2016
DOI: 10.1002/sec.1711
|View full text |Cite
|
Sign up to set email alerts
|

A novel extreme learning machine‐based cryptography system

Abstract: Extreme Learning Machine (ELM) is a well‐known algorithm for the training of neural networks for two modes of functionality: regression and classification. This paper presents a novel model using ELM in ciphering. The study begins with an investigation of the Real‐time Recurrent Neural Network (RRNN) derived from the gradient‐based learning for symmetric cipher. The weakness of this cipher is that the error converges to zero, and that the RRNN will not change regardless of how the plaintext is changed. Given t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“… It is observed that most of the literature uses neural networks, genetic algorithms, and deep learning in cryptography for generating secret keys and/or to perform encryption and decryption.  Neural network is more secure and robust to generate and exchange the key [5,7,8,10].  The cryptosystem produced by machine learning approaches achieves significant security.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“… It is observed that most of the literature uses neural networks, genetic algorithms, and deep learning in cryptography for generating secret keys and/or to perform encryption and decryption.  Neural network is more secure and robust to generate and exchange the key [5,7,8,10].  The cryptosystem produced by machine learning approaches achieves significant security.…”
Section: Discussionmentioning
confidence: 99%
“… Modern cryptographic techniques can be integrated with a neural network if a lossless neural network is achieved [9].  The key length of 64-bit provides high security against brute force attacks [8].…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations