Use of Neural Networks in Cryptography: A Review

被引:0
作者
Hadke, Pranita P. [1 ]
Kale, Swati G. [2 ]
机构
[1] Yeshwantrao Chavan Coll Engn, Dept Informat Technol, Nagpur, Maharashtra, India
[2] Yeshwantrao Chavan Coll Engn, Dept IT, Nagpur, Maharashtra, India
来源
2016 WORLD CONFERENCE ON FUTURISTIC TRENDS IN RESEARCH AND INNOVATION FOR SOCIAL WELFARE (STARTUP CONCLAVE) | 2016年
关键词
cryptography; cryptosystem; Neural Network; key generation and management;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In cryptography secret information is made unreadable for an unauthorized user. There are many cryptographic algorithms are available, but they are more complex techniques and requires more computational power. This paper gives a review of how Neural Networks contributes a help in cryptography and how neural network and cryptography together can be used for security.
引用
收藏
页数:4
相关论文
共 50 条
[41]   Neural Cryptography Based on Complex-Valued Neural Network [J].
Dong, Tao ;
Huang, Tingwen .
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2020, 31 (11) :4999-5004
[42]   Adaptive model-free synchronization of different fractional-order neural networks with an application in cryptography [J].
Roohi, Majid ;
Zhang, Chongqi ;
Chen, Yucheng .
NONLINEAR DYNAMICS, 2020, 100 (04) :3979-4001
[43]   Image Cryptography: A Systematic Review [J].
Magdy, Mahmoud ;
Ghali, Neveen I. ;
Ghoniemy, Said ;
Hosny, Khalid M. .
5TH INTERNATIONAL CONFERENCE ON COMPUTING AND INFORMATICS (ICCI 2022), 2022, :64-73
[44]   Physical Layer Cryptography and Cognitive Networks [J].
Mucchi, Lorenzo ;
Ronga, Luca Simone ;
Del Re, Enrico .
TRUSTWORTHY INTERNET, 2011, :75-91
[45]   Adaptive model-free synchronization of different fractional-order neural networks with an application in cryptography [J].
Majid Roohi ;
Chongqi Zhang ;
Yucheng Chen .
Nonlinear Dynamics, 2020, 100 :3979-4001
[46]   Comparison of Cryptography by Chaotic Neural Network and by AES [J].
Skovajsova, Lenka .
IEEE JOINT 19TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS AND 7TH INTERNATIONAL CONFERENCE ON RECENT ACHIEVEMENTS IN MECHATRONICS, AUTOMATION, COMPUTER SCIENCES AND ROBOTICS (CINTI-MACRO 2019), 2019, :29-32
[47]   On the Practical Uses of Experimental Adversarial Neural Cryptography [J].
Sooksatra, Korn ;
Rivas, Pablo .
2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2021), 2021, :40-46
[48]   The use of quaternions in the cryptographic key agreement protocol based on the architectures of the TPQM neural networks [J].
Plonkowski, Marcin ;
Urbanowicz, Pawel ;
Lisica, Elena .
PRZEGLAD ELEKTROTECHNICZNY, 2010, 86 (07) :90-91
[49]   An initial investigation on the use of fractional calculus with neural networks [J].
Gardner, Sam ;
Lamb, Robbie ;
Paxton, John .
PROCEEDINGS OF THE SECOND IASTED INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, 2006, :182-+
[50]   Case studies on the use of neural networks in eutrophication modeling [J].
Karul, C ;
Soyupak, S ;
Çilesiz, AF ;
Akbay, N ;
Germen, E .
ECOLOGICAL MODELLING, 2000, 134 (2-3) :145-152