SlideShare a Scribd company logo
1 of 16
Download to read offline
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.5, September 2014 
SOFT COMPUTING BASED CRYPTOGRAPHIC 
TECHNIQUE USING KOHONEN'S SELF-ORGANIZING 
MAP SYNCHRONIZATION FOR 
WIRELESS COMMUNICATION (KSOMSCT) 
Arindam Sarkar1 and J. K. Mandal2 
1Department of Computer Science & Engineering, University of Kalyani, W.B, India 
ABSTRACT 
In this paper a novel soft computing based cryptographic technique based on synchronization of two 
Kohonen's Self-Organizing Feature Map (KSOFM) between sender and receiver has been proposed. In this 
proposed technique KSOFM based synchronization is performed for tuning both sender and receiver. After 
the completion of the tuning identical session key get generates at the both sender and receiver end with the 
help of synchronized KSOFM. This synchronized network can be used for transmitting message using any 
light weight encryption/decryption algorithm with the help of identical session key of the synchronized 
network. Exhaustive parametric tests are done and results are compared with some existing classical 
techniques, which show comparable results for the proposed system. 
KEYWORDS 
Kohonen's Self-Organizing Map (KSOFM), soft computing, cryptography, Wireless Communication. 
1. INTRODUCTION 
A range of techniques are obtainable to protect data and information from attackers [1, 5, 6, 7, 8, 
9, 10]. Existing TPM and PPM [2, 3, 4] technique have some limitations like secret seed values 
used in the generation of identical input vector has to be transmitted to the other party via public 
channel in the SYN frame in each iteration. This significantly increases the synchronization time. 
Also for ensuring the security this parameters should not be transmitted via public channel. 
Furthermore, TPM and PPM needs significant amount of synchronization steps. This may not 
suitable in wireless communication because of resource constraints criteria. Proposed method of 
this paper eliminates all the above stated drawbacks of the TPM and PPM. The proposed 
technique performs the KSOFM based synchronization for generation of secret tuned session key 
at both ends with fewer amounts of synchronization steps compared to TPM and PPM. The 
organization of this paper is as follows. Proposed cryptographic technique has been discussed in 
section 2. Experiments results of this technique are given in section 3. Conclusions are drawn in 
section 4 and that of references at end. 
2. THE TECHNIQUE 
The proposed technique constructs the secret key at both sides using exchanged information. For 
ensuring the randomness in every session, certain parameters value get randomly change in every 
session like seed value for generating random inputs and weights, number of iteration to train the 
map, different mathematical functions (Radial basis, Gaussian, Mexican Hat) for choosing the 
random points from the KSOFM. 
DOI:10.5121/ijfcst.2014.4508 85
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.5, September 2014 
2.1 Synchronization Methodology 
In this section, a novel Kohonen Self-Organizing Feature Map (KSOFM) based synchronization 
of both sender and receiver machine has been presented. In this proposed technique input 
examples are used to build the map through vector quantization method along with unsupervised 
competitive learning for performing the synchronization. Proposed method uses unsupervised 
learning method to represent input space of the training samples in a discrete 2D maps. 
Neighborhood of each neuron (i.e. the connections of the neuron with adjacent neurons) in the 
map depends on the dimension of the map. 2D regular spacing in a hexagonal or rectangular grid 
uses to arrange the neurons. Following sub sections discussed about detailed methodology used in 
synchronization procedure. 
2.1.1 Initialization of weight vector 
In this proposed technique KSOFM comprises of neurons along with a weight vector for 
each neuron having a dimension same as the dimension of the input vectors. Consider the input 
vector  T 
86 
X  x1, x2 ,..., xn and weight vector  T 
W  w1,w2 ,..., wn .This scheme initially, assigns a 
weight vector to each neuron (point) by arbitrarily choosing a neuron (point) of the input space. 
The value of the weights vector is set to a tiny random numbers. 
2.1.2 Selection of point 
For initially assigning a weight vector to each neuron (point) an arbitrary neuron (point) ࢞ ∈ 
݅݊݌ݑݐ ݏ݌ܽܿ݁ ܺ get selected. 
2.1.3 Unsupervised Training of KSOFM 
The necessity of unsupervised learning mechanism in KSOFM is to produce similar response 
from different parts of the network for a certain input patterns. This proposed technique uses 
competitive learning in the training period to train the KSOFM. Euclidean distance between each 
neuron and an arbitrary neuron (point) ݔ get calculated by: 
   2  2  
2 2 
2 
Distancek  x1 wk1  x wk ... xn wkn 
Where, 
݇ = 1,2, . . . , ܲ 
ܲ is the neuron number 
ܹkj is the entry of ݆ of the weight of neuron ݇ 
The neuron (point) whose weight vector is most similar to the input is called the Best Matching 
Unit (BMU). The weights of the BMU and neurons (point) close to it in the KSOFM lattice are 
adjusted towards the input vector. The magnitude of the change decreases with time and with 
distance (within the lattice) from the BMU. This proposed technique uses 2D KSOFM with 100 
neurons. A learning rate  of 0.1 is used to train the KSOFM and decreasing the spread of the 
neighborhood function by the rule: 
 
  
 
1 _   0 
  
  
Iteration number 
_ _ _ 
Total no of iteration
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.5, September 2014 
Here, ߪ is initial spread. The value of ߪ decreases from the initial value to the final value (0) 
constantly. Hence the neighborhood function influences all neurons of the map in the first time 
and its influence on far neurons vanishes progressively. Near the end of the training only the 
winner neuron will be updated so as to drive neurons to gravity centers. 
2.1.4 Selection of Winner neuron 
The winner neuron is a neuron which has a minimum distance to ݔ (arbitrary point). Winner 
neuron gets selected based on the distance factor. The minimum distance Distancewinner fulfills 
the condition: 
87 
DistancewinnerDistancek 
ܹℎ݁ݎ݁ ݇ = 1,2, . . . , ܲ 
2.1.5 Updating of KSOFM 
An updating rule has been applied over the entire map keeping in mind the priority of the 
winner neuron and its closest neighbors. In this proposed technique updating is done using 
following formula 
   wk,new  wk,old .Neighborwinner,k . x  wk,old 
Where  is the learning step and ܰ݁݅݃ℎܾ݋ݎ(ݓ݅݊݊݁ݎ, ݇) is a neighborhood function with a 
bell shape centered at the winner neuron. It is a function of the distance between the winner 
neuron and the neuron k. 
winner k 
  2 
2 
Neighbor winner k e 
,  
 
 
 
