Design and investigation of a chaotic neural network architecture for cryptographic applications

被引:8
作者
Bevi, A. Ruhan [1 ]
Tumu, Sriharini [1 ]
Prasad, N. Varsha [1 ]
机构
[1] SRM Inst Sci & Technol, Dept ECE, Kattankulathur 603203, India
关键词
Chaotic neural network; Memristor; Nonlinear equations; Cubic map; 2D Logistic map; Encryption;
D O I
10.1016/j.compeleceng.2018.09.015
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Artificial neural networks are an integral part of emerging technologies, and ongoing research has shown that they can be applied to a variety of applications. This paper proposes a new cryptographic algorithm using chaotic neural networks, whose function is enhanced by construction with polynomials that exhibit chaos, namely, nonlinear Her mite and Chebyshev polynomials. These polynomials incorporate a memristor conductance, which is used as an activation function in the chaotic neural networks. Further, a function of the weights obtained from the chaotic neural networks, is used to generate the initial values that are used in the cryptographic process. The encryption algorithm employed here is inspired by the Lai-Massey block cipher with cubic and two-dimensional logistic maps, and the evaluation of these chaotic equations is performed using correlation values. The correlation values between the cipher and plain text are also examined to determine the undecipherability of the message to be sent on a public channel. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:179 / 190
页数:12
相关论文
共 15 条
[1]  
[Anonymous], 1854, Mem. des sav. etr. pres. a l'Acad. de. St. Petersb.
[2]   MEMRISTOR - MISSING CIRCUIT ELEMENT [J].
CHUA, LO .
IEEE TRANSACTIONS ON CIRCUIT THEORY, 1971, CT18 (05) :507-+
[3]  
Diaconis P., 1991, Statist. Sci., V6, P284
[4]   Novel implementation of memristive systems for data encryption and obfuscation [J].
Du, Nan ;
Manjunath, Niveditha ;
Shuai, Yao ;
Buerger, Danilo ;
Skorupa, Ilona ;
Schueffny, Rene ;
Mayr, Christian ;
Basov, Dimitri N. ;
Di Ventra, Massimiliano ;
Schmidt, Oliver G. ;
Schmidt, Heidemarie .
JOURNAL OF APPLIED PHYSICS, 2014, 115 (12)
[5]  
Gao Y., 2015, SCI REP, V5
[6]   NOTE ON N-DIMENSIONAL HERMITE POLYNOMIALS [J].
GRAD, H .
COMMUNICATIONS ON PURE AND APPLIED MATHEMATICS, 1949, 2 (04) :325-330
[7]   CHAOTIC ATTRACTORS IN CRISIS [J].
GREBOGI, C ;
OTT, E ;
YORKE, JA .
PHYSICAL REVIEW LETTERS, 1982, 48 (22) :1507-1510
[8]   Image encryption using 2D Logistic-adjusted-Sine map [J].
Hua, Zhongyun ;
Zhou, Yicong .
INFORMATION SCIENCES, 2016, 339 :237-253
[9]  
LAI XJ, 1991, LECT NOTES COMPUT SC, V547, P17
[10]  
Pareek N. K., 2005, Communications in Nonlinear Science and Numerical Simulation, V10, P715, DOI 10.1016/j.cnsns.2004.03.006