Skip to main content

Security Analysis of Public-Key Encryption Scheme Based on Neural Networks and Its Implementing

  • Conference paper
Computational Intelligence and Security (CIS 2006)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4456))

Included in the following conference series:

Abstract

A Diffie-Hellman public-key cryptography based on chaotic attractors of neural networks is described in the paper. There is a one-way function between chaotic attractors and initial states in an Overstoraged Hopfield Neural Networks (OHNN). If the synaptic matrix of OHNN is changed, each attractor and its corresponding domain of initial state attraction will be changed. Then, we regard the neural synaptic matrix as a trap door, and change it with commutative random permutation matrix. A new Diffie-Hellman public-key cryptosystem can be implemented, namely keeping the random permutation operation of the neural synaptic matrix as the secret key, and the neural synaptic matrix after permutation as public-key. In order to explain the practicability of the encryption scheme, Security and encryption efficient of the scheme are discussed. The scheme of application for Internet secure communications is implemented by using Java program. The experimental results show that the proposed cryptography is feasible, and has a good performance of encryption and decryption speed to ensure the real time of IPng secure communications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Transactions on Information Theory 22(6), 644–654 (1976)

    Article  MathSciNet  MATH  Google Scholar 

  2. Stallings, W.: Cryptography and Network Security: Principles and Practice, 2nd edn. Prentice –Hall, Inc, Englewood Cliffs (2003)

    Google Scholar 

  3. Hellman, M.: An overview of public key cryptography. IEEE Communications Magazine 40(5), 42–49 (2002)

    Article  Google Scholar 

  4. Pecora, L.M., Carroll, T.L.: Synchronization in Chaotic Systems. Physical Review Letters 64(8), 821–824 (1990)

    Article  MathSciNet  Google Scholar 

  5. Crounse, K.R., Yang, T., Chua, L.O.: Pseudo-random sequence generation using the CNN universal machine with applications to cryptography. In: Proceedings of the IEEE International Workshop on Cellular Neural Networks and their Applications, Piscataway, pp. 433–438. IEEE, New York (1996)

    Google Scholar 

  6. Milanovic, V., Zaqhloul, M.E.: Synchronization of chaotic neural networks for secure communications. In: IEEE International Symposium on Circuits and Systems, Piscataway, vol. 3, pp. 28–31. IEEE, New York (1996)

    Google Scholar 

  7. Guo, D., Cheng, L.M., Cheng, L.L.: A New Symmetric Probabilistic Encryption Scheme Based on Chaotic Attractors of Neural Networks. Applied Intelligence 10, 71–84 (1999)

    Article  Google Scholar 

  8. Liu, N., Guo, D.: A New Public-key Cryptography Based on Chaotic Attractors of Neural Networks. Progress in Intelligence Computation, Wuhan CUGP, pp. 293–300 (2005)

    Google Scholar 

  9. Hopfield, J.J.: Neural Networks and Physical Systems with Emergent Collective Computational Abilities. In: Proceedings of the National Academy of Science, vol. 79, pp. 2554–2558 (1982)

    Google Scholar 

  10. Chen, J., Chen, X.: Special Matrices. Beijing, Tsinghua University Press, pp. 309–382 (2001)

    Google Scholar 

  11. Emmanuel, B.: Provably Authenticated Group Diffie-Hellman Key Exchange. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 255–264 (2001)

    Google Scholar 

  12. Daly, A., William, M.: Efficient Architectures for implementing Montgomery Modular Multiplication and RSA Modular Exponentiation on Reconfigurable Logic. enth ACM International Symposium on Field-Programmable Gate Arrays, pp. 40–49 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, N., Guo, D. (2007). Security Analysis of Public-Key Encryption Scheme Based on Neural Networks and Its Implementing. In: Wang, Y., Cheung, Ym., Liu, H. (eds) Computational Intelligence and Security. CIS 2006. Lecture Notes in Computer Science(), vol 4456. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74377-4_47

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74377-4_47

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74376-7

  • Online ISBN: 978-3-540-74377-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics