DocumentCode
2409520
Title
Encryption and Decryption with Space Transformation for Bi-directional Association
Author
Chien-Pen Chuang ; Tin-Ying Huang ; Li-Chi Yeh
Author_Institution
Dept. of Appl. Electron. Technol., Nat. Taiwan Normal Univ., Taipei
Volume
2
fYear
2008
fDate
17-20 Dec. 2008
Firstpage
121
Lastpage
126
Abstract
Most algorithms developed for encryption and decryption on network information security are focused on logic analysis. However, they are complicated to implement as a system and are difficult to be applied in a widespread manner. Recently, biomimetic-based architecture of artificial neural network was proposed to improve the reliability and performance of encryption methods such as back-propagation and overloaded Hopfield neural network. But the limitations of encryption capacity, complexity and data integrity after decryption as well as reliability are still unsolved items. This paper proposes a new algorithm to improve the reliability and efficiency of encryption and decryption with reformed bi-directional association memory (BAM) model to reduce spurious states and data separation caused by former local minima information analysis based on the Hebbian learning rule. The space transformation was used to escape crosstalk and noise vector caused by spurious states, to maintain the completeness of processed information in addition to enhancing its security. A MATLAB simulation model was used to testify the performance of reformed BAM cryptosystem.
Keywords
Hebbian learning; content-addressable storage; cryptography; neural net architecture; BAM cryptosystem; Hebbian learning rule; MATLAB simulation model; backpropagation neural network; bi-directional association memory model; biomimetic-based artificial neural network architecture; data integrity; decryption algorithm; encryption algorithm; local minima information analysis; logic analysis; network information security; overloaded Hopfield neural network; space transformation; Algorithm design and analysis; Artificial neural networks; Bidirectional control; Crosstalk; Cryptography; Information analysis; Information security; Logic; Magnesium compounds; Mathematical model; bi-directional association memory; cryptosystem; information security; neural network; space transformation;
fLanguage
English
Publisher
ieee
Conference_Titel
Embedded and Ubiquitous Computing, 2008. EUC '08. IEEE/IFIP International Conference on
Conference_Location
Shanghai
Print_ISBN
978-0-7695-3492-3
Type
conf
DOI
10.1109/EUC.2008.136
Filename
4755217
Link To Document