2.1.6 Reiteration on KSOFM 
A new arbitrary point ݕ ∈ ݅݊݌ݑݐ ݏ݌ܽܿ݁ ܺ get selected and all the steps discussed in sub section 
3.1.3 to 3.1.5 get perform again. This process is repeated for each input vector for a (usually 
large) number of cycles ߣ. 
2.2 Synchronization parameters 
The spreading of the neighbourhood function (ߪ) is important since it controls the convergence of 
the map. It should be large at the beginning and shrink progressively to reach a small value in 
order to globally order the neurons over the whole map. The maximum value of 
ܰ݁݅݃ℎܾ݋ݎ(ݓ݅݊݊݁ݎ, ݓ݅݊݊݁ݎ) = 1 corresponds to the winner neuron and value of Neighbor 
function decreases when the distance between neurons ݇ and winner increases. Concerning the 
value of the learning rate , it should be small enough to ensure the convergence of the KSOFM. 
In this proposed synchronization technique the sender and receiver both uses the identical 
KSOFM architecture along with identical parameters in each session. Following are the list of 
parameters used in each session. 
 Dimension of the KSOFM (2D or 3D) 
 Number of neurons which specifies the number of different possible session keys 
 Dimension of the weight vector specify the length of the key 
 Seed value for generating random inputs and weights 
 Number of iteration to train the map
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.5, September 2014 
 Different mathematical functions as a mask for choosing the random points from the 
ܥܴܥ 
(ܥݕ݈ܿ݅ܿ 
ܴ݁݀ݑ݊݀ܽ݊ܿݕ 
ܥℎ݁ܿ݇݁ݎ) 
88 
KSOFM (Radial basis, Mexican Hat, Gaussian etc.) 
 Different index value for choosing different neurons (key) on the mathematical mask at 
each session for forming the session key 
Parameters that get negotiated at the initial stage of synchronization procedure between 
sender and receiver by mutual agreement are completely random. By changing each of the 
parameters randomly in each session security of proposed technique can be enhanced which 
in turns decrease the success rate of the attackers. 
In this proposed technique both A’s and B’s KSOFM are starts synchronization by exchanging 
some control frames for negotiation of parameters value. 
Synchronization (SYN) Frame: 
ܥ݋݉݉ܽ݊݀ 
ܥ݋݀݁ 
00 
ܻܵܰ_ܫܦ ܦܫܯ 
ܫ݊݀݁ݔ 
ܹ݁݅݃ℎݐ 
ܦܫܯ 
ܫ݊݀݁ݔ 
ܫݐ݁ݎܽݐ݅݋݊ 
ܫ݊݀݁ݔ 
ܯܽݏ݇ 
ܫ݊݀݁ݔ 
ܵ݁݁݀ 
ܫ݊݀݁ݔ 
ܰ݁ݑݎ݋݊ 
ܦܫܯ 
ܫ݊݀݁ݔ 
2 4 1 2 16 2 4 4 16 (bits ) 
Figure 3: Synchronization (SYN) Frame 
 Sender constructs a ܻܵܰ frame and transmitted to the receiver for handshaking purpose 
in connection establishment phase. ܻܵܰ usually comprises of 
ܥ݋݉݉ܽ݊݀ ܿ݋݀݁: Following table illustrate the different command code in respect to 
the different frame. 
Table 1 Command Code 
Command code Frame 
00 ܻܵܰ 
01 ܣܥܭ_ܻܵܰ 
10 ܰܣܭ_ܻܵܰ 
11 ܫ݊݀݁ݔ 
ܻܵܰ_ܫܦ: 4 bits ܻܵܰ_ܫܦ is used to identify different SYN frame in different session. 
ܦܫܯ ݅݊݀݁ݔ: 1 bit is used to specify the dimension of KSOFM. Following table illustrate 
the ܦܫܯ ݅݊݀݁ݔ corresponds to the dimension. 
Table 2 Command Code 
DIM Index KSOFM Dimension 
0 2D 
1 3D 
ܫݐ݁ݎܽݐ݅݋݊ ݅݊݀݁ݔ: 16 bits are used to illustrate the ܫݐ݁ݎܽݐ݅݋݊ ݅݊݀݁ݔ. Following table 
shows the ܹ݁݅݃ℎݐ ܦܫܯ ݅݊݀݁ݔ corresponds to the number of weights. 
ܹ݁݅݃ℎݐ ܦܫܯ ݅݊݀݁ݔ: 2 bits are used to illustrate the ܹ݁݅݃ℎݐ ܦܫܯ ݅݊݀݁ݔ.
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.5, September 2014 
89 
Table 3 Command Code 
Weight DIM Index Number of weights 
00 64 
01 128 
10 192 
11 256 
ܯܽݏ݇ ܫ݊݀݁ݔ: 2 bits are used to illustrate the ܯܽݏ݇ ܫ݊݀݁ݔ. Following table illustrate 
the different ܯܽݏ݇ ܫ݊݀݁ݔ value corresponds to the different mathematical mask 
function. 
Table 4 Command Code 
Mask Index Mathematical Mask Function 
00 Mexican Hat 
01 Gaussian 
10 Radial Basis 
11 Reserved 
ܵ݁݁݀ ݅݊݀݁ݔ: 4 bits are used to illustrate the ܵ݁݁݀ ݅݊݀݁ݔ. 
ܰ݁ݑݎ݋݊ ܦܫܯ ݅݊݀݁ݔ: 4 bits are used to illustrate the ܰ݁ݑݎ݋݊ ܦܫܯ ݅݊݀݁ݔ which is 
the total number of neurons 
ܥܴܥ (ܥݕ݈ܿ݅ܿ ܴ݁݀ݑ݊݀ܽ݊ܿݕ ܥℎ݁ܿ݇݁ݎ): 16 bits are used in CRC. 
 When the receiver receives the frame ܻܵܰ, the receiver should carry out integrity test. 
 Receiver performs Integrity test after receiving the ܻܵܰ frame. If the messages are 
received as sent (with no replication, incorporation, alteration, reordering, or replay) the 
receiver will execute the synchronization phase. 
Acknowledgement of Synchronization (ACK_SYN) Frame: 
ܥ݋݉݉ܽ݊݀ ܥ݋݀݁ 
0010 ܻܵܰ_ܫܦ ܥܴܥ 
(ܥݕ݈ܿ݅ܿ ܴ݁݀ݑ݊݀ܽ݊ܿݕ ܥℎ݁ܿ݇݁ݎ) 
4 8 16 (bits) 
Figure 4: Acknowledgement of Synchronization (ܣܥܭ_ܻܵܰ) Frame 
ܣܥܭ_ܻܵܰ frame send by the receiver to the sender for positive acknowledgement of the 
parameters value. 
Negative Acknowledgement of Synchronization (NAK_SYN) Frame: 
ܥ݋݉݉ܽ݊݀ ܥ݋݀݁ 
0011 ܻܵܰ_ܫܦ ܥܴܥ 
(ܥݕ݈ܿ݅ܿ ܴ݁݀ݑ݊݀ܽ݊ܿݕ ܥℎ݁ܿ݇݁ݎ) 
4 8 16 (bits) 
Figure 5: Negative Acknowledgement of Synchronization (ܰܣܭ_ܻܵܰ) Frame
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.5, September 2014 
ܰܣܭ_ܻܵܰ frame send by the receiver to the sender for negative acknowledgement of the 
parameters value. 
Finish Synchronization (FIN_SYN) Frame: 
90 
ܥ݋݉݉ܽ݊݀ ܥ݋݀݁ 
0001 ܻܵܰ_ܫܦ ܥܴܥ 
(ܥݕ݈ܿ݅ܿ ܴ݁݀ݑ݊݀ܽ݊ܿݕ ܥℎ݁ܿ݇݁ݎ) 
4 8 16 (bits) 
Figure 6: Finish Synchronization (ܨܫܰ_ܻܵܰ) Frame 
Finally, the receiver should send the frame ܨܫܰ_ܻܵܰ to alert the sender. 
2.3 Synchronization Algorithm 
Input : Assign a weight vector to each neuron by arbitrarily choosing a point of the 
input space 
Output : Synchronized KSOFM 
Method : The process operates on sender’s and receiver’s Kohonen's Self- 
Organizing Feature Map (KSOFM) and generate synchronized session 
key. 
Step 1. Randomize the map's nodes' weight vectors 
Step 2. Select an arbitrary input vector 
Step 3. Traverse each node in the map 
Step 3.1 Use the Euclidean distance formula to find the 
similarity between the input vector and the map's 
node's weight vector 
Step 3.2 Track the node that produces the smallest distance 
(this node is the best matching unit, BMU) 
Step 4. Update the nodes in the neighborhood of the BMU (including the 
BMU itself) by pulling them closer to the input vector 
Step 5. Increase s and repeat from step 2 
After a mutually predetermined iteration steps both sender and receiver stop their iteration. Now, 
both sender and receiver have the identical final KSOFM because they have started with same 
initial configuration and proceeds with same mutually agreement parameters. In this situation the 
sender uses mathematical function as a mask to form the session key. The receiver would use the 
same mutually pre agreed mathematical function as a mask in the map for reconstruct the session 
key. Use of mathematical mask increases the security of the scheme because instead of one single 
neuron, key can be constructed using several neurons on the mask. Also changing the mask 
parameters several key can be generated. From this discussion it can be concluded that initially 
mask method get slightly more amount of time but once the mask get set it takes less amount of 
time. An adversary could not find the key because they do not have the map, mathematical 
function for masking and other mutually pre agreed parameters. Mask method associate several 
neurons around the designated neuron to form the key. This provides a significant improvement 
to the security of the generation of session key. A mask hides all neurons other than the winner. 
In this proposed scheme different mask functions like Gauss, Radial basis, Mexican hat functions 
are get used randomly in different session. The winner neuron fixes the centre of the mask and
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.5, September 2014 
each neuron around the winner will be weighted and summed to the winner. The result is a 
different key depending on the shape of the mask. The relation of the key is obtained by: 
91 
,  , 
Key u q w ij q . f winner i , 
j 
i , 
j 
ݍ = 1,2,…, ܰ 
Where, 
f winner i, j  is the mask centred at the winner neuron, 
wij,q , is the component ݍ of the vector associated to neuron (݅ , ݆) and 
Keyu,q , is the component ݍ of the ultimate (final) key. 
A general form of the mask is represented by the the following equation: 
k w k w 
  2 
2 
2 
2 
1 
2 
. 
  
fwinner x a e be 
 
 
 
 
  
