SlideShare una empresa de Scribd logo
1 de 11
Descargar para leer sin conexión
International Journal of Computational Science and Information Technology (IJCSITY) Vol.1, No.4, November 2013

NEURO GENETIC KEY BASED RECURSIVE
MODULO-2 SUBSTITUTION USING MUTATED
CHARACTER FOR ONLINE WIRELESS
COMMUNICATION (NGKRMSMC)
Arindam Sarkar and J. K. Mandal
Department of Computer Science & Engineering, University of Kalyani, W.B, India

ABSTRACT
In this paper, a neural genetic key based technique for encryption (NGKRMSMC) has been proposed
through recursive modulo-2 substitution using mutated character code generation for online wireless
communication of data/information. Both sender and receiver get synchronized based on their final output.
The length of the key depends on the number of input and output neurons. Coordinated matching weight
vectors assist to generate chromosomes pool. Genetic secret key is obtained using fitness function, which is
the hamming distance between two chromosomes. Crossover and mutation are used to add elitism of
chromosomes. At first mutated character code table based encryption strategy get perform on plain text. .
Then the intermediate cipher text is yet again encrypted through recursive positional modulo-2 substitution
technique to from next level encrypted text. This 2nd level intermediate cipher text is again encrypted to
form the final cipher text through chaining and cascaded xoring of neuro genetic key with the identical
length intermediate cipher text block. Receiver will perform same symmetric operation to get back the plain
text using identical key.

KEYWORDS
Neuro Genetic Key based base Recursive Modulo-2 Substitution using Mutated Character (NGKRMSMC),
weight vector, input vector, chaining, neuro genetic key.

1. INTRODUCTION
In cryptography there are wide variety of techniques are available with some pros and cons to
protect data [1]-[3], [7]. These algorithms have their merits and shortcomings. For Example in
DES, AES algorithms [9] the cipher block length is nonflexible. ANNRPMS [1] and ANNRBLC
[2] allow only one cipher block encoding. In this paper a neural training based genetic algorithm
guided online encryption technique for wireless communicationhas been proposed.
The organization of this paper is as follows. Section 2 of the paper deals with the proposed neuro
synchronization and genetic key generation technique and also random block length based
cryptographic techniques using mutated character code generation. Session key based technique
has been discussed in section 3. Example of recursive modulo-2 technique is given in section 4.
Complexity of the algorithm has been presented in section 5. Results are described in section 6.
Conclusions are presented in section 7 and references at end.

DOI : 10.5121/ijcsity.2014.1404

49
International Journal of Computational Science and Information Technology (IJCSITY) Vol.1, No.4, November 2013

2. THE NGKRMSMC TECHNIQUE
In proposed technique mutated character code table and recursive positional modulo-2
substitution algorithm is used to encrypt the plain text. This intermediate cipher text is again
encrypted to form the final cipher text using chaining of cascaded xoring of the neuro genetic
secret key. Using identical weight vector receiver performs deciphering process to regenerate the
plain text.

2.1 Neural synchronization scheme & secret key generation
At the beginning of the transmission, a neural network based secret key generation is
performed between receiver and sender. The same may be done through the private channel also
or it may be done in some other time, which is absolutely free from encryption. Fig. 1. shows the
tree based generation process using arbitrary number of nodes (neurons). Corresponding
algorithm and genetic key generation is given in two-sub section 1 and.2.

Figure1 A tree parity machine with K=3 and N=4

Neural synchronization algorithm
Input: - Random weights, input vectors for both neural networks
Output: - Session key .
Method: - Each party (A and B) uses its own (same) tree parity machine. Neural network
parameters: K, N, L values will be identical for both parties and synchronization of the
tree parity machines is achieved.
Parameters:
K - The number of hidden neurons.
N - The number of input neurons connected to each hidden neuron, total (K*N) input neurons.
L - The maximum value for weight {-L..+L}
Step 1. Initialize random weight values.
Step 2. Repeat step 3 to 6 until both sender and receiver get synchronized.
Step 3. Produce random input vector X. Inputs are generated by a third party (say the server) or
one of the communicating parties (figure. 2)

50
International Journal of Computational Science and Information Technology (IJCSITY) Vol.1, No.4, November 2013

Figure 2 Neural network for machine A and machine B with K=4 & N=2

Step 4. Compute the values of the hidden neurons

 1 if x  0,
 N


 i  sgn   wij xij  sgn x   0 if x  0,


 j 1

1 if x  0.

