SlideShare a Scribd company logo
1 of 8
Download to read offline
Jan Zizka (Eds) : CCSIT, SIPP, AISC, PDCTA - 2013
pp. 217–224, 2013. © CS & IT-CSCP 2013 DOI : 10.5121/csit.2013.3624
SECURED WIRELESS COMMUNICATION
THROUGH SIMULATED ANNEALING
GUIDED TRAINGULARIZED ENCRYPTION
BY MULTILAYER PERCEPTRON
GENERATED SESSION KEY (SATMLP)
Arindam Sarkar and J. K. Mandal
Department of Computer Science & Engineering,
University of Kalyani, Kalyani-741235,
Nadia, West Bengal, India.
{arindam.vb, jkm.cse}@gmail.com
ABSTRACT
In this paper, simulated annealing guided traingularized encryption using multilayer perceptron
generated session key (SATMLP) has been proposed for secured wireless communication. Both
sender and receiver station uses identical multilayer perceptron and depending on the final
output of the both side multilayer perceptron, weights vector of hidden layer get tuned in both
ends. After this tunning step both perceptrons generates identical weight vectors which is
consider as an one time session key. In the 1st level of encryption process traingularized sub
key1 is use to encrypt the plain text. In 2nd level of encryption simulated annealing method
helps to generates sub key 2 for further encryption of 1st level generated traingularized
encrypted text. Finally multilayer perceptron generated one time session key is used to perform
3rd level of encryption of 2nd level generated encrypted text. Recipient will use same identical
multilayer perceptron guided session key for performing deciphering process for getting the
simulated annealing guided intermediate cipher text. Then using sub key 2 deciphering
technique is performed to get traingularized encrypted text. Finally sub key 1 is used to
generate the plain text. In this proposed technique session key is not transmitted over public
channel apart from few data transfers are needed for weight simulation process. Because after
synchronization process both multilayer perceptron generates identical weight vector which
acts as a session key. Parametric tests are done and results are compared in terms of Chi-
Square test, response time in transmission with some existing classical techniques, which shows
comparable results for the proposed system.
KEYWORDS
multilayer perceptron; simulated annealing; traingularized; session key; wireless
communication.
218 Computer Science & Information Technology (CS & IT)
1. INTRODUCTION
These days a range of techniques are available to preserve data and information from
eavesdroppers [1]. Each algorithm has its own advantages and disadvantages. Security of the
encrypted text exclusively depends on the key used for encryption. In cryptography the main
security intimidation is man-in-the-middle attack at the time of exchange the secret session key
over public channel.
In this paper, a secret session key generation mechanism has been projected using multilayer
perceptron synchronization scheme i.e. session key generation using activated hidden layer’s
weight vector of sender & receiver’s multilayer perceptron synchronization process.
The sturdiness of the key is calculated in terms of linear complexity, randomness and correlation
immunity. To devise a key following 4 basic features like large period of key, large linear
complexity of the key, good random key sequence, high order of correlation immunity of the key
sequence is required. In this paper, additional sub key generation mechanism has been also
proposed using local random search algorithm i.e. Simulated Annealing (SA) for encryption of
the 1st level traingularized encrypted text. This SA based key generation methods generates key
which satisfies all 4 basic features.
The organization of this paper is as follows. Section 2 of the paper deals with the problem domain
and methodology. Proposed SATMLP i.e. multilayer perceptron synchronization system for
generation of session key has been discussed in section 3. Section 4 deals with proposed SA
based sub key generation. Traingularized encryption and decryption technique described in
section 5 and 6 respectively. Experimental results of proposed technique are given in section 7.
Section 8 provides the security related analysis. Conclusions and future scope are drawn in
section 9 and that of references at end.
2. PROBLEM DOMAIN AND METHODOLOGY
In cryptography, the main problem is to distribution of key between sender and receiver. Because
at the time of exchange of key over public channel intruders can intercept the key by residing in
between them. This particular problem is discussed in following sub section and proposed
technique addressed this problem.
A. Man-In-The-Middle Attack
Intruders may exist between sender & receiver and tries to capture every single information
transmitting from both parties. Diffie-Hellman key swap over technique [1] suffers from this
problem. Intruders can perform as sender and receiver concurrently and try to whip secret session
key at the time of exchanging key via public channel. This renowned problem is being addressed
in SATMLP where secret session key is not exchanged over public insecure channel. At end of
neural weight synchronization strategy of both parties’ generates identical output from the hidden
layer when generates one time secret session key.
B. Methodology in SATMLP
This well known problem of middle man attack has been addressed in SATMLP where secret