with ܽ, ܾ, ߪ1 , ߪ2 ߳ ܴ , ݔ a neuron in the KSOFM, ݓ݅݊݊݁ݎ is the winner neuron. A huge number of 
masks could be generated by changing parameters ܽ, ܾ, ߪ1 , ߪ2. Using the mask incontestably 
enhances the security of the key. In wireless communication, instead of starting from the initial 
state of the KSOFM key generation procedure a user may use the same trained KSOFM in 
different session with different users by changing only the parameters value of the mask or mask 
function used to determine the ultimate key. This procedure helps to save the resources of 
wireless communication very efficiently. 
3. SECURITY ANALYSIS 
In this paper a KSOFM synchronized cryptographic technique has been proposed. The technique 
generates the synchronized session key by tuning KSOFM of both sender and receiverThe 
Following attacks are considered to ensure the robustness of the proposed technique. 
Cipher text only Attack: In this type of attack, the attacker has access to a set of cipher text. In 
cipher text only attack, encryption algorithm and cipher text is known to an attacker. An attacker 
tries to break the algorithm or in simple words tries to deduce the decryption key or plaintext by 
observing the cipher text. This proposed technique nullifies the success rate of this attack by 
producing a robust KSOFM encrypted cipher text. The strength of resisting exhaustive key search 
attack relies on a large key space. So, cipher text produces by this proposed methodology is 
mathematically difficult to break. Thus a hacker has to try all such key streams to find an 
appropriate one. Key stream have high degrees of correlation immunity. Thus it is practically 
difficult to perform a brute-force search in a key-space. 
Known Plaintext Attack: The attacker has access to one or more cipher text and some characters 
in the original data. The objective is to find the secret key. Proposed technique offers better 
floating frequency of characters. So, known plain text attack is very difficult in this proposed 
technique.
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.5, September 2014 
Chosen Plaintext Attack: Here, the attacker has liberty to choose a plaintext of his/her choice and 
get the corresponding cipher text. Since the attacker can choose plaintext of his/her choice, this 
attack is more powerful. Again the objective of this attack is to find the secret key. This attack is 
impractical because there is no obvious relationship between the individual bits of the sequence in 
plain text and cipher text. So, it is not possible to choose a plaintext of his/her choice and get the 
corresponding cipher text. 
Chosen Cipher text Only Attack: The attacker can choose cipher text and get the corresponding 
plaintext. By selecting some cipher text a cryptanalyst has access to corresponding decrypted 
plaintext. Chosen cipher text only attack is more applicable to public key cryptosystems. This 
technique has a good Chi-Square value this confirms good degree of non-homogeneity. So, it will 
be difficult to regenerate plain text from the cipher text. 
Brute Force Attack: A cryptanalyst tries all possible keys in finite key space one by one and 
check the corresponding plaintext, if meaningful. The basic objective of a brute force attack is to 
try all possible combinations of the secret key to recover the plaintext image and or the secret 
key. On an average, half of all possible keys must be tried to achieve success but brute force 
attack involves large computation and has a very high complexity. Due to high complexity brute 
force attack will not be feasible. Proposed technique has a good entropy value near to equal 8 
which indicates that brute force attack is very difficult in this proposed technique. 
4. RESULTS 
A total of 15 statistical tests of The NIST Test Suite have been performed to evaluate randomness 
of the KSOFM synchronized session key proposed in this paper. These tests focus on a variety of 
different types of non-randomness that could exist in a sequence. Some tests are decomposable 
into a variety of subtests. The 15 tests are following: 
92 
Table 5 Statistical Results 
Statistical Test Expected 
Proportion 
Observed 
Proportion 
Status for 
Proportion 
of passing 
P-value of 
P-values 
Status for 
Uniform/ 
Non-uniform 
distribution 
Frequency 
(Monobits) Test 0.972766 0.976329 Success 2.835246e-03 Non-uniform 
Test for 
Frequency 
within a 
Block 
0.972766 0.972818 Success 3.407162e-04 Non-uniform 
Runs Test 0.972766 0.975746 Success 0.321683e-01 Uniform 
Longest Run of 
Ones in a Block 0.972766 0.97051 Unsuccess 1.491737e+02 Uniform 
Binary Matrix 
Rank Test 0.972766 0.990000 Success 7.491904e-02 Uniform 
Discrete 
Fourier 
Transform Test 
0.972766 0.968329 Unsuccess 0.000000e+00 Non-uniform 
Non-overlapping 
0.972766 0.988891 Success 0.000000e+00 Non-uniform
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.5, September 2014 
93 
(Aperiodic) 
Template 
Matching Test 
Overlapping 
(Periodic) 
Template 
Matching Test 
0.972766 0.980201 Success 7.259823e-02 Non-uniform 
Maurer’s 
“Universal 
Statistical” Test 
0.972766 1.000000 Success 7.830128e-01 Uniform 
Linear 
Complexity 
Test 
0.972766 0.975318 Success 2.945727e-01 Uniform 
Serial Test 0.977814 0.973903 Unsuccess 0.000000e+00 Non-uniform 
Approximate 
Entropy Test 0.972766 0.985830 Success 2.837463e-02 Uniform 
Cumulative 
Sums Test 0.977814 0.971289 Unsuccess 0.000000e+00 Non-uniform 
Random 
Excursions Test 0.983907 0.942500 Unsuccess 0.000000e+00 Non-uniform 
Random 
Excursions 
Variant Test 
0.985938 0.972963 Unsuccess 0.000000e+00 Non-uniform 
Table:6 Comparisons of 128 bit key length vs. average synchronization time (in cycle) 
Key Length (128 bits) Average Synchronization time (in cycle) 
KSOFM 2516,41 
TPM (L=25) 2624,27 
PPM 2811,04 
Table shows KSOFM technique needs 2516,41 cycles in average to generate session key having a 
length of 128 bit. Whereas existing TPM (L=25) and PPM needs 2624,27 and 2811,04 cycles 
respectively, which larger than all the proposed techniques. KSOFM outperforms over existing 
TPM and PPM. This is quite affordable in terms of resources available in wireless 
communication. 
Table:7 Comparisons of 128 bit key length vs. average synchronization time (in cycle) for group 
synchronization (Group size=4) 
Key Length (128 bits) 
No. of Parties 
participating in the 
Group Synchronization 
Average 
Synchronization 
time (in cycle) 
KSOFM 4 15098,46 
TPM (L=25) 4 15745,62 
PPM 4 16866,24
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.5, September 2014 
94 
17000 
16500 
16000 
15500 
15000 
14500 
Average Synchronization time (in Cycle) 
Figure 16: Comparisons of 128 bit key length vs. average synchronization time (in cycle) for group 
synchronization (Group size=4) 
Table and figure shows KSOFM, TPM, PPM technique needs (15098,46), (15745,62), 
(16866,24) cycles respectively in average to generate session key having a length of 128 bit for 
synchronize group of 4 parties . This clearly indicates that proposed technique outperforms than 
all other existing techniques at the time of group synchronization. 
Table:8 Comparisons of 192 bit key length vs. average synchronization time (in cycle) 
Key Length (192 bits) Average Synchronization time (in Cycle) 
KSOFM 3173,41 
TPM (L=25) 3347,15 
PPM 3571,48 
Table and figure shows KSOFM technique needs 3173,41 cycles in average to generate session 
key having a length of 128 bit. Whereas existing TPM (L=25) and PPM needs 3347,15 and 
3571,48 cycles respectively, which larger than the proposed techniques. KSOFM outperforms 
over existing TPM and PPM. This is quite affordable in terms of resources available in wireless 
communication. 
Table: 9 Comparisons of 192 bit key length vs. average synchronization time (in cycle) for group 
synchronization (Group size=4) 
Key Length (192 bits) 
No. of Parties 
participating in the 
Group Synchronization 
Average 
Synchronization 
time (in Cycle) 
KSOFM 4 19040,46 
TPM (L=25) 4 20082,90 
PPM 4 21428,88 
14000 
KSOFM TPM (L=25) PPM 
Average Synchronization time 
(in Cycle)
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.5, September 2014 
95 
22000 
21000 
20000 
19000 
18000 
Average Synchronization time (in Cycle) 
Figure 17: Comparisons of 192 bit key length vs. average synchronization time (in cycle) for group 
synchronization (Group size=4) 
Table shows KSOFM technique needs 19040,46 cycles in average to generate session key having 
a length of 192 bit for synchronize group of 4 parties This clearly indicates that proposed 
technique outperforms than all other proposed and existing techniques at the time of group 
synchronization. 
Table: 10 Comparisons of 256 bit key length vs. average synchronization time (in cycle) 
Key Length (256 bits) Average Synchronization time (in Cycle) 
KSOFM 4719,72 
TPM (L=25) 4851,86 
PPM 5193,03 
Table and figure shows KSOFM technique needs 4719,72 cycles in average to generate session 
key having a length of 128 bit. Whereas existing TPM (L=25) and PPM needs 4851,86 and 
5193,03 cycles respectively, which larger than the proposed techniques. This is quite affordable 
in terms of resources available in wireless communication. 
Table: 11 Comparisons of 256 bit key length vs. average synchronization time (in cycle) for group 
synchronization (Group size=4) 
Key Length (256 bits) 
No. of Parties 
participating in the 
Group 
Synchronization 
Average 
Synchronization 
time (in Cycle) 
KSOFM 4 28318,32 
TPM (L=25) 4 29111,16 
PPM 4 31158,18 
17000 
KSOFM TPM (L=25) PPM 
Average Synchronization 
time (in Cycle)
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.5, September 2014 
96 
32000 
31000 
30000 
29000 
28000 
27000 
Average Synchronization time (in Cycle) 
Figure 18: Comparisons of 256 bit key length vs. average synchronization time (in cycle) for group 
synchronization (Group size=4) 
Table shows KSOFM technique needs 28318,32 cycles respectively in average to generate 
session key having a length of 192 bit for synchronize group of 4 parties . This clearly indicates 
that proposed technique outperforms than all other proposed and existing techniques at the time 
of group synchronization. 
Average Number of Cycles 
Figure 19: Key length vs. average number of iterations 
5000 
4000 
3000 
2000 
1000 
From figure it has been observed that if the length of the session key get increased then the 
increased of average synchronization steps is linear. 
Relative Time Spent in GC (%) 
Figure 20: Comparisons of relative time spent in GC to generate 128 bit session key 
26000 
KSOFM TPM (L=25) PPM 
Average Synchronization 
time (in Cycle) 
0 
128 bit Key Length 192 bit Key Length 256 bit Key Length 
Average Number of Cycles 
2.63 
2.62 
2.61 
2.6 
2.59 
2.58 
2.57 
KSOFM TPM PPM 
Relative Time Spent in GC 
(%)
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.5, September 2014 
From the above table and figure it has been shown that increasing order sequence of relative time 
spent in GC in group synchronization phase is KSOFM, TPM and PPM. 
97 
No. of Threads 
Figure 21: Comparisons of number of Threads required generating 128 bit session key 
22 
21 
20 
19 
18 
17 
From the above table and figure it has been shown that increasing order sequence of number of 
thread required in group synchronization phase is KSOFM, TPM and PPM. 
Figure 22: KSOFM dimension vs. average number of iterations 
6000 
5000 
4000 
3000 
2000 
1000 
Figure shows the average number of iterations to be needed for generating 128, 192 and 256 bit 
session key in 2D and 3D KSOFM. The above figure depicts that 3D KSOFM takes more 
iterations to train the map in compared to 2D KSOFM. So, the energy consumption is more in 3D 
KSOFM than 2D. For this reason 2D KSOFM is the best alternative in wireless communication 
where resource constrains (in terms of energy, memory) is a vital issues for generation of session 
key. 
(a) (b) 
(c) (d) 
16 
KSOFM TPM PPM 
No. of Threads 
0 
128 bit Key 
Length 
192 bit Key 
Length 
256 bit Key 
Length 
Average Number of Iterations 
in 2D KSOFM 
Average Number of Iterations 
in 3D KSOFM
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.5, September 2014 
98 
(e) (f) 
(g) (h) 
(i) 
Figure 23: (a), (b), (c) shows the frequency distribution of plain text, TPM based encrypted text, proposed 
chaos KSOFM based encrypted text, figure: (d), (e), (f) shows the floating frequency of plain text, TPM 
based encrypted text, proposed chaos KSOFM based encrypted text, figure: (g), (h), (i) shows the 
autocorrelation of plain text, TPM based encrypted text, proposed chaos KSOFM based encrypted text 
5. CONCLUSION 
Proposed technique is very simple and easy to implement in various high level language. 
The test results also show that the performance and security provided by the proposed technique 
is good and comparable to standard technique. The security provided by the proposed technique is 
comparable with other techniques. To enhance the security of the technique, proposed technique 
offers changes of some parameters randomly in each session. To generate the secret session key 
index mask get exchanged between sender and receiver. This technique has a unique ability to 
construct the secret key at both sides using this exchanged information. Since the encryption and 
decryption times are much lower, so processing speed is very high. Proposed method takes 
minimum amount of resources which is greatly handle the resource constraints criteria of wireless 
communication. This method generates a large number of keys which is the same number of 
neurons in the map. For ensuring the randomness in every session, some of the parameters get 
change randomly at each session. proposed methods outperform than existing TPM, PPM and 
does not suffers from Brute Force or Man-In-The-Middle (MITM) attack. No platform specific 
optimizations were done in the actual implementation, thus performance should be similar over 
varied implementation platform. The whole procedure is randomized, thus resulting in a unique 
process for a unique session, which makes it harder for a cryptanalyst to find a base to start with. 
This technique is applicable to ensure security in message transmission in any form and in any 
size in wireless communication.
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.5, September 2014 
99 
Some of the salient features of proposed technique can be summarized as follows: 
a) Session key generation and exchange – Identical session key can be generate after the 
tuning of KSOFM in both sender and receiver side. So, no need to transfer the whole 
session key via vulnerable public channel. 
b) Degree of security – Proposed technique does not suffers from cipher text only Attack, 
known plaintext attack, chosen plaintext attack, Chosen cipher text only attack, brute 
force attack. 
c) Variable size key –128/192/256 bit session key with high key space can be used in 
different session. Since the session key is used only once for each transmission, so there 
is a minimum time stamp which expires automatically at the end of each transmission of 
information. Thus the cryptanalyst will not be able guess the session key for that 
particular session. 
d) Complexity – Proposed technique has the flexibility to adopt the complexity based on 
infrastructure, resource and energy available for computing in a node or mesh through 
wireless communication. So, the proposed technique is very much suitable in wireless 
communication. 
e) Key sensitivity – Proposed method generates an entirely different cipher stream with a 
small change in the key and technique totally fails to decrypt the cipher stream with a 
slightly different secret session key. 
f) Trade-off between security and performance – The proposed technique may be ideal for 
trade-off between security and performance of light weight devices having very low 
processing capabilities or limited computing power in wireless communication. 
In future, some other soft computing based approach can be used to generate the session key. 
ACKNOWLEDGEMENT 
The author expresses deep sense of gratitude to the DST, Govt. of India, for financial assistance 
through INSPIRE Fellowship leading for a PhD work under which this work has been carried out. 
REFERENCES 
[1] Atul Kahate, Cryptography and Network Security, 2003, Tata McGraw-Hill publishing Company 
Limited, Eighth reprint 2006. 
[2] R. Mislovaty, Y. Perchenok, I. Kanter, and W. Kinzel. Secure key-exchange protocol with an 
absence of injective functions. Phys. Rev. E, 66:066102, 2002. 
[3] A. Ruttor, W. Kinzel, R. Naeh, and I. Kanter. Genetic attack on neural cryptography. Phys. Rev. 
E, 73(3):036121, 2006. 
[4] Wolfgang Kinzel and ldo Kanter, "Neural cryptography" proceedings of the 9th international 
conference on Neural Information processing(ICONIP 03). 
[5] Charles Pfleeger, Shari Lawrence Pfleeger, Security in computing, Third Edition 2003, pp 48, 
Prentice Hall of India Pvt Ltd, New Delhi. 
[6] Biham, E. and Seberry, J.”Py (Roo): A Fast and Secure Stream Cipher”. EUROCRYPT'05 Rump 
Session, at the Symmetric Key Encryption Workshop (SKEW 2005), 26-27 May 2005. 
[7] Chung-Ping Wu, C.C. Jay Kuo, “Design of Integrated Multimedia Compression and Encryption 
Systems”, IEEE Transactions on Multimedia, Volume 7, Issue 5, Oct. 2005 Page(s): 828 – 839. 
[8] HongGeun Kim, JungKyu Han and Seongje Cho.”An efficient implementation of RC4 cipher for 
encrypting multimedia files on mobile devices”. SAC '07 Proceedings of the ACM symposium on 
Applied computing, 2007, pp 1171--1175, NewYork, USA.
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.5, September 2014 
[9] Mantin and A. Shamir, “Weaknesses in the key scheduling algorithm of RC4”, Lecture Notes in 
Computer Science, Vol. 2259, Revised Papers from the 8th Annual International Workshop on 
Selected Areas in Cryptography, pp: 1 - 24, 2007. 
[10] Sarkar Arindam, Mandal J. K., “Artificial Neural Network Guided Secured Communication 
Techniques: A Practical Approach”, Paperback: 128 pages, Publisher: LAP LAMBERT Academic 
Publishing (June 4, 2012), Language: English, ISBN-10: 3659119911, ISBN-13: 978- 
3659119910. 
100 
Authors 
Arindam Sarkar 
INSPIRE FELLOW (DST, Govt. of India), MCA (VISVA BHARATI, Santiniketan, 
University First Class First Rank Holder), M.Tech (CSE, K.U, University First Class 
First Rank Holder). 
Jyotsna Kumar Mandal 
M. Tech.(Computer Science, University of Calcutta), Ph.D.(Engg., Jadavpur University) 
in the field of Data Compression and Error Correction Techniques, Professor in 
Computer Science and Engineering, University of Kalyani, India. Life Member of 
Computer Society of India since 1992 and life member of cryptology Research Society of 
India. Dean Faculty of Engineering, Technology & Management, working in the field of 
Network Security, Steganography, Remote Sensing & GIS Application, Image 
Processing. 25 years of teaching and research experiences. Eight Scholars awarded Ph.D. 
and 8 are pursuing.

More Related Content

What's hot

NIPS2007: deep belief nets
NIPS2007: deep belief netsNIPS2007: deep belief nets
NIPS2007: deep belief nets
zukun
 
The Back Propagation Learning Algorithm
The Back Propagation Learning AlgorithmThe Back Propagation Learning Algorithm
The Back Propagation Learning Algorithm
ESCOM
 
nural network ER. Abhishek k. upadhyay
nural network ER. Abhishek  k. upadhyaynural network ER. Abhishek  k. upadhyay
nural network ER. Abhishek k. upadhyay
abhishek upadhyay
 
DBSCAN (2014_11_25 06_21_12 UTC)
DBSCAN (2014_11_25 06_21_12 UTC)DBSCAN (2014_11_25 06_21_12 UTC)
DBSCAN (2014_11_25 06_21_12 UTC)
Cory Cook
 
PR-284: End-to-End Object Detection with Transformers(DETR)
PR-284: End-to-End Object Detection with Transformers(DETR)PR-284: End-to-End Object Detection with Transformers(DETR)
PR-284: End-to-End Object Detection with Transformers(DETR)
Jinwon Lee
 

What's hot (19)

Lec 6-bp
Lec 6-bpLec 6-bp
Lec 6-bp
 
Multilayer & Back propagation algorithm
Multilayer & Back propagation algorithmMultilayer & Back propagation algorithm
Multilayer & Back propagation algorithm
 
NIPS2007: deep belief nets
NIPS2007: deep belief netsNIPS2007: deep belief nets
NIPS2007: deep belief nets
 
neural networksNnf
neural networksNnfneural networksNnf
neural networksNnf
 
A Threshold Enhancement Technique for Chaotic On-Off Keying Scheme
A Threshold Enhancement Technique for Chaotic On-Off Keying SchemeA Threshold Enhancement Technique for Chaotic On-Off Keying Scheme
A Threshold Enhancement Technique for Chaotic On-Off Keying Scheme
 
Classification by back propagation, multi layered feed forward neural network...
Classification by back propagation, multi layered feed forward neural network...Classification by back propagation, multi layered feed forward neural network...
Classification by back propagation, multi layered feed forward neural network...
 
A comparison of efficient algorithms for scheduling parallel data redistribution
A comparison of efficient algorithms for scheduling parallel data redistributionA comparison of efficient algorithms for scheduling parallel data redistribution
A comparison of efficient algorithms for scheduling parallel data redistribution
 
The Back Propagation Learning Algorithm
The Back Propagation Learning AlgorithmThe Back Propagation Learning Algorithm
The Back Propagation Learning Algorithm
 
DNN and RBM
DNN and RBMDNN and RBM
DNN and RBM
 
Trackster Pruning at the CMS High-Granularity Calorimeter
Trackster Pruning at the CMS High-Granularity CalorimeterTrackster Pruning at the CMS High-Granularity Calorimeter
Trackster Pruning at the CMS High-Granularity Calorimeter
 
2021 03-01-on the relationship between self-attention and convolutional layers
2021 03-01-on the relationship between self-attention and convolutional layers2021 03-01-on the relationship between self-attention and convolutional layers
2021 03-01-on the relationship between self-attention and convolutional layers
 
nural network ER. Abhishek k. upadhyay
nural network ER. Abhishek  k. upadhyaynural network ER. Abhishek  k. upadhyay
nural network ER. Abhishek k. upadhyay
 
2.5 backpropagation
2.5 backpropagation2.5 backpropagation
2.5 backpropagation
 
DBSCAN (2014_11_25 06_21_12 UTC)
DBSCAN (2014_11_25 06_21_12 UTC)DBSCAN (2014_11_25 06_21_12 UTC)
DBSCAN (2014_11_25 06_21_12 UTC)
 
deep CNN vs conventional ML
deep CNN vs conventional MLdeep CNN vs conventional ML
deep CNN vs conventional ML
 
Mincut_Placement_Final_Report
Mincut_Placement_Final_ReportMincut_Placement_Final_Report
Mincut_Placement_Final_Report
 
PR-284: End-to-End Object Detection with Transformers(DETR)
PR-284: End-to-End Object Detection with Transformers(DETR)PR-284: End-to-End Object Detection with Transformers(DETR)
PR-284: End-to-End Object Detection with Transformers(DETR)
 
QUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATES
QUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATESQUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATES
QUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATES
 
Deep learning and its application
Deep learning and its applicationDeep learning and its application
Deep learning and its application
 

Viewers also liked

PROBABILISTIC DIFFUSION IN RANDOM NETWORK G...
                                  PROBABILISTIC DIFFUSION IN RANDOM NETWORK G...                                  PROBABILISTIC DIFFUSION IN RANDOM NETWORK G...
PROBABILISTIC DIFFUSION IN RANDOM NETWORK G...
ijfcstjournal
 
QOE MODEL FOR MULTIMEDIA CONTENT DELIVERY FROM MCLOUD TO MOBILE DEVICES
QOE MODEL FOR MULTIMEDIA CONTENT DELIVERY FROM MCLOUD TO MOBILE DEVICESQOE MODEL FOR MULTIMEDIA CONTENT DELIVERY FROM MCLOUD TO MOBILE DEVICES
QOE MODEL FOR MULTIMEDIA CONTENT DELIVERY FROM MCLOUD TO MOBILE DEVICES
ijfcstjournal
 
A Modified Dna Computing Approach To Tackle The Exponential Solution Space Of...
A Modified Dna Computing Approach To Tackle The Exponential Solution Space Of...A Modified Dna Computing Approach To Tackle The Exponential Solution Space Of...
A Modified Dna Computing Approach To Tackle The Exponential Solution Space Of...
ijfcstjournal
 
Implementation of energy efficient coverage aware routing protocol for wirele...
Implementation of energy efficient coverage aware routing protocol for wirele...Implementation of energy efficient coverage aware routing protocol for wirele...
Implementation of energy efficient coverage aware routing protocol for wirele...
ijfcstjournal
 

Viewers also liked (20)

Green computing in developed and
Green computing in developed andGreen computing in developed and
Green computing in developed and
 
PROBABILISTIC DIFFUSION IN RANDOM NETWORK G...
                                  PROBABILISTIC DIFFUSION IN RANDOM NETWORK G...                                  PROBABILISTIC DIFFUSION IN RANDOM NETWORK G...
PROBABILISTIC DIFFUSION IN RANDOM NETWORK G...
 
A New Mechanism for Service Recovery Technology by using Recovering Service’s...
A New Mechanism for Service Recovery Technology by using Recovering Service’s...A New Mechanism for Service Recovery Technology by using Recovering Service’s...
A New Mechanism for Service Recovery Technology by using Recovering Service’s...
 
