• Home
  • Browse
    • Current Issue
    • By Issue
    • By Author
    • By Subject
    • Author Index
    • Keyword Index
  • Journal Info
    • About Journal
    • Aims and Scope
    • Editorial Board
    • Publication Ethics
    • Peer Review Process
  • Guide for Authors
  • Submit Manuscript
  • Contact Us
 
  • Login
  • Register
Home Articles List Article Information
  • Save Records
  • |
  • Printable Version
  • |
  • Recommend
  • |
  • How to cite Export to
    RIS EndNote BibTeX APA MLA Harvard Vancouver
  • |
  • Share Share
    CiteULike Mendeley Facebook Google LinkedIn Twitter
JES. Journal of Engineering Sciences
arrow Articles in Press
arrow Current Issue
Journal Archive
Volume Volume 53 (2025)
Volume Volume 52 (2024)
Volume Volume 51 (2023)
Volume Volume 50 (2022)
Volume Volume 49 (2021)
Volume Volume 48 (2020)
Volume Volume 47 (2019)
Volume Volume 46 (2018)
Volume Volume 45 (2017)
Volume Volume 44 (2016)
Volume Volume 43 (2015)
Volume Volume 42 (2014)
Volume Volume 41 (2013)
Volume Volume 40 (2012)
Volume Volume 39 (2011)
Volume Volume 38 (2010)
Volume Volume 37 (2009)
Volume Volume 36 (2008)
Volume Volume 35 (2007)
Volume Volume 34 (2006)
Issue No 6
Issue No 5
Issue No 4
Issue No 3
Issue No 2
Issue No 1
Adel Abdelwahab, D. (2006). CRYPTOGRAPHY SCHEME BASED ON TRANSPARENT FEEDFORWARD NEURAL NETWORK AND ORDERED LOOKUP TABLE. JES. Journal of Engineering Sciences, 34(No 1), 189-197. doi: 10.21608/jesaun.2006.110105
Dr. Ahmed Adel Abdelwahab. "CRYPTOGRAPHY SCHEME BASED ON TRANSPARENT FEEDFORWARD NEURAL NETWORK AND ORDERED LOOKUP TABLE". JES. Journal of Engineering Sciences, 34, No 1, 2006, 189-197. doi: 10.21608/jesaun.2006.110105
Adel Abdelwahab, D. (2006). 'CRYPTOGRAPHY SCHEME BASED ON TRANSPARENT FEEDFORWARD NEURAL NETWORK AND ORDERED LOOKUP TABLE', JES. Journal of Engineering Sciences, 34(No 1), pp. 189-197. doi: 10.21608/jesaun.2006.110105
Adel Abdelwahab, D. CRYPTOGRAPHY SCHEME BASED ON TRANSPARENT FEEDFORWARD NEURAL NETWORK AND ORDERED LOOKUP TABLE. JES. Journal of Engineering Sciences, 2006; 34(No 1): 189-197. doi: 10.21608/jesaun.2006.110105

CRYPTOGRAPHY SCHEME BASED ON TRANSPARENT FEEDFORWARD NEURAL NETWORK AND ORDERED LOOKUP TABLE

Article 12, Volume 34, No 1, January and February 2006, Page 189-197  XML PDF (156.37 K)
Document Type: Research Paper
DOI: 10.21608/jesaun.2006.110105
View on SCiNiTO View on SCiNiTO
Author
Dr. Ahmed Adel Abdelwahab email
Department of Electronics, Communications and Computer Engineering, Faculty of Engineering, Helwan University, Helwan, Cairo, Egypt.
Abstract
A single hidden layer feedforward neural network (FFNN) is called a transparent FFNN if its output vector is a reproduction of the input vector. In this case, the input vector is the target output vector. Once the transparent FFNN is well designed with the m-bit plaintext input set, the designed network is divided into two parts: the transmitter private network encrypting part and the receiver public network decrypting part. The hidden vector which is the output real vector of the private network part is transmitted using the decimal-value ordered lookup table (DVOLT). The m-bit binary cipher vector is the chosen binary index of the lookup table. In this paper, the binary plaintext vector size (m) is chosen to be 16 bits (two bytes). Computer simulation shows that both operations of encryption or decryption of all possible plaintext of 65536 (216) vectors can be done with zero error and an average processing time of 8.3 msec per 16-bit vector (4.15 msec / byte) per operation. The average hamming distance between the binary plaintext and the binary ciphertext is calculated as 7.8798 for all possible plaintext of 65536 16-bit vectors. This scheme can't be attacked by either brute force or cryptanalysis since there are no binary keys or known mathematical structures. The most important part which must be kept secret is the private matrix of the transmitter private network encrypting part. Each of the private encrypting key and the public decrypting key needs a memory size of about 8.5 Mbytes. The large size of both the private and public keys may limit the applications of the proposed scheme to large workstations intercommunications. This proposed cryptography scheme provides sender authentication and also receiver confidentiality.
Keywords
Cryptography; neural network based cryptography; transparent neural network; and decimal-value ordered lookup table
Main Subjects
Electrical Engineering, Computer Engineering and Electrical power and machines engineering.
Statistics
Article View: 103
PDF Download: 314
Home | Glossary | News | Aims and Scope | Sitemap
Top Top

Journal Management System. Designed by NotionWave.