SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1556
Symmetric Cryptography using Neural Networks
V. NAVEENA1, Dr. S. SATYANARAYANA2
M.Tech Scholar1, Senior Assistant Professor2
1,2Department of Computer Science & Engineering, Raghu Engineering College, Dakamarri(V),
Visakhapatanam, AP, India.
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - In this paper, I show Neural Networks is capable
of performing symmetric encryption in an adversarial setting
and improve on the known literature on this topic. I also show
that Neural Networks is capable of detecting known
cryptographically insecure communication
The parity machine (PM) is a neural network applied in
cryptography to generate a secret key. It is also used for a key
exchange protocol. The TPM network is in fact an FNN that
has input layer neurons constructed in the McCulloh-Pitts
model (Protić, 2015), (Dolecki and Kozera, 2015). In the
second layer, the network has neurons with specificactivation
functions. The outcome of the output neuron is the results of
the entire PM network. Each PM network is described bythree
parameters: the number of hidden neurons - K, the number of
input neurons connected to each hidden neuron - N, and the
maximum value for weight {-L, ... L}. A PM consists of KN
random input elements xji = ±1, j = 1…N, K binary hidden units
σi = ±1, i = 1,…, K, and one binary output unit τ=Πiσi, where σi
is determined via the function σi = sign(Σjwjixji). A PM that
has three neurons in the hidden layer (K=3) is called the three
parity machine.
The advantage of neural cryptographyisthatthealgorithm
used in generating a secret key can be a simple perception of
the Tree Parity Machine (TPM). Synchronization of TPMs by
mutual learning only works if both machines receive a
common sequence of (random) input vectors. For that
purpose, each communication party uses a separate, but
identical pseudo-random number generator (PRNG). By
mutual learning, two parties synchronize their networks
without transmitting inputs over a public channel. Having
reached full synchronization, parties can authenticate each
other by knowing weight vectors which are identical, and
represent a secret key
Key Words: Symmetric encryption, Secret Key.
1. INTRODUCTION
In case of neural cryptography,twoidentical dynamic
systems, starting from different initial condition receive an
identical input vector, generate an output bitandaretrained
based on the out bit. The dynamics of two networks and
their weight vectors found exhibit a novel phenomenon,
where network synchronize to a state with identical time
dependent weights. This concept of synchronization by
mutual learning can be applied to secret key exchange
protocol over a public channel has been studied and
generated key is used for encryptionanddecryption.The use
of the synchronized neural networks is as key material for
another algorithm or directly as a key stream as a stream
cipher[1].
The encryption/decryptionprocessissimpleandfaster.
But the key distribution is problem. Publickeycryptosystem
solves the key distribution problem by using differentsecret
key for internal user. Thus key exchange between users is
not required and the security of such system is depends of
computational complexity.Moreovertheprocessinvolved in
generating public key is very complex and time consuming.
To overcome these disadvantage special characteristic of
neural network can be used to generate common secret key
over public channel.
2. Tree parity machine
The parity machine (PM) is a neural network applied
in cryptography to generate a secret key. It is also used for a
key exchange protocol. The TPM network is in fact an FNN
that has input layer neurons constructed in the McCulloh-
Pitts model (Protić, 2015),(DoleckiandKozera,2015).Inthe
second layer, the network has neurons with specific
activation functions. Theoutcomeoftheoutputneuronisthe
results of the entire PM network. Each PM network is
described by three parameters: the number of hidden
neurons - K, the number of input neurons connected to each
hidden neuron - N, and the maximum value for weight {-L, ...
L}. A PM consists of KN random input elements xji = ±1, j =
1…N, K binary hidden units σi = ±1, i = 1,…, K, and one binary
output unit τ=Πiσi, where σi is determined via the function
σi = sign(Σjwjixji). A PM that has three neuronsinthehidden
layer (K=3) is called the three parity machine.
The advantage of neural cryptography is that the
algorithm used in generating a secret key can be a simple
perception of the Tree Parity Machine (TPM).
Synchronization of TPMs by mutual learning only works if
both machines receive a common sequence of (random)
input vectors. For that purpose, each communication party
uses a separate, but identical pseudo-random number
generator (PRNG). By mutual learning, two parties
synchronizetheirnetworkswithouttransmittinginputsover
a public channel. Having reached full synchronization,
parties can authenticate each other by knowing weight
vectors which are identical, and represent a secret key.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1557
3. NEURAL KEY EXCHANGE PROTOCOL
It is a key-exchange protocol which doesneitherusenumber
theory nor a public key, but it is based on a learning process
of neural networks: The two participants start from a secret
set of vectors wA and wB without knowing the key of their
partner. By exchanging public information the two keys
develop to a common time dependent key wA (t) = wB (t),
which can be used for authentication / key / hash is used to
encrypt and decrypt a given message
4. ONE TIME PASSWORD
One-Time Password (OTP) is always used as the
strongest authentication scheme among all password-based
solutions. The proposed a scheme that consists of three
phases. With the common input vector, weight vectors of
two TPMs are finally synchronized through mutual learning.
The synchronized weight vector is then used as a seed to
regenerate the input vector for the next step of learning. It is
the rule for input vector (Iu and Is) updating.
5. Queries
Although neural key exchange algorithm for
choosing the relevant inputs is sufficient to achieve a more
or less secure key-exchange protocol, A andBcouldimprove
it by taking more informationintoaccount.Includingqueries
in the training process of the neural networks. This means
that alternately A and B are generating an input which is
correlated with its state and A or B is asking the partner for
the corresponding output bit. The overlap between input
and weight vector is so low that the additional information
does not reveal much about the internal states. But queries
introduce a mutual influence between A and B which is not
available to an attacking network E. In addition the method
obtains a new (public) parameter which can be adjusted to
give optimal security. In this work query incorporatedtothe
case of the Hebbian training rule, which was successfully
attacked using the majority of an ensemble of attackers.
6. RESULTS
As we entered the page we have to enter num of Input
Neurons , num of Hidden Neuron, Rangeof WeightthenStart
the process then enter the Plain text then Sync the data key
will be Generated .After that Encrypt .
After that we are decrypt the data after the decryption then
we can RESET the process. We have also been using notonly
AES but another 2 sample ones.
7. CONCLUSION
Mutual learning is used for synchronization between two
parties that communicate across a public or privatechannel.
During the synchronization, bothcommunicationparties use
the same tree parity machines, receive common binary
inputs generated randomly from the same random number
generator, and exchange output bits. Adjusting the weights
according to the learning rules leads to full synchronization
in a finite number of steps. Networkstrainedontheirmutual
inputs synchronize to an identical time dependent weight
vectors. This phenomenon is used to generate a secret key.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1558
8. REFERENCES
[1] Navita Agarwal, Prachi Agarwal, “Use of Artificial Neural
Network in the Field of Security”, MIT International Journal
of Computer Science & Information Technology,Vol.3,No.1,
42-44, 2013.
[2] Ajit Singh, Havir Singh, “Cryptography for Secret Key
Exchange and Encryption with AES”, International Journal of
Advanced Research in Computer Science and Software
Engineering, Vol. 3, Issue. 5, 376-381, 2013.
[3] Siddeq Y. Ameen, Ali H. Mahdi, “AES Cryptosystem
Development using Neural Networks”, Inernational Journal
of Computer and Electrical Engineering, Vol. 3, No. 2, 315-
318, 2011.
[4] Eva Volna, Martin Kotyrba, Vaclav Kocian, Michal
Janosek, “Cryptography based on neural network”,
Proceedings 6th European Conference on Modelling and
Simulation, 2012.
[5] N. Prabakaran, P. Vivekanandan, “ A New Security on
Neural Cryptography with Queries”, International Journal of
Advanced Networking and Apllication (IJAIA), Vol.2, No. 1,
60-69, 2011.
[6] Wolfgang Kinzel, IdoKanter, “Neural Cryptography”,
Proceedings TH2002 Supplement, Vol. 4, 147-153, 2003.
[7] Einat Klein, Rachel Mislovaty, Idokanter,AndreasRuttor,
Wolfgang Kinzel, “Synchronization of neural network by
mutual learning and its application to cryptography”,
International Proceeding of:Advancesin Neural Information
Processing System 17, Neural Information Processing
System NIPS, 2004.