Dna data compression algorithms based on redundancy
Dna data compression algorithms based on redundancyDna data compression algorithms based on redundancy
Dna data compression algorithms based on redundancy
 
DEVNAGARI NUMERALS CLASSIFICATION AND RECOGNITION USING AN INTEGRATED APPROACH
DEVNAGARI NUMERALS CLASSIFICATION AND RECOGNITION USING AN INTEGRATED APPROACHDEVNAGARI NUMERALS CLASSIFICATION AND RECOGNITION USING AN INTEGRATED APPROACH
DEVNAGARI NUMERALS CLASSIFICATION AND RECOGNITION USING AN INTEGRATED APPROACH
 
Analysis of quality of service in cloud storage systems
Analysis of quality of service in cloud storage systemsAnalysis of quality of service in cloud storage systems
Analysis of quality of service in cloud storage systems
 
Pronominal anaphora resolution in
Pronominal anaphora resolution inPronominal anaphora resolution in
Pronominal anaphora resolution in
 
SECURE FILE MANAGEMENT SYSTEM FOR JAVA CARDS
SECURE FILE MANAGEMENT SYSTEM FOR JAVA CARDSSECURE FILE MANAGEMENT SYSTEM FOR JAVA CARDS
SECURE FILE MANAGEMENT SYSTEM FOR JAVA CARDS
 
A hybrid approach of stretching and filtering for enhancing underwater gray s...
A hybrid approach of stretching and filtering for enhancing underwater gray s...A hybrid approach of stretching and filtering for enhancing underwater gray s...
A hybrid approach of stretching and filtering for enhancing underwater gray s...
 
Improving data transmission in the vanet using multi criteria decision making...
Improving data transmission in the vanet using multi criteria decision making...Improving data transmission in the vanet using multi criteria decision making...
Improving data transmission in the vanet using multi criteria decision making...
 
Bin packing problem two approximation
Bin packing problem two approximationBin packing problem two approximation
Bin packing problem two approximation
 
Delivering IT as A Utility- A Systematic Review
Delivering IT as A Utility- A Systematic ReviewDelivering IT as A Utility- A Systematic Review
Delivering IT as A Utility- A Systematic Review
 
QOE MODEL FOR MULTIMEDIA CONTENT DELIVERY FROM MCLOUD TO MOBILE DEVICES
QOE MODEL FOR MULTIMEDIA CONTENT DELIVERY FROM MCLOUD TO MOBILE DEVICESQOE MODEL FOR MULTIMEDIA CONTENT DELIVERY FROM MCLOUD TO MOBILE DEVICES
QOE MODEL FOR MULTIMEDIA CONTENT DELIVERY FROM MCLOUD TO MOBILE DEVICES
 
A Modified Dna Computing Approach To Tackle The Exponential Solution Space Of...
A Modified Dna Computing Approach To Tackle The Exponential Solution Space Of...A Modified Dna Computing Approach To Tackle The Exponential Solution Space Of...
A Modified Dna Computing Approach To Tackle The Exponential Solution Space Of...
 
Implementation of energy efficient coverage aware routing protocol for wirele...
Implementation of energy efficient coverage aware routing protocol for wirele...Implementation of energy efficient coverage aware routing protocol for wirele...
Implementation of energy efficient coverage aware routing protocol for wirele...
 
An optimized hybrid approach for path
An optimized hybrid approach for pathAn optimized hybrid approach for path
An optimized hybrid approach for path
 
Mining of product reviews at aspect level
Mining of product reviews at aspect levelMining of product reviews at aspect level
Mining of product reviews at aspect level
 
A hybrid fuzzy ann approach for software effort estimation
A hybrid fuzzy ann approach for software effort estimationA hybrid fuzzy ann approach for software effort estimation
A hybrid fuzzy ann approach for software effort estimation
 
Eagro crop marketing for farming
Eagro crop marketing for farmingEagro crop marketing for farming
Eagro crop marketing for farming
 
An interactive approach to requirements prioritization using quality factors
An interactive approach to requirements prioritization using quality factorsAn interactive approach to requirements prioritization using quality factors
An interactive approach to requirements prioritization using quality factors
 

Similar to Soft computing based cryptographic technique using kohonen's selforganizing map synchronization for wireless communication (ksomsct)

Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
pijans
 
Secured transmission through multi layer perceptron in wireless communication...
Secured transmission through multi layer perceptron in wireless communication...Secured transmission through multi layer perceptron in wireless communication...
Secured transmission through multi layer perceptron in wireless communication...
ijmnct
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Fixed-Point Code Synthesis for Neural Networks
Fixed-Point Code Synthesis for Neural NetworksFixed-Point Code Synthesis for Neural Networks
Fixed-Point Code Synthesis for Neural Networks
gerogepatton
 
Report AdvancedCodingFinal - Pietro Santoro
Report AdvancedCodingFinal - Pietro SantoroReport AdvancedCodingFinal - Pietro Santoro
Report AdvancedCodingFinal - Pietro Santoro
Pietro Santoro
 
ssnow_manuscript_postreview
ssnow_manuscript_postreviewssnow_manuscript_postreview
ssnow_manuscript_postreview
Stephen Snow
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 

Similar to Soft computing based cryptographic technique using kohonen's selforganizing map synchronization for wireless communication (ksomsct) (20)

Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
 
Secured transmission through multi layer perceptron in wireless communication...
Secured transmission through multi layer perceptron in wireless communication...Secured transmission through multi layer perceptron in wireless communication...
Secured transmission through multi layer perceptron in wireless communication...
 
Intelligent soft computing based
Intelligent soft computing basedIntelligent soft computing based
Intelligent soft computing based
 
Improving The Performance of Viterbi Decoder using Window System
Improving The Performance of Viterbi Decoder using Window System Improving The Performance of Viterbi Decoder using Window System
Improving The Performance of Viterbi Decoder using Window System
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Neuro genetic key based recursive modulo 2 substitution using mutated charact...
Neuro genetic key based recursive modulo 2 substitution using mutated charact...Neuro genetic key based recursive modulo 2 substitution using mutated charact...
Neuro genetic key based recursive modulo 2 substitution using mutated charact...
 
Erca energy efficient routing and reclustering
Erca energy efficient routing and reclusteringErca energy efficient routing and reclustering
Erca energy efficient routing and reclustering
 
Biomedical Signals Classification With Transformer Based Model.pptx
Biomedical Signals Classification With Transformer Based Model.pptxBiomedical Signals Classification With Transformer Based Model.pptx
Biomedical Signals Classification With Transformer Based Model.pptx
 
Fixed-Point Code Synthesis for Neural Networks
Fixed-Point Code Synthesis for Neural NetworksFixed-Point Code Synthesis for Neural Networks
Fixed-Point Code Synthesis for Neural Networks
 
Fixed-Point Code Synthesis for Neural Networks
Fixed-Point Code Synthesis for Neural NetworksFixed-Point Code Synthesis for Neural Networks
Fixed-Point Code Synthesis for Neural Networks
 
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
 
Report AdvancedCodingFinal - Pietro Santoro
Report AdvancedCodingFinal - Pietro SantoroReport AdvancedCodingFinal - Pietro Santoro
Report AdvancedCodingFinal - Pietro Santoro
 
International Journal of Advanced Smart Sensor Network Systems (IJASSN)
International Journal of Advanced Smart Sensor Network Systems (IJASSN)International Journal of Advanced Smart Sensor Network Systems (IJASSN)
International Journal of Advanced Smart Sensor Network Systems (IJASSN)
 
Complexity analysis of multilayer perceptron neural network embedded into a w...
Complexity analysis of multilayer perceptron neural network embedded into a w...Complexity analysis of multilayer perceptron neural network embedded into a w...
Complexity analysis of multilayer perceptron neural network embedded into a w...
 
A new method for controlling and maintaining
A new method for controlling and maintainingA new method for controlling and maintaining
A new method for controlling and maintaining
 
ssnow_manuscript_postreview
ssnow_manuscript_postreviewssnow_manuscript_postreview
ssnow_manuscript_postreview
 
A STUDY OF METHODS FOR TRAINING WITH DIFFERENT DATASETS IN IMAGE CLASSIFICATION
A STUDY OF METHODS FOR TRAINING WITH DIFFERENT DATASETS IN IMAGE CLASSIFICATIONA STUDY OF METHODS FOR TRAINING WITH DIFFERENT DATASETS IN IMAGE CLASSIFICATION
A STUDY OF METHODS FOR TRAINING WITH DIFFERENT DATASETS IN IMAGE CLASSIFICATION
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
A Text-Independent Speaker Identification System based on The Zak Transform
A Text-Independent Speaker Identification System based on The Zak TransformA Text-Independent Speaker Identification System based on The Zak Transform
A Text-Independent Speaker Identification System based on The Zak Transform
 
Ay33292297
Ay33292297Ay33292297
Ay33292297
 

More from ijfcstjournal

ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ijfcstjournal
 
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
ijfcstjournal
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
ijfcstjournal
 
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
ijfcstjournal
 
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGA MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
ijfcstjournal
 
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHA NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
ijfcstjournal
 
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
ijfcstjournal
 

More from ijfcstjournal (20)

ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
 
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLINGA SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
 
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESA COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
 
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
 
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
 
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
 
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGAN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
 
EAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITYEAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITY
 
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHSEDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
 
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMCOMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
 
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSPSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
 
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
 
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGA MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
 
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
 
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHA NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
 
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSAGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
 
International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMES
 
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
 

Recently uploaded

Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 

Recently uploaded (20)

Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 

Soft computing based cryptographic technique using kohonen's selforganizing map synchronization for wireless communication (ksomsct)