session key is not exchanged over public insecure channel. At end of multilayer perceptron
Computer Science & Information Technology (CS & IT) 219
weight synchronization strategy of both parties’ generates identical weight vectors and activated
hidden layer outputs for both the parties become identical. This identical output of hidden layer
for both parties can be use as one time secret session key for secured data exchange.
3. MULTILAYER PERCEPTRON BASED SESSION KEY GENERATION
A multilayer perceptron synaptic weight based key generation is carried out between receiver and
sender [2, 3, 4, 5, 6, 7, 8]. Sender and receivers multilayer perceptron select same single hidden
layer among multiple hidden layers for a particular session. For that session all other hidden layers
goes in deactivated mode means hidden (processing) units of other layers do nothing with the
incoming input. Synchronized identical weight vector of sender and receivers’ input layer
activated hidden layer and output layer becomes session key. The key generation technique and
analysis of the technique is discussed in the subsections A and B. Sender and receiver multilayer
perceptron in each session acts as a single layer network with dynamically chosen one activated
hidden layer and K no. of hidden neurons, N no. of input neurons having binary input vector,
{ }1,1 +−∈ijx , discrete weights, are generated from input to output, are lies between -L and +L,
{ }LLLwij ++−−∈ ,...,1, .Where i = 1,…,K denotes the ith
hidden unit of the perceptron and j = 1,…,N the
elements of the vector and one output neuron. Output of the hidden units is calculated by the
weighted sum over the current input values. So, the state of the each hidden neurons is expressed
using (eq.1)
ji
N
j
jiiii xw
N
xw
N
h ,
1
,
11
∑=
== (1)
Output of the ith
hidden unit is defined as )sgn( ii h=σ (2)
But in case of ih = 0 then iσ = -1 to produce a binary output. Hence a, iσ = +1, if the weighted
sum over its inputs is positive, or else it is inactive, iσ = -1. The total output of a perceptron is the
product of the hidden units expressed in (eq. 2) ∏=
=
K
i
i
1
στ (3)
Multilayer Perceptron Synchronization Algorithm
Input: - Random weights, input vectors for both multilayer perceptrons.
Output: - Secret key through synchronization of input and output neurons as vectors.
Method:-
Step 1. Initialization of random weight values of synaptic links between input layer and randomly
selected activated hidden layer. Where, { }LLLwij ++−−∈ ,...,1, (4)
Step 2. Repeat step 3 to 6 until the full synchronization is achieved, using Hebbian-learning
rules. ( ) ( )( )BA
ijiji xwgw ji τττστ ΘΘ+=+
,,, (5)
Step 3. Generate random input vector X. Inputs are generated by a third party or one of the
communicating parties.
220 Computer Science & Information Technology (CS & IT)
Step 4. Compute the values of the activated hidden neurons of activated hidden layer using (eq. 6)
ji
N
j
jiiii xw
N
xw
N
h ,
1
,
11
∑=
== (6)
Step 5. Compute the value of the output neuron using ∏=
=
K
i
i
1
στ (7)
Compare the output values of both multilayer perceptron by exchanging the system outputs. if
Output (A) ≠ Output (B), Go to step 3 else if Output (A) = Output (B) then one of the suitable
learning rule is applied only the hidden units are trained which have an output bit identical to the
common output. Update the weights only if the final output values of the perceptron are
equivalent. When synchronization is finally achieved, the synaptic weights are identical for both
the system.
Hidden Layer as a Secret Session Key
At end of full weight synchronization process, weight vectors between input layer and activated
hidden layer of both multilayer perceptron systems become identical. Identical weight vector
derived from synaptic link between input and activated hidden layer of both multilayer perceptron
can also becomes secret session key for a particular session after full weight synchronization is
achieved.
4. PROPOSED SA BASED SUB KEY GENERATION
Simulated Annealing (SA) algorithm which is based on the analogy between the annealing of
solids and the problem of solving combinatorial optimization problems SA provides local search
technique that helps to escape from local optima. In this scheme SA is used to generate key after
satisfying some desired features such as good statistical properties, long period, large linear
complexity, and highly order degree of correlation immunity.
Initialization Procedure: At the preliminary state of SA, each sequence is represented as a
binary string of an equal number of 0’s and 1’s of a given length. So, each generated keystream
(solution) coded as a binary string.
Fitness Calculation: For each sequence fitness value is calculated examining the keystream.
Using the following sequence of steps fitness is calculated:
Frequency test of 0’s & 1’s: Proportion of 0’s & 1’s in the total sequence are being checked
using eq. (8). ψψ 10
_ −=FaultFrequency (8)
Ψ0: No. of 0’s in total sequence. Ψ1: No. of 1’s in total sequence.
Binary Derivative Test: Binary Dervative test is applied to the sequence by taking the
overlapping 2 tupels in the original bit stream. Here, an equal proportion of 1’s and 0’s in the new
bit stream is checked by eq. (9)
Computer Science & Information Technology (CS & IT) 221
1__ C_C_ 10
−




 −= ψψFaultDerivativeBinary (9)
Table 1. Binary xor Operation Table
First Bit Second Bit Result
0 0 0
0 1 1
1 0 1
1 1 0
Where, C_ Ψ0: Count no. of 0’s in new bit stream. C_ Ψ1: Count no. of 1’s in new bit stream.
Change Point Test: In this test a check point is created for observing maximum difference
between, the proportions of 1’s including the check point and the proportions of 1’s after the
check point using eq. (10) , eq. ( 11) & eq. ( 12).
D[Cp]= Ψ* K[Cp]- Cp* K[Ψ] (10)
[ ] [ ]( )( )ψψψψρ KKM
r
−−= **/2exp 2
(11)
ρ r
FaultPoChange =int__ (12)
Ψ: Total no. of bit in the stream. K[Ψ]: Total no. of 1’s in the bit stream.
Cp: Change Point. K[Cp]: Total no. of 1’s to bit Cp (Change Point). D[Cp]: Difference respect to
the Change point. M: MAX (ABS ( D[Cp] ) ), for Cp=1.. Ψ.
ρr
: Probability of statistics that smaller value of ρ r
more significant the result.
Finally, fault of every test is summed up for calculating fitness function. Using eq. (13) fitness is
calculated.
Fault
FunctionFitness
+
=
1
1
_ (13)
Cooling Procedure
To determining the cooling schedule in case of optimization problem in annealing process
requires some parameters for initial value of control parameter, decrement function of control
parameter, length of individual distance parameter, stopping criteria.
5. TRAINGULARIZATION ENCRYPTION TECHNIQUE
During plain text encryption, in the first phase consider a block S = s0
0 s0
1 s0
2 s0
3 s0
4 s0
5 … s0
n-2 s0
n-
1 of size n bits, where s0
i = 0 or 1 for 0 <= i <= (n-1). Now, starting from MSB (s0
0) and the next-
to-MSB (s0
1), bits are pair-wise XORed, so that the 1st
intermediate sub-stream S1
= s1
0 s1
1 s1
2 s1
3
s1
4 s1
5 … s1
n-2 is generated consisting of (n-1) bits, where s1
j = s0
j ⊕ s0
j+1 for 0 <= j <= n-2, ⊕
stands for the exclusive OR operation. This 1st
intermediate sub-stream S1
is also then pair-wise
XORed to generate S2
= s2
0 s2
1 s2
2 s2
3 s2
4 s2
5 … s2
n-3, which is the 2nd
intermediate sub-stream of
length (n-2). This process continues (n-1) times to ultimately generate Sn-1
= sn-1
0, which is a
single bit only. Thus the size of the 1st
intermediate sub-stream is one bit less than the source sub-
stream; the size of each of the intermediate sub-streams starting from the 2nd
one is one bit less
222 Computer Science & Information Technology (CS & IT)
than that of the sub- stream wherefrom it was generated; and finally the size of the final sub-
stream in the process is one bit less than the final intermediate sub-stream. Table 2 & figure 1(a)
show the process.
Table 2. Options for choosing Target Block from Triangle
Option
No.
Target Block Method of Formation
001
s0
0 s1
0 s2
0 s3
0 s4
0 s5
0 …
sn-2
0 sn-1
0
Taking all the MSBs starting
from the source block till the
last block generated
010
sn-1
0 sn-2
0 sn-3
0 sn-4
0 sn-5
0 …
s1
0 s0
0
Taking all the MSBs starting
from the last block generated
till the source block
011
s0
n-1 s1
n-2 s2
n-3 s3
n-4 s4
n-5
… sn-2
1 sn-1
0
Taking all the LSBs starting
from the source block till the
last block generated
100
sn-1
0 sn-2
1 sn-3
2 sn-4
3 sn-5
4
… s1
n-2 s0
n-1
Taking all the LSBs starting
from the last block generated
till the source block
Table 2 describes different options for choosing target block from triangle.
6. TRAINGULARIZATION DECRYPTION TECHNIQUE
To ease the explanation of decryption technique, let us consider, e0
i-1 = si-1
n-i for 1 <= i <= n, so that
the encrypted block becomes E = e0
0 e0
1 e0
2 e0
3 e0
4 … e0
n-2 e0
n-1. After the formation of the triangle,
for the purpose of decryption, the block en-1
0 en-2
0 en-3
0 en-4
0 en-5
0 … e1
0 e0
0, i.e., the block
constructed by taking all the MSBs of the blocks starting from the finally generated single-bit
block En-1
to E, are to be taken together and it is to be considered as the decrypted block. Figure
1(b) show the triangle generated and hence the decrypted block obtained. Here the intermediate
blocks are referred to as E1
, E2
, …, En-2
and the final block generated as En-1
.
Computer Science & Information Technology (CS & IT) 223
7. EXPERIMENTAL RESULTS
In this segment the results of implementation of the proposed technique has been presented in
terms of Chi-Square test, no. of data exchanged & iterations needed for neural hidden layer
synchronization with different parameter’s value, synchronization snapshot & synchronized
weight. The results are also compared with existing RSA & TDES [1] technique. Table 3 shows
Chi-Square value for different source stream size after applying different encryption algorithms. It
is seen that the Chi-Square value of proposed is better compared to the algorithm TDES and
comparable to the Chi-Square value of the RSA algorithm. Figure 2. shows graphical
representation of stream size vs. Chi square value. Figure 3. Shows simulation graph for formation
of asymmetrical to symmetric synchronized weight matrix for N=10, K=10,L=4. Table 4 shows
total no. of iteration needed & no. of data being transferred for synaptic simulation process with
different input(N) & hidden(H) neurons and varying synaptic depth(L).
8. SECURITY OF THE SATMLP TECHNIQUE
The main difference between the partners and the attacker in neural machine is that sender and
receiver are able to influence each other by communicating their output bits A
τ & B
τ while
attacker can only listen to these messages. Of course, sender and receiver use their advantage to
select suitable input vectors for adjusting the weights. These confirm that the security of neural
cryptography is based on the bidirectional interaction of the partners. Each partener uses a
seperate, but identical pseudo random no. generator. As these devices are initialized with a secret
seed state shared by sender and receiver. They produce exactly the same sequence of input bits.
224 Computer Science & Information Technology (CS & IT)
Where as attacker does not know this secret seed state. By increasing synaptic depth average
synchronize time will be increased polynomial time. But success probability of attacker will be
drop exponentially
9. FUTURE SCOPE & CONCLUSION
This paper presents a novel approach for generation of secret key proposed algorithm using
neural hidden layer. This technique enhances the security features of the key exchange algorithm
by increasing of the synaptic depth L of the neural machine. In this case, the two partners sender
and receiver do not have to exchange a common secret key over a public channel but use their
indistinguishable weights as a secret key needed for encryption or decryption. So likelihood of
attack proposed technique is much lesser than the simple key exchange algorithm. Future scope
of this technique is that this neural model can be used in wireless communication. Some
evolutionary algorithm can be incorporated with this neural model to get well distributed weight
vector.
ACKNOWLEDGMENT
The author expressed deep sense of gratitude to the Department of Science & Technology (DST) ,
Govt. of India, for financial assistance through INSPIRE Fellowship leading for a PhD work
under which this work has been carried out, at the department of Computer Science &
Engineering, University of Kalyani.
REFERENCES
[1] Atul Kahate, Cryptography and Network Security, 2003, Tata McGraw-Hill publishing Company
Limited, Eighth reprint (2006).
[2] Mandal, J. K., Sarkar Arindam, “An Adaptive Genetic Key Based Neural Encryption For Online
Wireless Communication (AGKNE)”, International Conference on Recent Trends In Information
Systems (RETIS 2011) BY IEEE, 21-23 December 2011, Jadavpur University, Kolkata, India. ISBN
978-1-4577-0791-9, (2011)
[3] R. Mislovaty, Y. Perchenok, I. Kanter, and W. Kinzel. Secure key-exchange protocol with an absence
of injective functions. Phys. Rev. E, 66:066102, (2002).
[4] A. Ruttor, W. Kinzel, R. Naeh, and I. Kanter. Genetic attack on neural cryptography. Phys. Rev. E,
73(3):036121, (2006).
[5] A. Engel and C. Van den Broeck. Statistical Mechanics of Learning. Cambridge University Press,
Cambridge, (2001).
[6] T. Godhavari, N. R. Alainelu and R. Soundararajan “Cryptography Using Neural Network ” IEEE
Indicon 2005 Conference, Chennai, India, 11-13 Dec. (2005).gg
[7] Wolfgang Kinzel and ldo Kanter, "Interacting neural networks and cryptography", Advances in Solid
State Physics, Ed. by B. Kramer (Springer, Berlin. 2002), Vol. 42, p. 383 arXiv- cond-mat/0203011,
(2002)
[8] Wolfgang Kinzel and ldo Kanter, "Neural cryptography" proceedings of the 9th international
conference on Neural Information processing(ICONIP 02), (2002).