More Related Content

What's hot

Secure data transmission by using steganography
Secure data transmission by using steganographySecure data transmission by using steganography
Secure data transmission by using steganography
Alexander Decker
 
11.secure data transmission by using steganography
11.secure data transmission by using steganography11.secure data transmission by using steganography
11.secure data transmission by using steganography
Alexander Decker
 
A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...
IAEME Publication
 

What's hot (20)

NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael CipherNeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
 
Features of genetic algorithm for plain text encryption
Features of genetic algorithm for plain text encryption Features of genetic algorithm for plain text encryption
Features of genetic algorithm for plain text encryption
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Quantum cryptography for secured communication networks
Quantum cryptography for secured communication networksQuantum cryptography for secured communication networks
Quantum cryptography for secured communication networks
 
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKINGANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
 
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...
 
Secure data transmission by using steganography
Secure data transmission by using steganographySecure data transmission by using steganography
Secure data transmission by using steganography
 
11.secure data transmission by using steganography
11.secure data transmission by using steganography11.secure data transmission by using steganography
11.secure data transmission by using steganography
 
Elliptic Curve Cryptography Based Data Transmission against Blackhole Attack ...
Elliptic Curve Cryptography Based Data Transmission against Blackhole Attack ...Elliptic Curve Cryptography Based Data Transmission against Blackhole Attack ...
Elliptic Curve Cryptography Based Data Transmission against Blackhole Attack ...
 
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support CountsSymmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
 
Survey of Security Threats and Protection Techniques in Mobile Ad Hoc Networks
Survey of Security Threats and Protection Techniques in Mobile Ad Hoc NetworksSurvey of Security Threats and Protection Techniques in Mobile Ad Hoc Networks
Survey of Security Threats and Protection Techniques in Mobile Ad Hoc Networks
 
A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...
A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...
A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
 
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
 
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
 
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...
 
A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...
 
Implementation of message authentication code using DNA-LCG key and a novel h...
Implementation of message authentication code using DNA-LCG key and a novel h...Implementation of message authentication code using DNA-LCG key and a novel h...
Implementation of message authentication code using DNA-LCG key and a novel h...
 
Three Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum CryptographyThree Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum Cryptography
 
Securing Personal Information in Data Mining
Securing Personal Information in Data MiningSecuring Personal Information in Data Mining
Securing Personal Information in Data Mining
 

Similar to IRJET- Symmetric Cryptography using Neural Networks

Secured transmission through multi layer perceptron in wireless communication...
Secured transmission through multi layer perceptron in wireless communication...Secured transmission through multi layer perceptron in wireless communication...
Secured transmission through multi layer perceptron in wireless communication...
ijmnct
 
Optimized rationalize security and efficient data gathering in wireless senso...
Optimized rationalize security and efficient data gathering in wireless senso...Optimized rationalize security and efficient data gathering in wireless senso...
Optimized rationalize security and efficient data gathering in wireless senso...
ijmnct
 

Similar to IRJET- Symmetric Cryptography using Neural Networks (20)

Securing Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural NetworksSecuring Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
 
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
 
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
 
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
 
Review for Secure Data Aggregation in Wireless Sensor Networks
Review for Secure Data Aggregation in Wireless Sensor NetworksReview for Secure Data Aggregation in Wireless Sensor Networks
Review for Secure Data Aggregation in Wireless Sensor Networks
 
Pseudo-Random Bit Generator Using Chaotic Seed for Cryptographic Algorithm in...
Pseudo-Random Bit Generator Using Chaotic Seed for Cryptographic Algorithm in...Pseudo-Random Bit Generator Using Chaotic Seed for Cryptographic Algorithm in...
Pseudo-Random Bit Generator Using Chaotic Seed for Cryptographic Algorithm in...
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
 
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
 
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
 
Working with cryptographic key information
Working with cryptographic key informationWorking with cryptographic key information
Working with cryptographic key information
 
Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...
 
IJET-V3I2P3
IJET-V3I2P3IJET-V3I2P3
IJET-V3I2P3
 
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
 
Project presentation
Project presentationProject presentation
Project presentation
 
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
 
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
 
Secured transmission through multi layer perceptron in wireless communication...
Secured transmission through multi layer perceptron in wireless communication...Secured transmission through multi layer perceptron in wireless communication...
Secured transmission through multi layer perceptron in wireless communication...
 
