Encryption technique based on fuzzy neural network hiding module and effective distortion method

Neural Computing and Applications(2022)

引用 2|浏览1
暂无评分
摘要
Underrating the evergrowing effectiveness of cryptanalysis tools is likely to be a big mistake. Although available protection techniques are effective and may dissipate our worries about information safety, we should not ignore the formidable advancements in hacking tools. Such advancements are likely to soon challenge our protection techniques. Unfortunately, although this challenge is probable, there is not much advancement in the way the protection tools function. Encryption techniques still use roughly the same computation principles and the same level of dependency on the encryption key. This paper goes beyond these encryption techniques and proffers an encryption technique with a new computation model. This model uses a fuzzy neural network to generate highly complicated hiding codes from the encryption key. The computation model uses also substitution and distortion methods that depend on plaintext and chaotic noises to induce enormous confusion in the ciphertext. This combination along with other confusion boosting actions such as interval scattering and chaotic locking establishes a very effective encryption technique. Experiments on the proof-of-concept prototype showed that the output (ciphertext) of the proposed technique passed rigorous randomness tests.
更多
查看译文
关键词
Encryption,Key-based induced dynamics,Neural network,Fuzzy behavior,Distortion techniques,Dynamic symbol coding,Chaotic systems
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要