(1)
Step 5. Compute the value of the output neuron

 

K



N

 sgn   w

i 1



j 1

ij


xij 



(2)
Step 6. Compare the output values of both tree parity machines by exchanging between the
networks. If Output (A) ≠ Output (B) then go to step 3 else if Output (A) = Output (B) then
Update the weights. In this paper we have used hebbian-learning rule for synchronization
(eq. 3).



w i  wi   i xi  i   A
 

B



(3)

In each step there may be three possibilities:
1. Output (A) ≠ Output (B): None of the parties updates its weights.
2. Output (A) = Output (B) = Output (E): All the three parties update weights.
3. Output (A) = Output (B) ≠ Output (E): Parties A and B update their weights, but the attacker
cannot do that as the synchronization of two parties are faster than learning of an attacker.
Complexity: O(N) computational steps are required to generate a key of length N. The average
synchronization time up to N=1000 asymptotically one expects an increase of O (log N).

3 SESSION KEY GENERATION USING GENETIC ALGORITHM
The method considered indistinguishable matched neural weight vector from the first segment in
the form of blocks of bits with dissimilar size like 8/16/32/64/128/256 to generate the dynamic
chromosomes pool. If neural key is exhausted from the formation of pool at some stage, the key
can be circular right shifted by multiple of 8 bits to generate new key stream.
Step 1. Initially, 200 chromosomes are considered as seeds (every chromosomes has number of
bits identical to 8/16/32/64/128/256 bit) from dynamic pool. Parameters of the genetic algorithm
used are: population size = 200, Crossover probability(CP) = 0.6-0.9 and Mutation
probability(MP) =0.001
Step 2. Hamming distance function is used as a fitness function to evaluate the chromosomes to
get the best individuals for forming the key.

51
International Journal of Computational Science and Information Technology (IJCSITY) Vol.1, No.4, November 2013

Step 3. Perform one-point crossover, where a crossover point on the chromosome are elected
randomly, and two parent individuals are interchanged at these points.
Step 4. Mutation is performed by bit flipping.
Step 5. Genetic processing is continued until the optimized key (the master key) is obtained.

3.1 Character Code Table Generation
For the plain text “tree” Fig 3 shows corresponding tree representation of probability of
occurrence of each character in the plain text. Character „t‟ and „r‟ occur once and character „e‟
occurs twice. Preorder traversal get used to find out the character code. Character values are
extracted from the decimal representation of character code. Left branch is coded as „0‟ and that
of right branch „1‟. Table 1 tabulated the code and value of a particular character in the plain text.
Mutated tree is generated using mutation. Fig 4, 5 and 6 are the mutated trees. After mutation new
code values as obtained are tabulated in table 2. Tree having n-1 intermediate nodes can generate
2n-1 mutated trees.
4

0
2

e

4

1
2

0

1

1

e

1

0

2

2

1

1

t

1

r

r

Figure4 Mutated at Position 1,2 & 3,4

4

4

0
2

1

1
2

1

0

1

t

1

t

Figure3 Character Code Tree

e

0

e

0

2

2

0

r

Figure5 Mutated at Position 3,4

1
1

1

t

1

r

Figure6 Mutated at Position 1,2

52
International Journal of Computational Science and Information Technology (IJCSITY) Vol.1, No.4, November 2013

Table 1. Code table

Character of plain text

Code

t

10

Value of that
Character
2

r

11

3

e

0

0

Table 2. Mutated Code Table

Character

Code

Value

Code

Value

Code

Value

t

01

1

r

00

0

11
10

3
2

00
01

0
1

e

1

2

0

0

1

2

4 RECURSIVE MODULO-2 ENCRYPTION TECHNIQUE
Now, plain text characters are already converted into the mutated code using the mutated code
table. Then it is divided into blocks. The decimal equivalent of the block of bits under
consideration is one integral value from which the recursive modulo-2 operation starts. The
modulo-2 operation is performed to check whether integral value is even or odd and the position
of that integral value in the series of natural even or odd numbers is evaluated. Process is carried
out Recursively to a finite number of times, which is exactly the length of the source block. After
each modulo-2 operation, 0 or 1 is pushed to the output stream in MSB-to-LSB order; depending
on the fact whether the integral value is even or odd. In this way intermediate encrypted text is
generated.

Set: P = 0.
LOOP:
Evaluate: Temp = Remainder of DL-P / 2.
If Temp = 0
Evaluate: DL-P-1 = DL-P / 2.
Set: tP = 0.
Else If Temp = 1
Evaluate: DL-P-1 = (DL-P + 1) / 2.
Set: tP = 1.
Set: P = P + 1.
If (P > (L – 1))
Exit.
END LOOP

Figure7 Algorithm for Recursive Modulo-2 encryption technique.

Thus overall complexity of encryption algorithm is O(L).The key is padded with the recursive
modulo-2 encrypted text block to form the 2nd level intermediate cipher block. Then the neuro
genetic secret key is use to xored with the same length first 2nd level intermediate cipher text
block to produce the first final cipher block (neuro genetic secret key XOR with same length
cipher text). This newly generated block again xored with the immediate next block and so on.
53
International Journal of Computational Science and Information Technology (IJCSITY) Vol.1, No.4, November 2013

This chaining of cascaded xoring mechanism is performed until all the blocks get exhausted. If
the last block size of intermediate cipher text is less than the require xoring block size (i.e. neuro
genetic vector size) then this block is kept unchanged.

Recursive Modulo-2 Decryption Technique
During decryption the encrypted message is xored with the neuro genetic key to extract the
intermediate encrypted stream. Then the intermediate encrypted stream is decomposed into a set
of blocks, each consisting of a fixed number of bits using same rule of encryption. Then perform
the recursive modulo-2 decryption operation. Finally, character code value is decrypted using
character code table to get the plain text. Complexity of this decryption algorithm is also O(L).
Set: P = L – 1 and T = 1.
LOOP:
If tP = 0
Evaluate: T = Tth even number in the series of natural
numbers.
Else If tP = 1
Evaluate: T = Tth odd number in the series of natural
numbers.
Set: P = P – 1.
If P < 0
Exit.
END LOOP
Evaluate: S = s0 s1 s2 s3 s4 … sL-1, which is the binary equivalent of T

Figure 8 Algorithm for Recursive Modulo-2 decryption technique.

Example of Recursive Modulo-2 Operation
Consider a separate plaintext (P) as: “Local Area Network”.

The Process of Recursive Modulo-2 Encryption
To generate the source stream of bits, we take the reference of Table 3.
Table 3. Character-to-Byte Conversion for the Text “Local Area Network”

54
International Journal of Computational Science and Information Technology (IJCSITY) Vol.1, No.4, November 2013

Message stream of bits S is:
S=01001100/01101111/01100011/01100001/01101100/00100000/01000001/01110010/0110010
1/01100001/00100000/01001110/01100101/01110100/01110111/01101111/01110010/01101011.
Decompose S into a set of 5 blocks, each of the first four being of size 32 bits and the last one
being of 16 bits. During this process of decomposition, we scan S along the MSB-to-LSB
direction. Thus we obtain
S1=01001100011011110110001101100001,
S2=01101100001000000100000101110010,
S3=01100101011000010010000001001110,
S4=01100101011101000111011101101111,
S5=0111001001101011. For the block S1, corresponding to which the decimal value is
(1282368353)10, the process of encryption is shown below:
1282368353  6411841771  3205920891  1602960451  801480231  400740121 
200370060  1000185030  50092521  25046260  12523130  6261571  3130791 
1565401  787200  391350  195681  97840  48920  24460  12230  6121  3060 
1530  771  391  201  100  50  31  21  10  11. From this we generate the target
block T1 corresponding to S1 as: T1=11111001001110010000100111001101.
Applying the similar process, we generate target blocks T 1, T2, T3, T4 and T5 corresponding to
source blocks S1, S2, S3, S4 and S5 respectively.
T2=01110001011111011111101111001001
T3=01001101111110110111100101011001
T4=10001001000100011101000101011001
T5=1110100110110001.
Now, combining target blocks in the same sequence, we get the target stream of bits T as the
following:
T=11111001/00111001/00001001/11001101/01110001/01111101/11111011/11001001/0100110
1/11111011/01111001/01011001/10001001/00010001/11010001/01011001/11101001/10110001.
After padding the key with the above intermediate cipher text and xoring with the neural secret
key, final encrypted cipher text is generated. This stream of bits, in the form of a stream of
characters, is transmitted as the encrypted message.

The Process of Recursive Modulo-2 Decryption
At the destination end, receiver‟s secret neural key is used to xoring the cipher text to get back the
key and intermediate cipher text. Using secret key, the receiver gets the information on different
block lengths. Using that secret key, all the blocks T1, T2, T3, T4 and T5 are formed as follows:
T1=11111001001110010000100111001101
T2=01110001011111011111101111001001
T3=01001101111110110111100101011001
T4=10001001000100011101000101011001
T5=1110100110110001.
Apply the process of decryption to generate source blocks Si for all Ti, 1 ≤ i ≤5. 32-bit stream is
regenerated S1=01001100011011110110001101100001.”

55
International Journal of Computational Science and Information Technology (IJCSITY) Vol.1, No.4, November 2013

All the source blocks of bits are regenerated and combining those blocks in the same sequence,
the source stream of bits obtained to get the source message or the plaintext.

5 RESULTS
Results are presented in terms of encryption decryption time, Chi-Square test, source file size vs.
encryption time along with source file size vs. encrypted file size. The results are also compared
with existing RSA technique.
Table 4. Encryption / decryption time vs. File size

Encryption Time (s)

Decryption Time (s)

Source
(bytes)
18432

NGKRMSMC

ANNRPMS

NGKRMSMC

ANNRPMS

5. 32

Encrypted
(bytes)
18432

5. 98

5.52

4.85

23044
35425
36242
59398

8.04
14.59
15.17
23.02

7. 37
13. 98
14. 53
22. 39

23040
35425
36242
59398

7.63
14.08
14.70
22.51

6.96
13. 37
14. 01
21. 88

Encryption & decryption time

Table 4 shows encryption and decryption time with respect to the source and encrypted size
respectively.

Source size

Figure9 Source size vs. encryption time & decryption time

Encryption /decryption time is marginally high because of incorporation of genetic technique and
mutated character coding.
Table 5 shows Chi-Square value for different source stream size on applying various encryption
algorithms. It is seen that the Chi-Square value of NGKRMSMCC is better compared to the
RBCMPCC algorithm and comparable with values of the RSA technique.

56
International Journal of Computational Science and Information Technology (IJCSITY) Vol.1, No.4, November 2013

Table 5. Source size vs. Chi-Square value

Stream
Size
(bytes)
1500
2500
3000
3250
3500

Chi-Square
value
(TDES)
1228.5803
2948.2285
3679.0432
4228.2119
4242.9165

Chi-Square value
Proposed
NGKRMS MCC
2465.0749
5643.5271
6759.2956
6997.6173
10572.7263

Chi-Square
value
(RBCM
CPCC)
2464.0324
5642.5835
6714.6741
6994.6189
10570.4671

Chi-Square
value
(RSA)
5623.14
22638.99
12800.355
15097.77
15284.728

Figure 10 shows graphical representation of table 5.

Figure10 Source size vs. Chi-Square value

6 COMPLEXITY OF THE TECHNIQUE
The complexity of the technique will be O (L), which can be computed using following three
steps.
Step 1: To generate a key of length N needs O (N) Computational steps. The average
synchronization time is independent of the size N of the networks (up to N=1000). The
complexity of synchronization is O (log N).
Step 2: Complexity of the encryption technique is O (L).
Step 2.1: Corresponding to the source block S = s0 s1 s2 s3 s4… sL-1, evaluate the equivalent
decimal integer, DL. It takes O (L) amount of time.
Step 2.2: Step 3 and step 4 executed exactly L number of times for the values of the
variable P ranging from 0 to (L-1) increasing by 1 after each execution of the loop where
the complexity is O (L) as L no. of iterations are needed.
Step 2.3: Apply modulo-2 operation on DL-P to check if DL-P is even or odd, takes constant
amount of time i.e. O(1).
Step 2.4: If DL-P is found to be even, compute DL-P-1 = DL-P / 2, where DL-P-1 is its position in
the series of natural even numbers. Assign tP = 0. If DL-P is found to be odd, compute DL-P-1
= (DL-P + 1) / 2, where DL-P-1 is its position in the series of natural odd numbers. Assign tP=1
which generates the complexity as O (1).
Step 2.5: evaluate: DL, the decimal equivalent, corresponding to the source block S = s0 s1
s2 s3 s4 … sL-1 which takes O (L) amount of time.

