT, Bengaluru Dept. of Electronics and Communication Page 10


PERFORMANCE ANALYSIS OF ENCRYPTION AND DECRYPTION USING CNN

condition in the appropriate basin, eventually ends up in the set. The most
important, once the system is on the attractor nearby states diverge from each
other exponentially fast, however small amounts of noise are amplified.

3.1 METHODOLOGY

A network is called a chaotic neural network if its weights and biases are
determined by a chaotic sequence. Let g denote a digital signal of length
M and g(n), 0 ≤ M-1 , be the one-byte value of the signal g at position n.
The Chaotic Neural Network (CNN) for Signal Encryption

Step 1: Set the value of the parameter M.

Step 2: Determine the parameter, U and the initial point x(0) of the 1-D
logistic map .

Step 3: Evolve the chaotic sequence x(l), x(2), ... , x(M) by x(n+l) =
μ(n)(l-x(n)), and create b(O), b(l), ..., b(8M-1) from x(l), x(2), ..., x(M)
by the generating scheme that 0.b(8m-8)b(8m-7) ….. b(8m-2)b(8m-l) …
is the binary representation of x(m) for m = 1, 2,. . . ., M.

Step 4: FOR n: 0 TO (M - 1) DO.

Dr.AIT, Bengaluru Dept. of Electronics and Communication Page 11


PERFORMANCE ANALYSIS OF ENCRYPTION AND DECRYPTION USING CNN

For i= 0 TO 7 DO 1

j (0,1,2,3,4,5,6,7)

END
For i= 0 TO 7 DO

Where f(x) is 1 if x >=0 and 0 otherwise,

END

END

Dr.AIT, Bengaluru Dept. of Electronics and Communication Page 12


PERFORMANCE ANALYSIS OF ENCRYPTION AND DECRYPTION USING CNN

Step 5: The encrypted signal g‟ is obtained and the algorithm is terminated.

The decryption procedure is the same as the above one except that the input
signal to the decryption CNN should be g’(n) and its output signal should be
g”(n).

Dr.AIT, Bengaluru Dept. of Electronics and Communication Page 13


PERFORMANCE ANALYSIS OF ENCRYPTION AND DECRYPTION USING CNN

CHAPTER 4
SOFTWARE REQUIREMENTS

Dr.AIT, Bengaluru Dept. of Electronics and Communication Page 14


PERFORMANCE ANALYSIS OF ENCRYPTION AND DECRYPTION USING CNN

Chapter 4

SOFTWARE REQUIREMENTS

The chapter 4 is concerned with the software involved in the


proposed model. The software used is MATLAB 2018Ra.

MATLAB, short for MATrixLABoratory is a programming package


specifically designed for quick and easy scientific calculations and I/O. It has
literally hundreds of built-in functions for a wide variety of computations and
many toolboxes designed for specific research disciplines, including statistics,
optimization, solution of partial differential equations, data analysis. For
CME200, you need a solid knowledge of basic MATLAB commands and
several more advanced features including two- and three-dimensional graphics,
solution of algebraic equations, solution of ordinary differential equations,
calculations with matrices and solutions of linear systems of equations. Most of
what you need is discussed here, but most importantly, after this tutorial you
should be able to find your way around the MATLAB help function and
browser functions to find any additional features you may need or want to use.
General directions This is a hands-on tutorial. MATLAB commands for you to
type are printed in bold letters. Bold letters are also used to make MATLAB
expressions that are in lower case more visible when found in a sentence.
MATLAB is a programming platform designed specifically for engineers and
scientists. The heart of MATLAB is the MATLAB language, a matrix-based
language allowing the most natural expression of computational mathematics.

Dr.AIT, Bengaluru Dept. of Electronics and Communication Page 15


PERFORMANCE ANALYSIS OF ENCRYPTION AND DECRYPTION USING CNN

Using MATLAB, you can:

 Analyze data

 Develop algorithms

 Create models and applications

The language, apps, and built-in math functions enable you to quickly explore
multiple approaches to arrive at a solution. MATLAB lets you take your ideas
from research to production by deploying to enterprise applications and
embedded devices, as well as integrating with Simulink® and Model-Based
Design.

The MATLAB application is built around the MATLAB scripting language.


Common usage of the MATLAB application involves using the Command
Window as an interactive mathematical shell or executing text files containing
MATLAB code.

MATLAB offers many predefined mathematical functions for technical


computing which contains a large set of mathematical functions. Typing help
elfun and help specfun calls up full lists of elementary and special functions
respectively. There is a long list of mathematical functions that are built into
MATLAB. These functions are called built-ins. Many standard mathematical
functions, such as sin(x), cos(x), tan(x), e x, ln(x), are evaluated by the functions
sin, cos, tan, exp, and log respectively in MATLAB.