More Related Content

What's hot

Multilayer & Back propagation algorithm
Multilayer & Back propagation algorithmMultilayer & Back propagation algorithm
Multilayer & Back propagation algorithmswapnac12
 
Adaptive Resonance Theory
Adaptive Resonance TheoryAdaptive Resonance Theory
Adaptive Resonance TheoryNaveen Kumar
 
Adaptive resonance theory (art)
Adaptive resonance theory (art)Adaptive resonance theory (art)
Adaptive resonance theory (art)Ashutosh Tyagi
 
Principles of soft computing-Associative memory networks
Principles of soft computing-Associative memory networksPrinciples of soft computing-Associative memory networks
Principles of soft computing-Associative memory networksSivagowry Shathesh
 
Back propagation
Back propagationBack propagation
Back propagationNagarajan
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
Lecture 7: Recurrent Neural Networks
Lecture 7: Recurrent Neural NetworksLecture 7: Recurrent Neural Networks
Lecture 7: Recurrent Neural NetworksSang Jun Lee
 
QUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATES
QUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATESQUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATES
QUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATESIJNSA Journal
 
Ire presentation
Ire presentationIre presentation
Ire presentationRaj Patel
 
2.5 backpropagation
2.5 backpropagation2.5 backpropagation
2.5 backpropagationKrish_ver2
 
Web spam classification using supervised artificial neural network algorithms
Web spam classification using supervised artificial neural network algorithmsWeb spam classification using supervised artificial neural network algorithms
Web spam classification using supervised artificial neural network algorithmsaciijournal
 
A New Classifier Based onRecurrent Neural Network Using Multiple Binary-Outpu...
A New Classifier Based onRecurrent Neural Network Using Multiple Binary-Outpu...A New Classifier Based onRecurrent Neural Network Using Multiple Binary-Outpu...
A New Classifier Based onRecurrent Neural Network Using Multiple Binary-Outpu...iosrjce
 
14 Machine Learning Single Layer Perceptron
14 Machine Learning Single Layer Perceptron14 Machine Learning Single Layer Perceptron
14 Machine Learning Single Layer PerceptronAndres Mendez-Vazquez
 
The Back Propagation Learning Algorithm
The Back Propagation Learning AlgorithmThe Back Propagation Learning Algorithm
The Back Propagation Learning AlgorithmESCOM
 
Classification by back propagation, multi layered feed forward neural network...
Classification by back propagation, multi layered feed forward neural network...Classification by back propagation, multi layered feed forward neural network...
Classification by back propagation, multi layered feed forward neural network...bihira aggrey
 
Seminar Report on Quantum Key Distribution
Seminar Report on Quantum Key DistributionSeminar Report on Quantum Key Distribution
Seminar Report on Quantum Key DistributionShahrikh Khan
 

What's hot (17)

Multilayer & Back propagation algorithm
Multilayer & Back propagation algorithmMultilayer & Back propagation algorithm
Multilayer & Back propagation algorithm
 
Adaptive Resonance Theory
Adaptive Resonance TheoryAdaptive Resonance Theory
Adaptive Resonance Theory
 
Adaptive resonance theory (art)
Adaptive resonance theory (art)Adaptive resonance theory (art)
Adaptive resonance theory (art)
 
Principles of soft computing-Associative memory networks
Principles of soft computing-Associative memory networksPrinciples of soft computing-Associative memory networks
Principles of soft computing-Associative memory networks
 
Hopfield Networks
Hopfield NetworksHopfield Networks
Hopfield Networks
 
Back propagation
Back propagationBack propagation
Back propagation
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Lecture 7: Recurrent Neural Networks
Lecture 7: Recurrent Neural NetworksLecture 7: Recurrent Neural Networks
Lecture 7: Recurrent Neural Networks
 
QUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATES
QUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATESQUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATES
QUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATES
 
Ire presentation
Ire presentationIre presentation
Ire presentation
 
2.5 backpropagation
2.5 backpropagation2.5 backpropagation
2.5 backpropagation
 
Web spam classification using supervised artificial neural network algorithms
Web spam classification using supervised artificial neural network algorithmsWeb spam classification using supervised artificial neural network algorithms
Web spam classification using supervised artificial neural network algorithms
 
A New Classifier Based onRecurrent Neural Network Using Multiple Binary-Outpu...
A New Classifier Based onRecurrent Neural Network Using Multiple Binary-Outpu...A New Classifier Based onRecurrent Neural Network Using Multiple Binary-Outpu...
A New Classifier Based onRecurrent Neural Network Using Multiple Binary-Outpu...
 
14 Machine Learning Single Layer Perceptron
14 Machine Learning Single Layer Perceptron14 Machine Learning Single Layer Perceptron
14 Machine Learning Single Layer Perceptron
 
The Back Propagation Learning Algorithm
The Back Propagation Learning AlgorithmThe Back Propagation Learning Algorithm
The Back Propagation Learning Algorithm
 
Classification by back propagation, multi layered feed forward neural network...
Classification by back propagation, multi layered feed forward neural network...Classification by back propagation, multi layered feed forward neural network...
Classification by back propagation, multi layered feed forward neural network...
 
Seminar Report on Quantum Key Distribution
Seminar Report on Quantum Key DistributionSeminar Report on Quantum Key Distribution
Seminar Report on Quantum Key Distribution
 

Similar to SECURED WIRELESS COMMUNICATION THROUGH SIMULATED ANNEALING GUIDED TRAINGULARIZED ENCRYPTION BY MULTILAYER PERCEPTRON GENERATED SESSION KEY (SATMLP)

Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...pijans
 
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKSSYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKSIJNSA Journal
 
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKSSYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKSIJNSA Journal
 
GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...
GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...
GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...ijwmn
 
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...TELKOMNIKA JOURNAL
 
Elgamal signature for content distribution with network coding
Elgamal signature for content distribution with network codingElgamal signature for content distribution with network coding
Elgamal signature for content distribution with network codingijwmn
 
IRJET- Symmetric Cryptography using Neural Networks
IRJET-  	  Symmetric Cryptography using Neural NetworksIRJET-  	  Symmetric Cryptography using Neural Networks
IRJET- Symmetric Cryptography using Neural NetworksIRJET Journal
 
Neural Cryptography for Secret Key Exchange
Neural Cryptography for Secret Key ExchangeNeural Cryptography for Secret Key Exchange
Neural Cryptography for Secret Key ExchangeIJMTST Journal
 
Biomedical Signals Classification With Transformer Based Model.pptx
Biomedical Signals Classification With Transformer Based Model.pptxBiomedical Signals Classification With Transformer Based Model.pptx
Biomedical Signals Classification With Transformer Based Model.pptxSandeep Kumar
 
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural NetworksSecuring Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural Networkstheijes
 
One to many (new scheme for symmetric cryptography)
One to many (new scheme for symmetric cryptography)One to many (new scheme for symmetric cryptography)
One to many (new scheme for symmetric cryptography)TELKOMNIKA JOURNAL
 
A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...
A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...
A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...IJECEIAES
 
Security Support in In-Network Processing & analysis of key management in WSN
Security Support in In-Network  Processing & analysis of key management in  WSNSecurity Support in In-Network  Processing & analysis of key management in  WSN
Security Support in In-Network Processing & analysis of key management in WSNvik001ind
 
Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...IJCNCJournal
 
Query optimization for_sensor_networks
Query optimization for_sensor_networksQuery optimization for_sensor_networks
Query optimization for_sensor_networksHarshavardhan Achrekar
 
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...Editor IJCATR
 
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...IJCNCJournal
 
ARTIFICIAL NEURAL NETWORK APPROACH TO MODELING OF POLYPROPYLENE REACTOR
ARTIFICIAL NEURAL NETWORK APPROACH TO MODELING OF POLYPROPYLENE REACTORARTIFICIAL NEURAL NETWORK APPROACH TO MODELING OF POLYPROPYLENE REACTOR
ARTIFICIAL NEURAL NETWORK APPROACH TO MODELING OF POLYPROPYLENE REACTORijac123
 
Optimal parameter selection for unsupervised neural network using genetic alg...
Optimal parameter selection for unsupervised neural network using genetic alg...Optimal parameter selection for unsupervised neural network using genetic alg...
Optimal parameter selection for unsupervised neural network using genetic alg...IJCSEA Journal
 

Similar to SECURED WIRELESS COMMUNICATION THROUGH SIMULATED ANNEALING GUIDED TRAINGULARIZED ENCRYPTION BY MULTILAYER PERCEPTRON GENERATED SESSION KEY (SATMLP) (20)

Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
 
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKSSYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
 
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKSSYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
 
GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...
GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...
GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...
 
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
 
Elgamal signature for content distribution with network coding
Elgamal signature for content distribution with network codingElgamal signature for content distribution with network coding
Elgamal signature for content distribution with network coding
 
IRJET- Symmetric Cryptography using Neural Networks
IRJET-  	  Symmetric Cryptography using Neural NetworksIRJET-  	  Symmetric Cryptography using Neural Networks
IRJET- Symmetric Cryptography using Neural Networks
 
Neural Cryptography for Secret Key Exchange
Neural Cryptography for Secret Key ExchangeNeural Cryptography for Secret Key Exchange
Neural Cryptography for Secret Key Exchange
 
Biomedical Signals Classification With Transformer Based Model.pptx
Biomedical Signals Classification With Transformer Based Model.pptxBiomedical Signals Classification With Transformer Based Model.pptx
Biomedical Signals Classification With Transformer Based Model.pptx
 
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural NetworksSecuring Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
 
One to many (new scheme for symmetric cryptography)
One to many (new scheme for symmetric cryptography)One to many (new scheme for symmetric cryptography)
One to many (new scheme for symmetric cryptography)
 
A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...
A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...
A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...
 
Security Support in In-Network Processing & analysis of key management in WSN
Security Support in In-Network  Processing & analysis of key management in  WSNSecurity Support in In-Network  Processing & analysis of key management in  WSN
Security Support in In-Network Processing & analysis of key management in WSN
 
Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...
 
Query optimization for_sensor_networks
Query optimization for_sensor_networksQuery optimization for_sensor_networks
Query optimization for_sensor_networks
 
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
 
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
 
ARTIFICIAL NEURAL NETWORK APPROACH TO MODELING OF POLYPROPYLENE REACTOR
ARTIFICIAL NEURAL NETWORK APPROACH TO MODELING OF POLYPROPYLENE REACTORARTIFICIAL NEURAL NETWORK APPROACH TO MODELING OF POLYPROPYLENE REACTOR
ARTIFICIAL NEURAL NETWORK APPROACH TO MODELING OF POLYPROPYLENE REACTOR
 
Optimal parameter selection for unsupervised neural network using genetic alg...
Optimal parameter selection for unsupervised neural network using genetic alg...Optimal parameter selection for unsupervised neural network using genetic alg...
Optimal parameter selection for unsupervised neural network using genetic alg...
 