Optimized rationalize security and efficient data gathering in wireless senso...
Optimized rationalize security and efficient data gathering in wireless senso...Optimized rationalize security and efficient data gathering in wireless senso...
Optimized rationalize security and efficient data gathering in wireless senso...
 
IJSRED-V2I2P12
IJSRED-V2I2P12IJSRED-V2I2P12
IJSRED-V2I2P12
 
A05510105
A05510105A05510105
A05510105
 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 

Recently uploaded (20)

Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 

IRJET- Symmetric Cryptography using Neural Networks

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1556 Symmetric Cryptography using Neural Networks V. NAVEENA1, Dr. S. SATYANARAYANA2 M.Tech Scholar1, Senior Assistant Professor2 1,2Department of Computer Science & Engineering, Raghu Engineering College, Dakamarri(V), Visakhapatanam, AP, India. ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - In this paper, I show Neural Networks is capable of performing symmetric encryption in an adversarial setting and improve on the known literature on this topic. I also show that Neural Networks is capable of detecting known cryptographically insecure communication The parity machine (PM) is a neural network applied in cryptography to generate a secret key. It is also used for a key exchange protocol. The TPM network is in fact an FNN that has input layer neurons constructed in the McCulloh-Pitts model (Protić, 2015), (Dolecki and Kozera, 2015). In the second layer, the network has neurons with specificactivation functions. The outcome of the output neuron is the results of the entire PM network. Each PM network is described bythree parameters: the number of hidden neurons - K, the number of input neurons connected to each hidden neuron - N, and the maximum value for weight {-L, ... L}. A PM consists of KN random input elements xji = ±1, j = 1…N, K binary hidden units σi = ±1, i = 1,…, K, and one binary output unit τ=Πiσi, where σi is determined via the function σi = sign(Σjwjixji). A PM that has three neurons in the hidden layer (K=3) is called the three parity machine. The advantage of neural cryptographyisthatthealgorithm used in generating a secret key can be a simple perception of the Tree Parity Machine (TPM). Synchronization of TPMs by mutual learning only works if both machines receive a common sequence of (random) input vectors. For that purpose, each communication party uses a separate, but identical pseudo-random number generator (PRNG). By mutual learning, two parties synchronize their networks without transmitting inputs over a public channel. Having reached full synchronization, parties can authenticate each other by knowing weight vectors which are identical, and represent a secret key Key Words: Symmetric encryption, Secret Key. 1. INTRODUCTION In case of neural cryptography,twoidentical dynamic systems, starting from different initial condition receive an identical input vector, generate an output bitandaretrained based on the out bit. The dynamics of two networks and their weight vectors found exhibit a novel phenomenon, where network synchronize to a state with identical time dependent weights. This concept of synchronization by mutual learning can be applied to secret key exchange protocol over a public channel has been studied and generated key is used for encryptionanddecryption.The use of the synchronized neural networks is as key material for another algorithm or directly as a key stream as a stream cipher[1]. The encryption/decryptionprocessissimpleandfaster. But the key distribution is problem. Publickeycryptosystem solves the key distribution problem by using differentsecret key for internal user. Thus key exchange between users is not required and the security of such system is depends of computational complexity.Moreovertheprocessinvolved in generating public key is very complex and time consuming. To overcome these disadvantage special characteristic of neural network can be used to generate common secret key over public channel. 2. Tree parity machine The parity machine (PM) is a neural network applied in cryptography to generate a secret key. It is also used for a key exchange protocol. The TPM network is in fact an FNN that has input layer neurons constructed in the McCulloh- Pitts model (Protić, 2015),(DoleckiandKozera,2015).Inthe second layer, the network has neurons with specific activation functions. Theoutcomeoftheoutputneuronisthe results of the entire PM network. Each PM network is described by three parameters: the number of hidden neurons - K, the number of input neurons connected to each hidden neuron - N, and the maximum value for weight {-L, ... L}. A PM consists of KN random input elements xji = ±1, j = 1…N, K binary hidden units σi = ±1, i = 1,…, K, and one binary output unit τ=Πiσi, where σi is determined via the function σi = sign(Σjwjixji). A PM that has three neuronsinthehidden layer (K=3) is called the three parity machine. The advantage of neural cryptography is that the algorithm used in generating a secret key can be a simple perception of the Tree Parity Machine (TPM). Synchronization of TPMs by mutual learning only works if both machines receive a common sequence of (random) input vectors. For that purpose, each communication party uses a separate, but identical pseudo-random number generator (PRNG). By mutual learning, two parties synchronizetheirnetworkswithouttransmittinginputsover a public channel. Having reached full synchronization, parties can authenticate each other by knowing weight vectors which are identical, and represent a secret key.