A novel extreme learning machine-based cryptography system

被引:3
作者
Atee, Hayfaa Abdulzahra [1 ]
Ahmad, Robiah [2 ]
Noor, Norliza Mohd [2 ]
Rahma, Abdul Monem S. [3 ]
Sallam, Muhammad Samer [4 ]
机构
[1] Fdn Tech Educ Higher Educ & Sci Res, Baghdad, Iraq
[2] UTM Kuala Lumpur, UTM Razak Sch Engn & Adv Technol, Dept Engn, 54100 Jalan Sultan Yahya Petra, Kuala Lumpur, Malaysia
[3] Univ Technol Baghdad, Dept Comp Sci, Baghdad, Iraq
[4] Damascus Univ, Dept Comp Engn & Automat, Damascus, Syria
关键词
symmetric cipher; cryptography; encryption; RRNNs; ELM; gradient-based learning algorithm; CHAOTIC NEURAL-NETWORKS;
D O I
10.1002/sec.1711
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Extreme Learning Machine (ELM) is a well-known algorithm for the training of neural networks for two modes of functionality: regression and classification. This paper presents a novel model using ELM in ciphering. The study begins with an investigation of the Real-time Recurrent Neural Network (RRNN) derived from the gradient-based learning for symmetric cipher. The weakness of this cipher is that the error converges to zero, and that the RRNN will not change regardless of how the plaintext is changed. Given the nature of the ELM, a technique with an ELM-based cipher is proposed to provide the capability of performing the training independently from the input and the error gradient. Different simulation scenarios were used to evaluate and validate the effectiveness of the proposed cipher. Results revealed that the ELM-based cipher performed better than RRNNs, especially in terms of security. Moreover, the ELM-based cipher demonstrated significantly competing performance for a wide range of evaluation measures. Using an ELM-based cipher instead of an AES or other type of ciphers has the added advantage of providing an addition level of securityby allowing the user to change the algorithmic core of the cipher by simply changing the weights of the neural network. This allows hardware programmed ciphers to be more secure while costing less compared to other ciphers. Copyright (c) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:5472 / 5489
页数:18
相关论文
共 32 条
[1]   The Multilayer Random Neural Network [J].
Aguilar, Jose ;
Molina, Cristhian .
NEURAL PROCESSING LETTERS, 2013, 37 (02) :111-133
[2]   A practical distinguisher for the Shannon cipher [J].
Ahmadian, Zahra ;
Mohajeri, Javad ;
Salmasizadeh, Mahmoud ;
Hakala, Risto M. ;
Nyberg, Kaisa .
JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (04) :543-547
[3]  
[Anonymous], 2013, Research Developments in Computer Vision and Image Processing: Methodologies and Applications
[4]   On the use of recurrent neural networks to design symmetric ciphers [J].
Arvandi, M. ;
Wu, S. ;
Sadeghian, A. .
IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE, 2008, 3 (02) :42-53
[5]   A novel image encryption/decryption scheme based on chaotic neural networks [J].
Bigdeli, Nooshin ;
Farid, Yousef ;
Afshar, Karim .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2012, 25 (04) :753-765
[6]  
Chen H. -C., 2012, SECURITY COMMUNICATI, V2, P100
[7]   Artificial neural network based chaotic generator for cryptology [J].
Dalkiran, Ilker ;
Danisman, Kenan .
TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2010, 18 (02) :225-240
[8]   FINDING STRUCTURE IN TIME [J].
ELMAN, JL .
COGNITIVE SCIENCE, 1990, 14 (02) :179-211
[9]   Reproducing chaos by variable structure recurrent neural networks [J].
Felix, RA ;
Sanchez, EN ;
Chen, GR .
IEEE TRANSACTIONS ON NEURAL NETWORKS, 2004, 15 (06) :1450-1457
[10]  
He D., 2012, SECURITY COMMUNICATI