Neural networks
Neural networksNeural networks
Neural networks
 

More from cscpconf

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR cscpconf
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATIONcscpconf
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...cscpconf
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIESPROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIEScscpconf
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICA SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICcscpconf
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS cscpconf
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS cscpconf
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICTWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICcscpconf
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINcscpconf
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...cscpconf
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMIMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMcscpconf
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...cscpconf
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWcscpconf
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKCLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKcscpconf
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...cscpconf
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAPROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAcscpconf
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHCHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHcscpconf
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...cscpconf
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGESOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGEcscpconf
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTcscpconf
 

More from cscpconf (20)

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIESPROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICA SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICTWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMIMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEW
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKCLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAPROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHCHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGESOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
 

Recently uploaded

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 

Recently uploaded (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 

SECURED WIRELESS COMMUNICATION THROUGH SIMULATED ANNEALING GUIDED TRAINGULARIZED ENCRYPTION BY MULTILAYER PERCEPTRON GENERATED SESSION KEY (SATMLP)

  • 1. Jan Zizka (Eds) : CCSIT, SIPP, AISC, PDCTA - 2013 pp. 217–224, 2013. © CS & IT-CSCP 2013 DOI : 10.5121/csit.2013.3624 SECURED WIRELESS COMMUNICATION THROUGH SIMULATED ANNEALING GUIDED TRAINGULARIZED ENCRYPTION BY MULTILAYER PERCEPTRON GENERATED SESSION KEY (SATMLP) Arindam Sarkar and J. K. Mandal Department of Computer Science & Engineering, University of Kalyani, Kalyani-741235, Nadia, West Bengal, India. {arindam.vb, jkm.cse}@gmail.com ABSTRACT In this paper, simulated annealing guided traingularized encryption using multilayer perceptron generated session key (SATMLP) has been proposed for secured wireless communication. Both sender and receiver station uses identical multilayer perceptron and depending on the final output of the both side multilayer perceptron, weights vector of hidden layer get tuned in both ends. After this tunning step both perceptrons generates identical weight vectors which is consider as an one time session key. In the 1st level of encryption process traingularized sub key1 is use to encrypt the plain text. In 2nd level of encryption simulated annealing method helps to generates sub key 2 for further encryption of 1st level generated traingularized encrypted text. Finally multilayer perceptron generated one time session key is used to perform 3rd level of encryption of 2nd level generated encrypted text. Recipient will use same identical multilayer perceptron guided session key for performing deciphering process for getting the simulated annealing guided intermediate cipher text. Then using sub key 2 deciphering technique is performed to get traingularized encrypted text. Finally sub key 1 is used to generate the plain text. In this proposed technique session key is not transmitted over public channel apart from few data transfers are needed for weight simulation process. Because after synchronization process both multilayer perceptron generates identical weight vector which acts as a session key. Parametric tests are done and results are compared in terms of Chi- Square test, response time in transmission with some existing classical techniques, which shows comparable results for the proposed system. KEYWORDS multilayer perceptron; simulated annealing; traingularized; session key; wireless communication.
  • 2. 218 Computer Science & Information Technology (CS & IT) 1. INTRODUCTION These days a range of techniques are available to preserve data and information from eavesdroppers [1]. Each algorithm has its own advantages and disadvantages. Security of the encrypted text exclusively depends on the key used for encryption. In cryptography the main security intimidation is man-in-the-middle attack at the time of exchange the secret session key over public channel. In this paper, a secret session key generation mechanism has been projected using multilayer perceptron synchronization scheme i.e. session key generation using activated hidden layer’s weight vector of sender & receiver’s multilayer perceptron synchronization process. The sturdiness of the key is calculated in terms of linear complexity, randomness and correlation immunity. To devise a key following 4 basic features like large period of key, large linear complexity of the key, good random key sequence, high order of correlation immunity of the key sequence is required. In this paper, additional sub key generation mechanism has been also proposed using local random search algorithm i.e. Simulated Annealing (SA) for encryption of the 1st level traingularized encrypted text. This SA based key generation methods generates key which satisfies all 4 basic features. The organization of this paper is as follows. Section 2 of the paper deals with the problem domain and methodology. Proposed SATMLP i.e. multilayer perceptron synchronization system for generation of session key has been discussed in section 3. Section 4 deals with proposed SA based sub key generation. Traingularized encryption and decryption technique described in section 5 and 6 respectively. Experimental results of proposed technique are given in section 7. Section 8 provides the security related analysis. Conclusions and future scope are drawn in section 9 and that of references at end. 2. PROBLEM DOMAIN AND METHODOLOGY In cryptography, the main problem is to distribution of key between sender and receiver. Because at the time of exchange of key over public channel intruders can intercept the key by residing in between them. This particular problem is discussed in following sub section and proposed technique addressed this problem. A. Man-In-The-Middle Attack Intruders may exist between sender & receiver and tries to capture every single information transmitting from both parties. Diffie-Hellman key swap over technique [1] suffers from this problem. Intruders can perform as sender and receiver concurrently and try to whip secret session key at the time of exchanging key via public channel. This renowned problem is being addressed in SATMLP where secret session key is not exchanged over public insecure channel. At end of neural weight synchronization strategy of both parties’ generates identical output from the hidden layer when generates one time secret session key. B. Methodology in SATMLP This well known problem of middle man attack has been addressed in SATMLP where secret session key is not exchanged over public insecure channel. At end of multilayer perceptron
