Abstract
A Diffie-Hellman public-key cryptography based on chaotic attractors of neural networks is described in the paper. There is a one-way function between chaotic attractors and initial states in an Overstoraged Hopfield Neural Networks (OHNN). If the synaptic matrix of OHNN is changed, each attractor and its corresponding domain of initial state attraction will be changed. Then, we regard the neural synaptic matrix as a trap door, and change it with commutative random permutation matrix. A new Diffie-Hellman public-key cryptosystem can be implemented, namely keeping the random permutation operation of the neural synaptic matrix as the secret key, and the neural synaptic matrix after permutation as public-key. In order to explain the practicability of the encryption scheme, Security and encryption efficient of the scheme are discussed. The scheme of application for Internet secure communications is implemented by using Java program. The experimental results show that the proposed cryptography is feasible, and has a good performance of encryption and decryption speed to ensure the real time of IPng secure communications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Transactions on Information Theory 22(6), 644–654 (1976)
Stallings, W.: Cryptography and Network Security: Principles and Practice, 2nd edn. Prentice –Hall, Inc, Englewood Cliffs (2003)
Hellman, M.: An overview of public key cryptography. IEEE Communications Magazine 40(5), 42–49 (2002)
Pecora, L.M., Carroll, T.L.: Synchronization in Chaotic Systems. Physical Review Letters 64(8), 821–824 (1990)
Crounse, K.R., Yang, T., Chua, L.O.: Pseudo-random sequence generation using the CNN universal machine with applications to cryptography. In: Proceedings of the IEEE International Workshop on Cellular Neural Networks and their Applications, Piscataway, pp. 433–438. IEEE, New York (1996)
Milanovic, V., Zaqhloul, M.E.: Synchronization of chaotic neural networks for secure communications. In: IEEE International Symposium on Circuits and Systems, Piscataway, vol. 3, pp. 28–31. IEEE, New York (1996)
Guo, D., Cheng, L.M., Cheng, L.L.: A New Symmetric Probabilistic Encryption Scheme Based on Chaotic Attractors of Neural Networks. Applied Intelligence 10, 71–84 (1999)
Liu, N., Guo, D.: A New Public-key Cryptography Based on Chaotic Attractors of Neural Networks. Progress in Intelligence Computation, Wuhan CUGP, pp. 293–300 (2005)
Hopfield, J.J.: Neural Networks and Physical Systems with Emergent Collective Computational Abilities. In: Proceedings of the National Academy of Science, vol. 79, pp. 2554–2558 (1982)
Chen, J., Chen, X.: Special Matrices. Beijing, Tsinghua University Press, pp. 309–382 (2001)
Emmanuel, B.: Provably Authenticated Group Diffie-Hellman Key Exchange. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 255–264 (2001)
Daly, A., William, M.: Efficient Architectures for implementing Montgomery Modular Multiplication and RSA Modular Exponentiation on Reconfigurable Logic. enth ACM International Symposium on Field-Programmable Gate Arrays, pp. 40–49 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Liu, N., Guo, D. (2007). Security Analysis of Public-Key Encryption Scheme Based on Neural Networks and Its Implementing. In: Wang, Y., Cheung, Ym., Liu, H. (eds) Computational Intelligence and Security. CIS 2006. Lecture Notes in Computer Science(), vol 4456. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74377-4_47
Download citation
DOI: https://doi.org/10.1007/978-3-540-74377-4_47
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74376-7
Online ISBN: 978-3-540-74377-4
eBook Packages: Computer ScienceComputer Science (R0)