Comparison of Cryptography by Chaotic Neural Network and by AES

被引:0
作者
Skovajsova, Lenka [1 ]
机构
[1] Slovak Acad Sci, Inst Informat, Bratislava, Slovakia
来源
IEEE JOINT 19TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS AND 7TH INTERNATIONAL CONFERENCE ON RECENT ACHIEVEMENTS IN MECHATRONICS, AUTOMATION, COMPUTER SCIENCES AND ROBOTICS (CINTI-MACRO 2019) | 2019年
关键词
cryptography; chaotic neural networks; AES cipher; chaotic maps; text encryption; SYNCHRONIZATION; CRYPTANALYSIS;
D O I
10.1109/cinti-macro49179.2019.9105232
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, the two methods for ciphering are presented and compared. The aim is to reveal the suitability of chaotic neural network approach to ciphering compared to AES cipher. The durations in seconds of both methods are presented and the two methods are compared. The results show, that the chaotic neural network is fast, suitable for ciphering of short plaintexts. AES ciphering is suitable for longer plaintexts or images and is also more reliable.
引用
收藏
页码:29 / 32
页数:4
相关论文
共 13 条
[1]   CHAOTIC NEURAL NETWORKS [J].
AIHARA, K ;
TAKABE, T ;
TOYODA, M .
PHYSICS LETTERS A, 1990, 144 (6-7) :333-340
[2]  
Daemen J., 2013, DESIGN RIJNDAEL AES
[3]   Subspace Trail Cryptanalysis and its Applications to AES [J].
Grassi, Lorenzo ;
Rechberger, Christian ;
Ronjom, Sondre .
IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2016, 2016 (02) :192-225
[4]   SYNCHRONIZATION AND COMPUTATION IN A CHAOTIC NEURAL NETWORK [J].
HANSEL, D ;
SOMPOLINSKY, H .
PHYSICAL REVIEW LETTERS, 1992, 68 (05) :718-721
[5]  
Kumar D.Lohit, 2016, INT J ENG TRENDS TEC, V33, P126, DOI [10.14445/22315381/IJETT-V33P223., DOI 10.14445/22315381/IJETT-V33P223]
[6]  
Lian SG, 2004, LECT NOTES COMPUT SC, V3174, P627
[7]  
Rijmen V, 2001, Federal Information Processing Standards Publications, P19, DOI DOI 10.1007/978-3-662-04722-4_1
[8]   Design and realization of a new chaotic neural encryption/decryption network [J].
Su, S ;
Lin, A ;
Yen, JC .
2000 IEEE ASIA-PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS: ELECTRONIC COMMUNICATION SYSTEMS, 2000, :335-338
[9]   Improving the Biclique Cryptanalysis of AES [J].
Tao, Biaoshuai ;
Wu, Hongjun .
INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 :39-56
[10]   A chaotic image encryption algorithm based on perceptron model [J].
Wang, Xing-Yuan ;
Yang, Lei ;
Liu, Rong ;
Kadir, Abdurahman .
NONLINEAR DYNAMICS, 2010, 62 (03) :615-621