  • 3. Computer Science & Information Technology (CS & IT) 219 weight synchronization strategy of both parties’ generates identical weight vectors and activated hidden layer outputs for both the parties become identical. This identical output of hidden layer for both parties can be use as one time secret session key for secured data exchange. 3. MULTILAYER PERCEPTRON BASED SESSION KEY GENERATION A multilayer perceptron synaptic weight based key generation is carried out between receiver and sender [2, 3, 4, 5, 6, 7, 8]. Sender and receivers multilayer perceptron select same single hidden layer among multiple hidden layers for a particular session. For that session all other hidden layers goes in deactivated mode means hidden (processing) units of other layers do nothing with the incoming input. Synchronized identical weight vector of sender and receivers’ input layer activated hidden layer and output layer becomes session key. The key generation technique and analysis of the technique is discussed in the subsections A and B. Sender and receiver multilayer perceptron in each session acts as a single layer network with dynamically chosen one activated hidden layer and K no. of hidden neurons, N no. of input neurons having binary input vector, { }1,1 +−∈ijx , discrete weights, are generated from input to output, are lies between -L and +L, { }LLLwij ++−−∈ ,...,1, .Where i = 1,…,K denotes the ith hidden unit of the perceptron and j = 1,…,N the elements of the vector and one output neuron. Output of the hidden units is calculated by the weighted sum over the current input values. So, the state of the each hidden neurons is expressed using (eq.1) ji N j jiiii xw N xw N h , 1 , 11 ∑= == (1) Output of the ith hidden unit is defined as )sgn( ii h=σ (2) But in case of ih = 0 then iσ = -1 to produce a binary output. Hence a, iσ = +1, if the weighted sum over its inputs is positive, or else it is inactive, iσ = -1. The total output of a perceptron is the product of the hidden units expressed in (eq. 2) ∏= = K i i 1 στ (3) Multilayer Perceptron Synchronization Algorithm Input: - Random weights, input vectors for both multilayer perceptrons. Output: - Secret key through synchronization of input and output neurons as vectors. Method:- Step 1. Initialization of random weight values of synaptic links between input layer and randomly selected activated hidden layer. Where, { }LLLwij ++−−∈ ,...,1, (4) Step 2. Repeat step 3 to 6 until the full synchronization is achieved, using Hebbian-learning rules. ( ) ( )( )BA ijiji xwgw ji τττστ ΘΘ+=+ ,,, (5) Step 3. Generate random input vector X. Inputs are generated by a third party or one of the communicating parties.
  • 4. 220 Computer Science & Information Technology (CS & IT) Step 4. Compute the values of the activated hidden neurons of activated hidden layer using (eq. 6) ji N j jiiii xw N xw N h , 1 , 11 ∑= == (6) Step 5. Compute the value of the output neuron using ∏= = K i i 1 στ (7) Compare the output values of both multilayer perceptron by exchanging the system outputs. if Output (A) ≠ Output (B), Go to step 3 else if Output (A) = Output (B) then one of the suitable learning rule is applied only the hidden units are trained which have an output bit identical to the common output. Update the weights only if the final output values of the perceptron are equivalent. When synchronization is finally achieved, the synaptic weights are identical for both the system. Hidden Layer as a Secret Session Key At end of full weight synchronization process, weight vectors between input layer and activated hidden layer of both multilayer perceptron systems become identical. Identical weight vector derived from synaptic link between input and activated hidden layer of both multilayer perceptron can also becomes secret session key for a particular session after full weight synchronization is achieved. 4. PROPOSED SA BASED SUB KEY GENERATION Simulated Annealing (SA) algorithm which is based on the analogy between the annealing of solids and the problem of solving combinatorial optimization problems SA provides local search technique that helps to escape from local optima. In this scheme SA is used to generate key after satisfying some desired features such as good statistical properties, long period, large linear complexity, and highly order degree of correlation immunity. Initialization Procedure: At the preliminary state of SA, each sequence is represented as a binary string of an equal number of 0’s and 1’s of a given length. So, each generated keystream (solution) coded as a binary string. Fitness Calculation: For each sequence fitness value is calculated examining the keystream. Using the following sequence of steps fitness is calculated: Frequency test of 0’s & 1’s: Proportion of 0’s & 1’s in the total sequence are being checked using eq. (8). ψψ 10 _ −=FaultFrequency (8) Ψ0: No. of 0’s in total sequence. Ψ1: No. of 1’s in total sequence. Binary Derivative Test: Binary Dervative test is applied to the sequence by taking the overlapping 2 tupels in the original bit stream. Here, an equal proportion of 1’s and 0’s in the new bit stream is checked by eq. (9)
  • 5. Computer Science & Information Technology (CS & IT) 221 1__ C_C_ 10 −      −= ψψFaultDerivativeBinary (9) Table 1. Binary xor Operation Table First Bit Second Bit Result 0 0 0 0 1 1 1 0 1 1 1 0 Where, C_ Ψ0: Count no. of 0’s in new bit stream. C_ Ψ1: Count no. of 1’s in new bit stream. Change Point Test: In this test a check point is created for observing maximum difference between, the proportions of 1’s including the check point and the proportions of 1’s after the check point using eq. (10) , eq. ( 11) & eq. ( 12). D[Cp]= Ψ* K[Cp]- Cp* K[Ψ] (10) [ ] [ ]( )( )ψψψψρ KKM r −−= **/2exp 2 (11) ρ r FaultPoChange =int__ (12) Ψ: Total no. of bit in the stream. K[Ψ]: Total no. of 1’s in the bit stream. Cp: Change Point. K[Cp]: Total no. of 1’s to bit Cp (Change Point). D[Cp]: Difference respect to the Change point. M: MAX (ABS ( D[Cp] ) ), for Cp=1.. Ψ. ρr : Probability of statistics that smaller value of ρ r more significant the result. Finally, fault of every test is summed up for calculating fitness function. Using eq. (13) fitness is calculated. Fault FunctionFitness + = 1 1 _ (13) Cooling Procedure To determining the cooling schedule in case of optimization problem in annealing process requires some parameters for initial value of control parameter, decrement function of control parameter, length of individual distance parameter, stopping criteria. 5. TRAINGULARIZATION ENCRYPTION TECHNIQUE During plain text encryption, in the first phase consider a block S = s0 0 s0 1 s0 2 s0 3 s0 4 s0 5 … s0 n-2 s0 n- 1 of size n bits, where s0 i = 0 or 1 for 0 <= i <= (n-1). Now, starting from MSB (s0 0) and the next- to-MSB (s0 1), bits are pair-wise XORed, so that the 1st intermediate sub-stream S1 = s1 0 s1 1 s1 2 s1 3 s1 4 s1 5 … s1 n-2 is generated consisting of (n-1) bits, where s1 j = s0 j ⊕ s0 j+1 for 0 <= j <= n-2, ⊕ stands for the exclusive OR operation. This 1st intermediate sub-stream S1 is also then pair-wise XORed to generate S2 = s2 0 s2 1 s2 2 s2 3 s2 4 s2 5 … s2 n-3, which is the 2nd intermediate sub-stream of length (n-2). This process continues (n-1) times to ultimately generate Sn-1 = sn-1 0, which is a single bit only. Thus the size of the 1st intermediate sub-stream is one bit less than the source sub- stream; the size of each of the intermediate sub-streams starting from the 2nd one is one bit less
