2006
DOI: 10.3844/jcssp.2006.710.715
|View full text |Cite
|
Sign up to set email alerts
|

A Backpropagation Neural Network for Computer Network Security

Abstract: Abstract:In this paper, an efficient and scalable technique for computer network security is presented. On one hand, the decryption scheme and the public key creation used in this work are based on a multi-layer neural network that is trained by backpropagation learning algorithm. On the other hand, the encryption scheme and the private key creation process are based on Boolean algebra. This is a new potential source for public key cryptographic schemes which are not based on number theoretic functions and hav… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
46
0
3

Year Published

2011
2011
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 62 publications
(49 citation statements)
references
References 13 publications
0
46
0
3
Order By: Relevance
“…Artificial neural networks(ANN) are mathematical models of complicated biological neural networks.ANN consists of many computation components in parallel.ANN can also be trained, and together with the potential to process vast amount of data in parallel, can be used for many purposes including pattern recognition and economic prediction [3]. Non-linear functions are used in most of the hash function.…”
Section: Artificial Neural Networkmentioning
confidence: 99%
“…Artificial neural networks(ANN) are mathematical models of complicated biological neural networks.ANN consists of many computation components in parallel.ANN can also be trained, and together with the potential to process vast amount of data in parallel, can be used for many purposes including pattern recognition and economic prediction [3]. Non-linear functions are used in most of the hash function.…”
Section: Artificial Neural Networkmentioning
confidence: 99%
“…At the receiver end decryption is achieved using an artificial neural network [3]. The neural network is trained for standard mapping value and the weights and biases are stored before applying input to it.…”
Section: B Decryption Modulementioning
confidence: 99%
“…Artificial Neural networks (ANN) [3] are simplified models of the biological nervous system. An ANN, in general, is a highly interconnected, massively parallel distributed processing network with a large number of processing elements called neurons in an architecture inspired by the brain, which has a natural propensity for storing experimental knowledge and making it available for later use.…”
Section: Artificial Neural Networkmentioning
confidence: 99%
“…The applications of neural networks in areas of cryptography in general are discussed in [1][2][3][4][5][6][7][8].The authors of [9][10] have used both chaos and neural networks in data encryption because of their cipher-suitable properties, such as parametersensitivity, time-varying, random-similarity, etc. Based on chaotic neural networks, a hash function is constructed, which makes use of neural networks' diffusion property and chaos' confusion property.…”
Section: Introductionmentioning
confidence: 99%