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1557 3. NEURAL KEY EXCHANGE PROTOCOL It is a key-exchange protocol which doesneitherusenumber theory nor a public key, but it is based on a learning process of neural networks: The two participants start from a secret set of vectors wA and wB without knowing the key of their partner. By exchanging public information the two keys develop to a common time dependent key wA (t) = wB (t), which can be used for authentication / key / hash is used to encrypt and decrypt a given message 4. ONE TIME PASSWORD One-Time Password (OTP) is always used as the strongest authentication scheme among all password-based solutions. The proposed a scheme that consists of three phases. With the common input vector, weight vectors of two TPMs are finally synchronized through mutual learning. The synchronized weight vector is then used as a seed to regenerate the input vector for the next step of learning. It is the rule for input vector (Iu and Is) updating. 5. Queries Although neural key exchange algorithm for choosing the relevant inputs is sufficient to achieve a more or less secure key-exchange protocol, A andBcouldimprove it by taking more informationintoaccount.Includingqueries in the training process of the neural networks. This means that alternately A and B are generating an input which is correlated with its state and A or B is asking the partner for the corresponding output bit. The overlap between input and weight vector is so low that the additional information does not reveal much about the internal states. But queries introduce a mutual influence between A and B which is not available to an attacking network E. In addition the method obtains a new (public) parameter which can be adjusted to give optimal security. In this work query incorporatedtothe case of the Hebbian training rule, which was successfully attacked using the majority of an ensemble of attackers. 6. RESULTS As we entered the page we have to enter num of Input Neurons , num of Hidden Neuron, Rangeof WeightthenStart the process then enter the Plain text then Sync the data key will be Generated .After that Encrypt . After that we are decrypt the data after the decryption then we can RESET the process. We have also been using notonly AES but another 2 sample ones. 7. CONCLUSION Mutual learning is used for synchronization between two parties that communicate across a public or privatechannel. During the synchronization, bothcommunicationparties use the same tree parity machines, receive common binary inputs generated randomly from the same random number generator, and exchange output bits. Adjusting the weights according to the learning rules leads to full synchronization in a finite number of steps. Networkstrainedontheirmutual inputs synchronize to an identical time dependent weight vectors. This phenomenon is used to generate a secret key.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1558 8. REFERENCES [1] Navita Agarwal, Prachi Agarwal, “Use of Artificial Neural Network in the Field of Security”, MIT International Journal of Computer Science & Information Technology,Vol.3,No.1, 42-44, 2013. [2] Ajit Singh, Havir Singh, “Cryptography for Secret Key Exchange and Encryption with AES”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, Issue. 5, 376-381, 2013. [3] Siddeq Y. Ameen, Ali H. Mahdi, “AES Cryptosystem Development using Neural Networks”, Inernational Journal of Computer and Electrical Engineering, Vol. 3, No. 2, 315- 318, 2011. [4] Eva Volna, Martin Kotyrba, Vaclav Kocian, Michal Janosek, “Cryptography based on neural network”, Proceedings 6th European Conference on Modelling and Simulation, 2012. [5] N. Prabakaran, P. Vivekanandan, “ A New Security on Neural Cryptography with Queries”, International Journal of Advanced Networking and Apllication (IJAIA), Vol.2, No. 1, 60-69, 2011. [6] Wolfgang Kinzel, IdoKanter, “Neural Cryptography”, Proceedings TH2002 Supplement, Vol. 4, 147-153, 2003. [7] Einat Klein, Rachel Mislovaty, Idokanter,AndreasRuttor, Wolfgang Kinzel, “Synchronization of neural network by mutual learning and its application to cryptography”, International Proceeding of:Advancesin Neural Information Processing System 17, Neural Information Processing System NIPS, 2004.