Beta
110105

CRYPTOGRAPHY SCHEME BASED ON TRANSPARENT FEEDFORWARD NEURAL NETWORK AND ORDERED LOOKUP TABLE

Article

Last updated: 26 Dec 2024

Subjects

-

Tags

Electrical Engineering, Computer Engineering and Electrical power and machines engineering.

Abstract

A single hidden layer feedforward neural network (FFNN) is called a transparent FFNN if its output vector is a reproduction of the input vector. In this case, the input vector is the target output vector. Once the transparent FFNN is well designed with the m-bit plaintext input set, the designed network is divided into two parts: the transmitter private network encrypting part and the receiver public network decrypting part. The hidden vector which is the output real vector of the private network part is transmitted using the decimal-value ordered lookup table (DVOLT). The m-bit binary cipher vector is the chosen binary index of the lookup table. In this paper, the binary plaintext vector size (m) is chosen to be 16 bits (two bytes). Computer simulation shows that both operations of encryption or decryption of all possible plaintext of 65536 (216) vectors can be done with zero error and an average processing time of 8.3 msec per 16-bit vector (4.15 msec / byte) per operation. The average hamming distance between the binary plaintext and the binary ciphertext is calculated as 7.8798 for all possible plaintext of 65536 16-bit vectors. This scheme can't be attacked by either brute force or cryptanalysis since there are no binary keys or known mathematical structures. The most important part which must be kept secret is the private matrix of the transmitter private network encrypting part. Each of the private encrypting key and the public decrypting key needs a memory size of about 8.5 Mbytes. The large size of both the private and public keys may limit the applications of the proposed scheme to large workstations intercommunications. This proposed cryptography scheme provides sender authentication and also receiver confidentiality.

DOI

10.21608/jesaun.2006.110105

Keywords

Cryptography, neural network based cryptography, transparent neural network, and decimal-value ordered lookup table

Authors

First Name

Dr. Ahmed

Last Name

Adel Abdelwahab

MiddleName

-

Affiliation

Department of Electronics, Communications and Computer Engineering, Faculty of Engineering, Helwan University, Helwan, Cairo, Egypt.

Email

abdelwahab_99@yahoo.com

City

-

Orcid

-

Volume

34

Article Issue

No 1

Related Issue

16603

Issue Date

2006-01-01

Receive Date

2005-09-24

Publish Date

2006-01-01

Page Start

189

Page End

197

Print ISSN

1687-0530

Online ISSN

2356-8550

Link

https://jesaun.journals.ekb.eg/article_110105.html

Detail API

https://jesaun.journals.ekb.eg/service?article_code=110105

Order

12

Type

Research Paper

Type Code

1,438

Publication Type

Journal

Publication Title

JES. Journal of Engineering Sciences

Publication Link

https://jesaun.journals.ekb.eg/

MainTitle

CRYPTOGRAPHY SCHEME BASED ON TRANSPARENT FEEDFORWARD NEURAL NETWORK AND ORDERED LOOKUP TABLE

Details

Type

Article

Created At

23 Jan 2023