  • 1. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.5, September 2014 SOFT COMPUTING BASED CRYPTOGRAPHIC TECHNIQUE USING KOHONEN'S SELF-ORGANIZING MAP SYNCHRONIZATION FOR WIRELESS COMMUNICATION (KSOMSCT) Arindam Sarkar1 and J. K. Mandal2 1Department of Computer Science & Engineering, University of Kalyani, W.B, India ABSTRACT In this paper a novel soft computing based cryptographic technique based on synchronization of two Kohonen's Self-Organizing Feature Map (KSOFM) between sender and receiver has been proposed. In this proposed technique KSOFM based synchronization is performed for tuning both sender and receiver. After the completion of the tuning identical session key get generates at the both sender and receiver end with the help of synchronized KSOFM. This synchronized network can be used for transmitting message using any light weight encryption/decryption algorithm with the help of identical session key of the synchronized network. Exhaustive parametric tests are done and results are compared with some existing classical techniques, which show comparable results for the proposed system. KEYWORDS Kohonen's Self-Organizing Map (KSOFM), soft computing, cryptography, Wireless Communication. 1. INTRODUCTION A range of techniques are obtainable to protect data and information from attackers [1, 5, 6, 7, 8, 9, 10]. Existing TPM and PPM [2, 3, 4] technique have some limitations like secret seed values used in the generation of identical input vector has to be transmitted to the other party via public channel in the SYN frame in each iteration. This significantly increases the synchronization time. Also for ensuring the security this parameters should not be transmitted via public channel. Furthermore, TPM and PPM needs significant amount of synchronization steps. This may not suitable in wireless communication because of resource constraints criteria. Proposed method of this paper eliminates all the above stated drawbacks of the TPM and PPM. The proposed technique performs the KSOFM based synchronization for generation of secret tuned session key at both ends with fewer amounts of synchronization steps compared to TPM and PPM. The organization of this paper is as follows. Proposed cryptographic technique has been discussed in section 2. Experiments results of this technique are given in section 3. Conclusions are drawn in section 4 and that of references at end. 2. THE TECHNIQUE The proposed technique constructs the secret key at both sides using exchanged information. For ensuring the randomness in every session, certain parameters value get randomly change in every session like seed value for generating random inputs and weights, number of iteration to train the map, different mathematical functions (Radial basis, Gaussian, Mexican Hat) for choosing the random points from the KSOFM. DOI:10.5121/ijfcst.2014.4508 85
  • 2. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.5, September 2014 2.1 Synchronization Methodology In this section, a novel Kohonen Self-Organizing Feature Map (KSOFM) based synchronization of both sender and receiver machine has been presented. In this proposed technique input examples are used to build the map through vector quantization method along with unsupervised competitive learning for performing the synchronization. Proposed method uses unsupervised learning method to represent input space of the training samples in a discrete 2D maps. Neighborhood of each neuron (i.e. the connections of the neuron with adjacent neurons) in the map depends on the dimension of the map. 2D regular spacing in a hexagonal or rectangular grid uses to arrange the neurons. Following sub sections discussed about detailed methodology used in synchronization procedure. 2.1.1 Initialization of weight vector In this proposed technique KSOFM comprises of neurons along with a weight vector for each neuron having a dimension same as the dimension of the input vectors. Consider the input vector  T 86 X  x1, x2 ,..., xn and weight vector  T W  w1,w2 ,..., wn .This scheme initially, assigns a weight vector to each neuron (point) by arbitrarily choosing a neuron (point) of the input space. The value of the weights vector is set to a tiny random numbers. 2.1.2 Selection of point For initially assigning a weight vector to each neuron (point) an arbitrary neuron (point) ࢞ ∈ ݅݊݌ݑݐ ݏ݌ܽܿ݁ ܺ get selected. 2.1.3 Unsupervised Training of KSOFM The necessity of unsupervised learning mechanism in KSOFM is to produce similar response from different parts of the network for a certain input patterns. This proposed technique uses competitive learning in the training period to train the KSOFM. Euclidean distance between each neuron and an arbitrary neuron (point) ݔ get calculated by:    2  2  2 2 2 Distancek  x1 wk1  x wk ... xn wkn Where, ݇ = 1,2, . . . , ܲ ܲ is the neuron number ܹkj is the entry of ݆ of the weight of neuron ݇ The neuron (point) whose weight vector is most similar to the input is called the Best Matching Unit (BMU). The weights of the BMU and neurons (point) close to it in the KSOFM lattice are adjusted towards the input vector. The magnitude of the change decreases with time and with distance (within the lattice) from the BMU. This proposed technique uses 2D KSOFM with 100 neurons. A learning rate  of 0.1 is used to train the KSOFM and decreasing the spread of the neighborhood function by the rule:     1 _   0     Iteration number _ _ _ Total no of iteration
  • 3. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.5, September 2014 Here, ߪ is initial spread. The value of ߪ decreases from the initial value to the final value (0) constantly. Hence the neighborhood function influences all neurons of the map in the first time and its influence on far neurons vanishes progressively. Near the end of the training only the winner neuron will be updated so as to drive neurons to gravity centers. 2.1.4 Selection of Winner neuron The winner neuron is a neuron which has a minimum distance to ݔ (arbitrary point). Winner neuron gets selected based on the distance factor. The minimum distance Distancewinner fulfills the condition: 87 DistancewinnerDistancek ܹℎ݁ݎ݁ ݇ = 1,2, . . . , ܲ 2.1.5 Updating of KSOFM An updating rule has been applied over the entire map keeping in mind the priority of the winner neuron and its closest neighbors. In this proposed technique updating is done using following formula    wk,new  wk,old .Neighborwinner,k . x  wk,old Where  is the learning step and ܰ݁݅݃ℎܾ݋ݎ(ݓ݅݊݊݁ݎ, ݇) is a neighborhood function with a bell shape centered at the winner neuron. It is a function of the distance between the winner neuron and the neuron k. winner k   2 2 Neighbor winner k e ,     2.1.6 Reiteration on KSOFM A new arbitrary point ݕ ∈ ݅݊݌ݑݐ ݏ݌ܽܿ݁ ܺ get selected and all the steps discussed in sub section 3.1.3 to 3.1.5 get perform again. This process is repeated for each input vector for a (usually large) number of cycles ߣ. 2.2 Synchronization parameters The spreading of the neighbourhood function (ߪ) is important since it controls the convergence of the map. It should be large at the beginning and shrink progressively to reach a small value in order to globally order the neurons over the whole map. The maximum value of ܰ݁݅݃ℎܾ݋ݎ(ݓ݅݊݊݁ݎ, ݓ݅݊݊݁ݎ) = 1 corresponds to the winner neuron and value of Neighbor function decreases when the distance between neurons ݇ and winner increases. Concerning the value of the learning rate , it should be small enough to ensure the convergence of the KSOFM. In this proposed synchronization technique the sender and receiver both uses the identical KSOFM architecture along with identical parameters in each session. Following are the list of parameters used in each session.  Dimension of the KSOFM (2D or 3D)  Number of neurons which specifies the number of different possible session keys  Dimension of the weight vector specify the length of the key  Seed value for generating random inputs and weights  Number of iteration to train the map
  • 4. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.5, September 2014  Different mathematical functions as a mask for choosing the random points from the ܥܴܥ (ܥݕ݈ܿ݅ܿ ܴ݁݀ݑ݊݀ܽ݊ܿݕ ܥℎ݁ܿ݇݁ݎ) 88 KSOFM (Radial basis, Mexican Hat, Gaussian etc.)  Different index value for choosing different neurons (key) on the mathematical mask at each session for forming the session key Parameters that get negotiated at the initial stage of synchronization procedure between sender and receiver by mutual agreement are completely random. By changing each of the parameters randomly in each session security of proposed technique can be enhanced which in turns decrease the success rate of the attackers. In this proposed technique both A’s and B’s KSOFM are starts synchronization by exchanging some control frames for negotiation of parameters value. Synchronization (SYN) Frame: ܥ݋݉݉ܽ݊݀ ܥ݋݀݁ 00 ܻܵܰ_ܫܦ ܦܫܯ ܫ݊݀݁ݔ ܹ݁݅݃ℎݐ ܦܫܯ ܫ݊݀݁ݔ ܫݐ݁ݎܽݐ݅݋݊ ܫ݊݀݁ݔ ܯܽݏ݇ ܫ݊݀݁ݔ ܵ݁݁݀ ܫ݊݀݁ݔ ܰ݁ݑݎ݋݊ ܦܫܯ ܫ݊݀݁ݔ 2 4 1 2 16 2 4 4 16 (bits ) Figure 3: Synchronization (SYN) Frame  Sender constructs a ܻܵܰ frame and transmitted to the receiver for handshaking purpose in connection establishment phase. ܻܵܰ usually comprises of ܥ݋݉݉ܽ݊݀ ܿ݋݀݁: Following table illustrate the different command code in respect to the different frame. Table 1 Command Code Command code Frame 00 ܻܵܰ 01 ܣܥܭ_ܻܵܰ 10 ܰܣܭ_ܻܵܰ 11 ܫ݊݀݁ݔ ܻܵܰ_ܫܦ: 4 bits ܻܵܰ_ܫܦ is used to identify different SYN frame in different session. ܦܫܯ ݅݊݀݁ݔ: 1 bit is used to specify the dimension of KSOFM. Following table illustrate the ܦܫܯ ݅݊݀݁ݔ corresponds to the dimension. Table 2 Command Code DIM Index KSOFM Dimension 0 2D 1 3D ܫݐ݁ݎܽݐ݅݋݊ ݅݊݀݁ݔ: 16 bits are used to illustrate the ܫݐ݁ݎܽݐ݅݋݊ ݅݊݀݁ݔ. Following table shows the ܹ݁݅݃ℎݐ ܦܫܯ ݅݊݀݁ݔ corresponds to the number of weights. ܹ݁݅݃ℎݐ ܦܫܯ ݅݊݀݁ݔ: 2 bits are used to illustrate the ܹ݁݅݃ℎݐ ܦܫܯ ݅݊݀݁ݔ.
  • 5. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.5, September 2014 89 Table 3 Command Code Weight DIM Index Number of weights 00 64 01 128 10 192 11 256 ܯܽݏ݇ ܫ݊݀݁ݔ: 2 bits are used to illustrate the ܯܽݏ݇ ܫ݊݀݁ݔ. Following table illustrate the different ܯܽݏ݇ ܫ݊݀݁ݔ value corresponds to the different mathematical mask function. Table 4 Command Code Mask Index Mathematical Mask Function 00 Mexican Hat 01 Gaussian 10 Radial Basis 11 Reserved ܵ݁݁݀ ݅݊݀݁ݔ: 4 bits are used to illustrate the ܵ݁݁݀ ݅݊݀݁ݔ. ܰ݁ݑݎ݋݊ ܦܫܯ ݅݊݀݁ݔ: 4 bits are used to illustrate the ܰ݁ݑݎ݋݊ ܦܫܯ ݅݊݀݁ݔ which is the total number of neurons ܥܴܥ (ܥݕ݈ܿ݅ܿ ܴ݁݀ݑ݊݀ܽ݊ܿݕ ܥℎ݁ܿ݇݁ݎ): 16 bits are used in CRC.  When the receiver receives the frame ܻܵܰ, the receiver should carry out integrity test.  Receiver performs Integrity test after receiving the ܻܵܰ frame. If the messages are received as sent (with no replication, incorporation, alteration, reordering, or replay) the receiver will execute the synchronization phase. Acknowledgement of Synchronization (ACK_SYN) Frame: ܥ݋݉݉ܽ݊݀ ܥ݋݀݁ 0010 ܻܵܰ_ܫܦ ܥܴܥ (ܥݕ݈ܿ݅ܿ ܴ݁݀ݑ݊݀ܽ݊ܿݕ ܥℎ݁ܿ݇݁ݎ) 4 8 16 (bits) Figure 4: Acknowledgement of Synchronization (ܣܥܭ_ܻܵܰ) Frame ܣܥܭ_ܻܵܰ frame send by the receiver to the sender for positive acknowledgement of the parameters value. Negative Acknowledgement of Synchronization (NAK_SYN) Frame: ܥ݋݉݉ܽ݊݀ ܥ݋݀݁ 0011 ܻܵܰ_ܫܦ ܥܴܥ (ܥݕ݈ܿ݅ܿ ܴ݁݀ݑ݊݀ܽ݊ܿݕ ܥℎ݁ܿ݇݁ݎ) 4 8 16 (bits) Figure 5: Negative Acknowledgement of Synchronization (ܰܣܭ_ܻܵܰ) Frame
  • 6. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.5, September 2014 ܰܣܭ_ܻܵܰ frame send by the receiver to the sender for negative acknowledgement of the parameters value. Finish Synchronization (FIN_SYN) Frame: 90 ܥ݋݉݉ܽ݊݀ ܥ݋݀݁ 0001 ܻܵܰ_ܫܦ ܥܴܥ (ܥݕ݈ܿ݅ܿ ܴ݁݀ݑ݊݀ܽ݊ܿݕ ܥℎ݁ܿ݇݁ݎ) 4 8 16 (bits) Figure 6: Finish Synchronization (ܨܫܰ_ܻܵܰ) Frame Finally, the receiver should send the frame ܨܫܰ_ܻܵܰ to alert the sender. 2.3 Synchronization Algorithm Input : Assign a weight vector to each neuron by arbitrarily choosing a point of the input space Output : Synchronized KSOFM Method : The process operates on sender’s and receiver’s Kohonen's Self- Organizing Feature Map (KSOFM) and generate synchronized session key. Step 1. Randomize the map's nodes' weight vectors Step 2. Select an arbitrary input vector Step 3. Traverse each node in the map Step 3.1 Use the Euclidean distance formula to find the similarity between the input vector and the map's node's weight vector Step 3.2 Track the node that produces the smallest distance (this node is the best matching unit, BMU) Step 4. Update the nodes in the neighborhood of the BMU (including the BMU itself) by pulling them closer to the input vector Step 5. Increase s and repeat from step 2 After a mutually predetermined iteration steps both sender and receiver stop their iteration. Now, both sender and receiver have the identical final KSOFM because they have started with same initial configuration and proceeds with same mutually agreement parameters. In this situation the sender uses mathematical function as a mask to form the session key. The receiver would use the same mutually pre agreed mathematical function as a mask in the map for reconstruct the session key. Use of mathematical mask increases the security of the scheme because instead of one single neuron, key can be constructed using several neurons on the mask. Also changing the mask parameters several key can be generated. From this discussion it can be concluded that initially mask method get slightly more amount of time but once the mask get set it takes less amount of time. An adversary could not find the key because they do not have the map, mathematical function for masking and other mutually pre agreed parameters. Mask method associate several neurons around the designated neuron to form the key. This provides a significant improvement to the security of the generation of session key. A mask hides all neurons other than the winner. In this proposed scheme different mask functions like Gauss, Radial basis, Mexican hat functions are get used randomly in different session. The winner neuron fixes the centre of the mask and
  • 7. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.5, September 2014 each neuron around the winner will be weighted and summed to the winner. The result is a different key depending on the shape of the mask. The relation of the key is obtained by: 91 ,  , Key u q w ij q . f winner i , j i , j ݍ = 1,2,…, ܰ Where, f winner i, j  is the mask centred at the winner neuron, wij,q , is the component ݍ of the vector associated to neuron (݅ , ݆) and Keyu,q , is the component ݍ of the ultimate (final) key. A general form of the mask is represented by the the following equation: k w k w   2 2 2 2 1 2 .   fwinner x a e be       with ܽ, ܾ, ߪ1 , ߪ2 ߳ ܴ , ݔ a neuron in the KSOFM, ݓ݅݊݊݁ݎ is the winner neuron. A huge number of masks could be generated by changing parameters ܽ, ܾ, ߪ1 , ߪ2. Using the mask incontestably enhances the security of the key. In wireless communication, instead of starting from the initial state of the KSOFM key generation procedure a user may use the same trained KSOFM in different session with different users by changing only the parameters value of the mask or mask function used to determine the ultimate key. This procedure helps to save the resources of wireless communication very efficiently. 3. SECURITY ANALYSIS In this paper a KSOFM synchronized cryptographic technique has been proposed. The technique generates the synchronized session key by tuning KSOFM of both sender and receiverThe Following attacks are considered to ensure the robustness of the proposed technique. Cipher text only Attack: In this type of attack, the attacker has access to a set of cipher text. In cipher text only attack, encryption algorithm and cipher text is known to an attacker. An attacker tries to break the algorithm or in simple words tries to deduce the decryption key or plaintext by observing the cipher text. This proposed technique nullifies the success rate of this attack by producing a robust KSOFM encrypted cipher text. The strength of resisting exhaustive key search attack relies on a large key space. So, cipher text produces by this proposed methodology is mathematically difficult to break. Thus a hacker has to try all such key streams to find an appropriate one. Key stream have high degrees of correlation immunity. Thus it is practically difficult to perform a brute-force search in a key-space. Known Plaintext Attack: The attacker has access to one or more cipher text and some characters in the original data. The objective is to find the secret key. Proposed technique offers better floating frequency of characters. So, known plain text attack is very difficult in this proposed technique.
  • 8. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.5, September 2014 Chosen Plaintext Attack: Here, the attacker has liberty to choose a plaintext of his/her choice and get the corresponding cipher text. Since the attacker can choose plaintext of his/her choice, this attack is more powerful. Again the objective of this attack is to find the secret key. This attack is impractical because there is no obvious relationship between the individual bits of the sequence in plain text and cipher text. So, it is not possible to choose a plaintext of his/her choice and get the corresponding cipher text. Chosen Cipher text Only Attack: The attacker can choose cipher text and get the corresponding plaintext. By selecting some cipher text a cryptanalyst has access to corresponding decrypted plaintext. Chosen cipher text only attack is more applicable to public key cryptosystems. This technique has a good Chi-Square value this confirms good degree of non-homogeneity. So, it will be difficult to regenerate plain text from the cipher text. Brute Force Attack: A cryptanalyst tries all possible keys in finite key space one by one and check the corresponding plaintext, if meaningful. The basic objective of a brute force attack is to try all possible combinations of the secret key to recover the plaintext image and or the secret key. On an average, half of all possible keys must be tried to achieve success but brute force attack involves large computation and has a very high complexity. Due to high complexity brute force attack will not be feasible. Proposed technique has a good entropy value near to equal 8 which indicates that brute force attack is very difficult in this proposed technique. 4. RESULTS A total of 15 statistical tests of The NIST Test Suite have been performed to evaluate randomness of the KSOFM synchronized session key proposed in this paper. These tests focus on a variety of different types of non-randomness that could exist in a sequence. Some tests are decomposable into a variety of subtests. The 15 tests are following: 92 Table 5 Statistical Results Statistical Test Expected Proportion Observed Proportion Status for Proportion of passing P-value of P-values Status for Uniform/ Non-uniform distribution Frequency (Monobits) Test 0.972766 0.976329 Success 2.835246e-03 Non-uniform Test for Frequency within a Block 0.972766 0.972818 Success 3.407162e-04 Non-uniform Runs Test 0.972766 0.975746 Success 0.321683e-01 Uniform Longest Run of Ones in a Block 0.972766 0.97051 Unsuccess 1.491737e+02 Uniform Binary Matrix Rank Test 0.972766 0.990000 Success 7.491904e-02 Uniform Discrete Fourier Transform Test 0.972766 0.968329 Unsuccess 0.000000e+00 Non-uniform Non-overlapping 0.972766 0.988891 Success 0.000000e+00 Non-uniform
  • 9. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.5, September 2014 93 (Aperiodic) Template Matching Test Overlapping (Periodic) Template Matching Test 0.972766 0.980201 Success 7.259823e-02 Non-uniform Maurer’s “Universal Statistical” Test 0.972766 1.000000 Success 7.830128e-01 Uniform Linear Complexity Test 0.972766 0.975318 Success 2.945727e-01 Uniform Serial Test 0.977814 0.973903 Unsuccess 0.000000e+00 Non-uniform Approximate Entropy Test 0.972766 0.985830 Success 2.837463e-02 Uniform Cumulative Sums Test 0.977814 0.971289 Unsuccess 0.000000e+00 Non-uniform Random Excursions Test 0.983907 0.942500 Unsuccess 0.000000e+00 Non-uniform Random Excursions Variant Test 0.985938 0.972963 Unsuccess 0.000000e+00 Non-uniform Table:6 Comparisons of 128 bit key length vs. average synchronization time (in cycle) Key Length (128 bits) Average Synchronization time (in cycle) KSOFM 2516,41 TPM (L=25) 2624,27 PPM 2811,04 Table shows KSOFM technique needs 2516,41 cycles in average to generate session key having a length of 128 bit. Whereas existing TPM (L=25) and PPM needs 2624,27 and 2811,04 cycles respectively, which larger than all the proposed techniques. KSOFM outperforms over existing TPM and PPM. This is quite affordable in terms of resources available in wireless communication. Table:7 Comparisons of 128 bit key length vs. average synchronization time (in cycle) for group synchronization (Group size=4) Key Length (128 bits) No. of Parties participating in the Group Synchronization Average Synchronization time (in cycle) KSOFM 4 15098,46 TPM (L=25) 4 15745,62 PPM 4 16866,24
  • 10. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.5, September 2014 94 17000 16500 16000 15500 15000 14500 Average Synchronization time (in Cycle) Figure 16: Comparisons of 128 bit key length vs. average synchronization time (in cycle) for group synchronization (Group size=4) Table and figure shows KSOFM, TPM, PPM technique needs (15098,46), (15745,62), (16866,24) cycles respectively in average to generate session key having a length of 128 bit for synchronize group of 4 parties . This clearly indicates that proposed technique outperforms than all other existing techniques at the time of group synchronization. Table:8 Comparisons of 192 bit key length vs. average synchronization time (in cycle) Key Length (192 bits) Average Synchronization time (in Cycle) KSOFM 3173,41 TPM (L=25) 3347,15 PPM 3571,48 Table and figure shows KSOFM technique needs 3173,41 cycles in average to generate session key having a length of 128 bit. Whereas existing TPM (L=25) and PPM needs 3347,15 and 3571,48 cycles respectively, which larger than the proposed techniques. KSOFM outperforms over existing TPM and PPM. This is quite affordable in terms of resources available in wireless communication. Table: 9 Comparisons of 192 bit key length vs. average synchronization time (in cycle) for group synchronization (Group size=4) Key Length (192 bits) No. of Parties participating in the Group Synchronization Average Synchronization time (in Cycle) KSOFM 4 19040,46 TPM (L=25) 4 20082,90 PPM 4 21428,88 14000 KSOFM TPM (L=25) PPM Average Synchronization time (in Cycle)