Dr.AIT, Bengaluru Dept. of Electronics and Communication Page 16


PERFORMANCE ANALYSIS OF ENCRYPTION AND DECRYPTION USING CNN

A different way of executing repeatedlycommands with MATLAB is:


1. to create a file with a list of commands,
2. save the file, and
3. run the file.
If needed, corrections or changes can be made to the commands in the file. The
files that
are used for this purpose are called script files or scripts for short.
This section covers the following topics:
 M-File Scripts
 M-File Functions

Dr.AIT, Bengaluru Dept. of Electronics and Communication Page 17


PERFORMANCE ANALYSIS OF ENCRYPTION AND DECRYPTION USING CNN

CHAPTER 5
SIMULATED RESULT

Dr.AIT, Bengaluru Dept. of Electronics and Communication Page 18


PERFORMANCE ANALYSIS OF ENCRYPTION AND DECRYPTION USING CNN

SIMULATED RESULT

The result analysisis done with simulation. A chaotic network is a neural


network whose weights depend on a chaotic sequence. The chaotic sequence
highly depends upon the initial conditions and the parameters, x(0) = 0.75 and ,μ
= 3.9 are set. It is very difficult to decrypt an encrypted data correctly by making
an exhaustive search without knowing x(0) and μ.

FIG 5.1 Encrypted Output

Here a plain text is used for encryption and the initial parameters for the chaotic
network are used as mentioned. The output or the encrypted data is then used for
decryption. It can easily be seen that the output is in a chaotic state.

Dr.AIT, Bengaluru Dept. of Electronics and Communication Page 19


PERFORMANCE ANALYSIS OF ENCRYPTION AND DECRYPTION USING CNN

FIG 5.2Decrypted Output

Depending upon the chaotic sequence a weight matrix and a bias matrix is
obtained and the net input is obtained. Then a hard limiter is applied as a transfer
function in order to obtain the digital encrypted data. For decryption the same
network is used and the same initial value is used to generate the chaotic
sequence and for decrypting the data successfully. The CNN here used can also
be used to encrypt and decrypt data such as images by converting it into a single
vector. Hence, CNN is one of guaranteed high security.

Dr.AIT, Bengaluru Dept. of Electronics and Communication Page


20
PERFORMANCE ANALYSIS OF ENCRYPTION AND DECRYPTION USING CNN

CHAPTER 6
APPLICATIONS AND ADVANTAGES

Dr.AIT, Bengaluru Dept. of Electronics and Communication Page 21


PERFORMANCE ANALYSIS OF ENCRYPTION AND DECRYPTION USING CNN

Chapter 6

6.1 APPLICATIONS

The chaotic cryptography can be used for real time applications like:

 Authentication or Digital Signatures

 Electronic Money

 Secured Network Communication

 Disk Encryption

6.2ADVANTAGES

 High security

 No distortion

 Suitable for system integration

Dr.AIT, Bengaluru Dept. of Electronics and Communication Page 22


PERFORMANCE ANALYSIS OF ENCRYPTION AND DECRYPTION USING CNN

CHAPTER 7

CONCLUSION

Dr.AIT, Bengaluru Dept. of Electronics and Communication Page 23


PERFORMANCE ANALYSIS OF ENCRYPTION AND DECRYPTION USING CNN

Chapter 7
CONCLUSION

Artificial Neural Networks is a simple yet powerful technique which has the
ability to emulate highly complex computational machines. In this project, we
have used certain encryption techniques to built CNN. ANNs can be used to
implement much complex combinational as well as sequential circuits.
Data security is a prime concern in data communication systems. The use of
ANN in the field of Cryptography is investigated using chaotic neural network.
A chaotic neural network for digital signal cryptography is analyzed. Better
results can be achieved by improvement of code or by use of better training
algorithms. Thus, Artificial Neural Network can be used as a new method of
encryption and decryption of data.

Dr.AIT, Bengaluru Dept. of Electronics and Communication Page


24
PERFORMANCE ANALYSIS OF ENCRYPTION AND DECRYPTION USING CNN

BIBILOGRAPHY

Dr.AIT, Bengaluru Dept. of Electronics and Communication Page 25


PERFORMANCE ANALYSIS OF ENCRYPTION AND DECRYPTION USING CNN

BIBLIOGRAPHY

1. William Stallings, “Cryptography and Network Security”


2. Zurada, Jacek M., “Introduction to Artificial Systems” West Publishing CO,
St. Paul,2018
3. https://www.researchgate.net/publication/37394331_Cryptography_using_Ar
tificial_Neural_Networks
4. “Design and Realization of A New Chaotic Neural Encryption/Decryption
Network” by Scott Su, Alvin Lin, and Jui-Cheng Yen.
5. "Artificial Intelligence A Modern Approach" by Stuart J. Russell and Peter
Norvig.
6. http://www.garykessler.net/library/crypto.html
7. Digital design, fourth edition by M. Morris Mano and Michael D. Ciletti

8. http://www.wikipedia.org

Dr.AIT, Bengaluru Dept. of Electronics and Communication Page 26

You might also like