An Efficient Security System Using Neural Networks
Journal Title: International Journal of Engineering and Science Invention - Year 2018, Vol 7, Issue 1
Abstract
Cryptography is a process of protecting information and data from unauthorized access. The goal of any cryptographic system is the access of information among the intended user without any leakage of information to others who may have unauthorized access to it. As technology advances the methods of traditional cryptography becomes more and more complex. There is a high rate of exhaustion of resources while maintaining this type of traditional security systems. Neural Networks provide an alternate way for crafting a security system whose complexity is far less than that of the current cryptographic systems and has been proven to be productive. Both the communicating neural networks receive an identical input vector, generate an output bit and are based on the output bit. The two networks and their weight vectors exhibit novel phenomenon, where the networks synchronize to a state with identical time-dependent weights. Our approach is based on the application of natural noise sources that can include atmospheric noise generating data that we can use to teach our system to approximate the input noise with the aim of generating an output non-linear function. This approach provides the potential for generating an unlimited number of unique Pseudo Random Number Generator (PRNG) that can be used on a one to one basis. We can use the PRNG generated to encrypt the input data and create a cipher text that has a high cryptographic strength.
Authors and Affiliations
Amit Kore, Preeyonuj Boruah, Kartik Damania, Vaidehi Deshmukh, Sneha Jadhav
Degree Equitable Sum Matrix of a Graph
In this paper, we have defined a new graph energy parameter in the field of chemical graph theory and obtained some basic properties.
An Optimized Virtual Machine Migration Algorithm for Energy Efficient Data Centers
The cloud computing technology is becoming scalable and manageable with the effectiveness of virtualization techniques adopted at data centres. The virtualization at data centres is a very mandatory factor for making the...
Iot Design To Support Wireless Sensor Networks And Data Transmission
The purpose of writing this dissertation is to get acquainted with wireless sensor networks. By Wireless Sensor Network (WSN) we mean a set of scattered autonomous sensors with the main goal of monitoring natural or envi...
Development of NaCl Salt as a Reusable Gamma Radiation Dosimeter
NaCl salt is a well-known material that can be used just one time for retrospective dosimetryin radiation accidents. After first time of use, the sensitivity of NaCl drops dramatically and its TL glow curve changes signi...
Analogue Modelling of Diapir Generation
Surface tension supporting deposited sediments is one of the unusual properties of deep hypersaline anoxic basins (DHAB). It has also been proven that the following properties are also true for the water of a DHAB: high...