  • 11. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.5, September 2014 95 22000 21000 20000 19000 18000 Average Synchronization time (in Cycle) Figure 17: Comparisons of 192 bit key length vs. average synchronization time (in cycle) for group synchronization (Group size=4) Table shows KSOFM technique needs 19040,46 cycles in average to generate session key having a length of 192 bit for synchronize group of 4 parties This clearly indicates that proposed technique outperforms than all other proposed and existing techniques at the time of group synchronization. Table: 10 Comparisons of 256 bit key length vs. average synchronization time (in cycle) Key Length (256 bits) Average Synchronization time (in Cycle) KSOFM 4719,72 TPM (L=25) 4851,86 PPM 5193,03 Table and figure shows KSOFM technique needs 4719,72 cycles in average to generate session key having a length of 128 bit. Whereas existing TPM (L=25) and PPM needs 4851,86 and 5193,03 cycles respectively, which larger than the proposed techniques. This is quite affordable in terms of resources available in wireless communication. Table: 11 Comparisons of 256 bit key length vs. average synchronization time (in cycle) for group synchronization (Group size=4) Key Length (256 bits) No. of Parties participating in the Group Synchronization Average Synchronization time (in Cycle) KSOFM 4 28318,32 TPM (L=25) 4 29111,16 PPM 4 31158,18 17000 KSOFM TPM (L=25) PPM Average Synchronization time (in Cycle)
  • 12. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.5, September 2014 96 32000 31000 30000 29000 28000 27000 Average Synchronization time (in Cycle) Figure 18: Comparisons of 256 bit key length vs. average synchronization time (in cycle) for group synchronization (Group size=4) Table shows KSOFM technique needs 28318,32 cycles respectively in average to generate session key having a length of 192 bit for synchronize group of 4 parties . This clearly indicates that proposed technique outperforms than all other proposed and existing techniques at the time of group synchronization. Average Number of Cycles Figure 19: Key length vs. average number of iterations 5000 4000 3000 2000 1000 From figure it has been observed that if the length of the session key get increased then the increased of average synchronization steps is linear. Relative Time Spent in GC (%) Figure 20: Comparisons of relative time spent in GC to generate 128 bit session key 26000 KSOFM TPM (L=25) PPM Average Synchronization time (in Cycle) 0 128 bit Key Length 192 bit Key Length 256 bit Key Length Average Number of Cycles 2.63 2.62 2.61 2.6 2.59 2.58 2.57 KSOFM TPM PPM Relative Time Spent in GC (%)
  • 13. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.5, September 2014 From the above table and figure it has been shown that increasing order sequence of relative time spent in GC in group synchronization phase is KSOFM, TPM and PPM. 97 No. of Threads Figure 21: Comparisons of number of Threads required generating 128 bit session key 22 21 20 19 18 17 From the above table and figure it has been shown that increasing order sequence of number of thread required in group synchronization phase is KSOFM, TPM and PPM. Figure 22: KSOFM dimension vs. average number of iterations 6000 5000 4000 3000 2000 1000 Figure shows the average number of iterations to be needed for generating 128, 192 and 256 bit session key in 2D and 3D KSOFM. The above figure depicts that 3D KSOFM takes more iterations to train the map in compared to 2D KSOFM. So, the energy consumption is more in 3D KSOFM than 2D. For this reason 2D KSOFM is the best alternative in wireless communication where resource constrains (in terms of energy, memory) is a vital issues for generation of session key. (a) (b) (c) (d) 16 KSOFM TPM PPM No. of Threads 0 128 bit Key Length 192 bit Key Length 256 bit Key Length Average Number of Iterations in 2D KSOFM Average Number of Iterations in 3D KSOFM
  • 14. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.5, September 2014 98 (e) (f) (g) (h) (i) Figure 23: (a), (b), (c) shows the frequency distribution of plain text, TPM based encrypted text, proposed chaos KSOFM based encrypted text, figure: (d), (e), (f) shows the floating frequency of plain text, TPM based encrypted text, proposed chaos KSOFM based encrypted text, figure: (g), (h), (i) shows the autocorrelation of plain text, TPM based encrypted text, proposed chaos KSOFM based encrypted text 5. CONCLUSION Proposed technique is very simple and easy to implement in various high level language. The test results also show that the performance and security provided by the proposed technique is good and comparable to standard technique. The security provided by the proposed technique is comparable with other techniques. To enhance the security of the technique, proposed technique offers changes of some parameters randomly in each session. To generate the secret session key index mask get exchanged between sender and receiver. This technique has a unique ability to construct the secret key at both sides using this exchanged information. Since the encryption and decryption times are much lower, so processing speed is very high. Proposed method takes minimum amount of resources which is greatly handle the resource constraints criteria of wireless communication. This method generates a large number of keys which is the same number of neurons in the map. For ensuring the randomness in every session, some of the parameters get change randomly at each session. proposed methods outperform than existing TPM, PPM and does not suffers from Brute Force or Man-In-The-Middle (MITM) attack. No platform specific optimizations were done in the actual implementation, thus performance should be similar over varied implementation platform. The whole procedure is randomized, thus resulting in a unique process for a unique session, which makes it harder for a cryptanalyst to find a base to start with. This technique is applicable to ensure security in message transmission in any form and in any size in wireless communication.
  • 15. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.5, September 2014 99 Some of the salient features of proposed technique can be summarized as follows: a) Session key generation and exchange – Identical session key can be generate after the tuning of KSOFM in both sender and receiver side. So, no need to transfer the whole session key via vulnerable public channel. b) Degree of security – Proposed technique does not suffers from cipher text only Attack, known plaintext attack, chosen plaintext attack, Chosen cipher text only attack, brute force attack. c) Variable size key –128/192/256 bit session key with high key space can be used in different session. Since the session key is used only once for each transmission, so there is a minimum time stamp which expires automatically at the end of each transmission of information. Thus the cryptanalyst will not be able guess the session key for that particular session. d) Complexity – Proposed technique has the flexibility to adopt the complexity based on infrastructure, resource and energy available for computing in a node or mesh through wireless communication. So, the proposed technique is very much suitable in wireless communication. e) Key sensitivity – Proposed method generates an entirely different cipher stream with a small change in the key and technique totally fails to decrypt the cipher stream with a slightly different secret session key. f) Trade-off between security and performance – The proposed technique may be ideal for trade-off between security and performance of light weight devices having very low processing capabilities or limited computing power in wireless communication. In future, some other soft computing based approach can be used to generate the session key. ACKNOWLEDGEMENT The author expresses deep sense of gratitude to the DST, Govt. of India, for financial assistance through INSPIRE Fellowship leading for a PhD work under which this work has been carried out. REFERENCES [1] Atul Kahate, Cryptography and Network Security, 2003, Tata McGraw-Hill publishing Company Limited, Eighth reprint 2006. [2] R. Mislovaty, Y. Perchenok, I. Kanter, and W. Kinzel. Secure key-exchange protocol with an absence of injective functions. Phys. Rev. E, 66:066102, 2002. [3] A. Ruttor, W. Kinzel, R. Naeh, and I. Kanter. Genetic attack on neural cryptography. Phys. Rev. E, 73(3):036121, 2006. [4] Wolfgang Kinzel and ldo Kanter, "Neural cryptography" proceedings of the 9th international conference on Neural Information processing(ICONIP 03). [5] Charles Pfleeger, Shari Lawrence Pfleeger, Security in computing, Third Edition 2003, pp 48, Prentice Hall of India Pvt Ltd, New Delhi. [6] Biham, E. and Seberry, J.”Py (Roo): A Fast and Secure Stream Cipher”. EUROCRYPT'05 Rump Session, at the Symmetric Key Encryption Workshop (SKEW 2005), 26-27 May 2005. [7] Chung-Ping Wu, C.C. Jay Kuo, “Design of Integrated Multimedia Compression and Encryption Systems”, IEEE Transactions on Multimedia, Volume 7, Issue 5, Oct. 2005 Page(s): 828 – 839. [8] HongGeun Kim, JungKyu Han and Seongje Cho.”An efficient implementation of RC4 cipher for encrypting multimedia files on mobile devices”. SAC '07 Proceedings of the ACM symposium on Applied computing, 2007, pp 1171--1175, NewYork, USA.
  • 16. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.5, September 2014 [9] Mantin and A. Shamir, “Weaknesses in the key scheduling algorithm of RC4”, Lecture Notes in Computer Science, Vol. 2259, Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography, pp: 1 - 24, 2007. [10] Sarkar Arindam, Mandal J. K., “Artificial Neural Network Guided Secured Communication Techniques: A Practical Approach”, Paperback: 128 pages, Publisher: LAP LAMBERT Academic Publishing (June 4, 2012), Language: English, ISBN-10: 3659119911, ISBN-13: 978- 3659119910. 100 Authors Arindam Sarkar INSPIRE FELLOW (DST, Govt. of India), MCA (VISVA BHARATI, Santiniketan, University First Class First Rank Holder), M.Tech (CSE, K.U, University First Class First Rank Holder). Jyotsna Kumar Mandal M. Tech.(Computer Science, University of Calcutta), Ph.D.(Engg., Jadavpur University) in the field of Data Compression and Error Correction Techniques, Professor in Computer Science and Engineering, University of Kalyani, India. Life Member of Computer Society of India since 1992 and life member of cryptology Research Society of India. Dean Faculty of Engineering, Technology & Management, working in the field of Network Security, Steganography, Remote Sensing & GIS Application, Image Processing. 25 years of teaching and research experiences. Eight Scholars awarded Ph.D. and 8 are pursuing.