  • 6. 222 Computer Science & Information Technology (CS & IT) than that of the sub- stream wherefrom it was generated; and finally the size of the final sub- stream in the process is one bit less than the final intermediate sub-stream. Table 2 & figure 1(a) show the process. Table 2. Options for choosing Target Block from Triangle Option No. Target Block Method of Formation 001 s0 0 s1 0 s2 0 s3 0 s4 0 s5 0 … sn-2 0 sn-1 0 Taking all the MSBs starting from the source block till the last block generated 010 sn-1 0 sn-2 0 sn-3 0 sn-4 0 sn-5 0 … s1 0 s0 0 Taking all the MSBs starting from the last block generated till the source block 011 s0 n-1 s1 n-2 s2 n-3 s3 n-4 s4 n-5 … sn-2 1 sn-1 0 Taking all the LSBs starting from the source block till the last block generated 100 sn-1 0 sn-2 1 sn-3 2 sn-4 3 sn-5 4 … s1 n-2 s0 n-1 Taking all the LSBs starting from the last block generated till the source block Table 2 describes different options for choosing target block from triangle. 6. TRAINGULARIZATION DECRYPTION TECHNIQUE To ease the explanation of decryption technique, let us consider, e0 i-1 = si-1 n-i for 1 <= i <= n, so that the encrypted block becomes E = e0 0 e0 1 e0 2 e0 3 e0 4 … e0 n-2 e0 n-1. After the formation of the triangle, for the purpose of decryption, the block en-1 0 en-2 0 en-3 0 en-4 0 en-5 0 … e1 0 e0 0, i.e., the block constructed by taking all the MSBs of the blocks starting from the finally generated single-bit block En-1 to E, are to be taken together and it is to be considered as the decrypted block. Figure 1(b) show the triangle generated and hence the decrypted block obtained. Here the intermediate blocks are referred to as E1 , E2 , …, En-2 and the final block generated as En-1 .
  • 7. Computer Science & Information Technology (CS & IT) 223 7. EXPERIMENTAL RESULTS In this segment the results of implementation of the proposed technique has been presented in terms of Chi-Square test, no. of data exchanged & iterations needed for neural hidden layer synchronization with different parameter’s value, synchronization snapshot & synchronized weight. The results are also compared with existing RSA & TDES [1] technique. Table 3 shows Chi-Square value for different source stream size after applying different encryption algorithms. It is seen that the Chi-Square value of proposed is better compared to the algorithm TDES and comparable to the Chi-Square value of the RSA algorithm. Figure 2. shows graphical representation of stream size vs. Chi square value. Figure 3. Shows simulation graph for formation of asymmetrical to symmetric synchronized weight matrix for N=10, K=10,L=4. Table 4 shows total no. of iteration needed & no. of data being transferred for synaptic simulation process with different input(N) & hidden(H) neurons and varying synaptic depth(L). 8. SECURITY OF THE SATMLP TECHNIQUE The main difference between the partners and the attacker in neural machine is that sender and receiver are able to influence each other by communicating their output bits A τ & B τ while attacker can only listen to these messages. Of course, sender and receiver use their advantage to select suitable input vectors for adjusting the weights. These confirm that the security of neural cryptography is based on the bidirectional interaction of the partners. Each partener uses a seperate, but identical pseudo random no. generator. As these devices are initialized with a secret seed state shared by sender and receiver. They produce exactly the same sequence of input bits.
  • 8. 224 Computer Science & Information Technology (CS & IT) Where as attacker does not know this secret seed state. By increasing synaptic depth average synchronize time will be increased polynomial time. But success probability of attacker will be drop exponentially 9. FUTURE SCOPE & CONCLUSION This paper presents a novel approach for generation of secret key proposed algorithm using neural hidden layer. This technique enhances the security features of the key exchange algorithm by increasing of the synaptic depth L of the neural machine. In this case, the two partners sender and receiver do not have to exchange a common secret key over a public channel but use their indistinguishable weights as a secret key needed for encryption or decryption. So likelihood of attack proposed technique is much lesser than the simple key exchange algorithm. Future scope of this technique is that this neural model can be used in wireless communication. Some evolutionary algorithm can be incorporated with this neural model to get well distributed weight vector. ACKNOWLEDGMENT The author expressed deep sense of gratitude to the Department of Science & Technology (DST) , Govt. of India, for financial assistance through INSPIRE Fellowship leading for a PhD work under which this work has been carried out, at the department of Computer Science & Engineering, University of Kalyani. REFERENCES [1] Atul Kahate, Cryptography and Network Security, 2003, Tata McGraw-Hill publishing Company Limited, Eighth reprint (2006). [2] Mandal, J. K., Sarkar Arindam, “An Adaptive Genetic Key Based Neural Encryption For Online Wireless Communication (AGKNE)”, International Conference on Recent Trends In Information Systems (RETIS 2011) BY IEEE, 21-23 December 2011, Jadavpur University, Kolkata, India. ISBN 978-1-4577-0791-9, (2011) [3] R. Mislovaty, Y. Perchenok, I. Kanter, and W. Kinzel. Secure key-exchange protocol with an absence of injective functions. Phys. Rev. E, 66:066102, (2002). [4] A. Ruttor, W. Kinzel, R. Naeh, and I. Kanter. Genetic attack on neural cryptography. Phys. Rev. E, 73(3):036121, (2006). [5] A. Engel and C. Van den Broeck. Statistical Mechanics of Learning. Cambridge University Press, Cambridge, (2001). [6] T. Godhavari, N. R. Alainelu and R. Soundararajan “Cryptography Using Neural Network ” IEEE Indicon 2005 Conference, Chennai, India, 11-13 Dec. (2005).gg [7] Wolfgang Kinzel and ldo Kanter, "Interacting neural networks and cryptography", Advances in Solid State Physics, Ed. by B. Kramer (Springer, Berlin. 2002), Vol. 42, p. 383 arXiv- cond-mat/0203011, (2002) [8] Wolfgang Kinzel and ldo Kanter, "Neural cryptography" proceedings of the 9th international conference on Neural Information processing(ICONIP 02), (2002).