57
International Journal of Computational Science and Information Technology (IJCSITY) Vol.1, No.4, November 2013

Step 3: Complexity of the decryption technique is O (L).
Step 3.1: Set P=L-1and T=1.So time complexity of assignments is O (1).
Step 3.2: Complexity of loop is O (L) because L iterations are needed.
Step 3.3: If tP = 0,T = Tth even number in the series of natural even numbers. If tP = 1,T =
Tth odd number in the series of natural even numbers. Complexity is O (1) as it takes
constant amount of times.
Step 3.4: Set P=P-1. This step takes constant amount of time i.e. O(1).
Step 3.5: Complexity to convert T into the corresponding stream of bits S = s0 s1 s2 s3
s4…sL-1, which is the source block is O(L) as this step also takes constant amount of time
for merging s0 s1 s2 s3 s4…sL-1 .
So, overall time complexity of the entire technique is O(L).

7 CONCLUSION
The paper presents a novel approach for generation of secret key using neural synchronization.
This proposed technique allows key exchange through public channel. So likelihood of attack of
the technique is much less than the simple RBCMCCC [4]algorithm.

ACKNOWLEDGEMENTS
The author expresses deep sense of gratitude to the DST, Govt. of India, for financial assistance
through INSPIRE Fellowship leading for a PhD work under which this work has been carried out.

REFERENCES
[1]

[2]

[3]

[4]

[5]
[6]
[7]
[8]
[9]

Mandal, J. K., Sarkar Arindam, “An Adaptive Neural Network Guided Secret Key Based Encryption
Through Recursive Positional Modulo-2 Substitution For Online Wireless Communication
(ANNRPMS)”, in Proc. International Conference on Recent Trends In Information Technology
(ICRTIT 2011) Conf. BY IEEE, 3-5 June 2011, Madras Institute of Technology, Anna University,
Chennai, Tamil Nadu, India. 978-1-4577-0590-8/11
Mandal, J. K., Sarkar Arindam, “An Adaptive Neural Network Guided Random Block Length Based
Cryptosystem (ANNRBLC)”, in Proc. 2nd International Conference On Wireless Communications,
Vehicular Technology, Information Theory And Aerospace & Electronic System Technology”
(Wireless Vitae 2011) Conf By IEEE Societies, February 28, 2011- March 03, 2011,Chennai, Tamil
Nadu, India. ISBN 978-87-92329-61-5.
Mandal, J. K., Sarkar Arindam “Neural Network Guided Secret Key based Encryption through
Cascading Chaining of Recursive Positional Substitution of Prime Non-Prime (NNSKECC)” [TP48][PID-63], in Proc. of International Confrence of Computing and Systems-2010 Conf by ICCS-2010,
Novembar 19-20, 2010, The University of Burdwan,pp 291-297.
Jayanta Kumar Pal, J. K. Mandal “A Random Block Length Based Cryptosystem through Multiple
Cascaded Permutation Combinations and Chaining of Blocks” in Proc. Fourth International
Conference on Industrial and Information Systems, ICIIS 2009 Conf, 28 – 31December2009,
SriLanka.
T. Godhavari, N. R. Alainelu and R. Soundararajan “Cryptography Using Neural Network “in Proc.by
Conf IEEE Indicon 2005, Chennai, India, 11-13 Dec. 2005.ggggjgggggggggggg
Wolfgang Kinzel and ldo Kanter, "Interacting neural networks and cryptography", Advances in Solid
State Physics, Ed. by B. Kramer (Springer, Berlin. 2002), Vol. 42, p. 383 arXiv- cond-mat/0203011.
Dong Hu "A new service based computing security model with neural cryptography"IEEE07/2009.J
J. K. Mandal, et al, “A 256-bit Recursive Pair Parity Encoder for Encryption”, in Proc Advances in
Modeling, D; Computer Science & Statistics (AMSE), Conf vol. 9, No. 1, pp. 1-14, France, 2004.
Atul Kahate, Cryptography and Network Security, 2003, Tata McGraw-Hill publishing Company
Limited, Eighth reprint 2006.
58
International Journal of Computational Science and Information Technology (IJCSITY) Vol.1, No.4, November 2013

Author
Arindam Sarkar
INSPIRE FELLOW (DST, Govt. of India), MCA (VISVA BHARATI, Santiniketan,
University First Class First Rank Holder), M.Tech (CSE, K.U, University First Class First
Rank Holder). Total number of publications 25.
Jyotsna Kumar Mandal
M. Tech.(Computer Science, University of Calcutta), Ph.D.(Engg., Jadavpur University) in
the field of Data Compression and Error Correction Techniques, Professor in Computer
Science and Engineering, University of Kalyani, India. Life Member of Computer Society of
India since 1992 and life member of cryptology Research Society of India. Dean Faculty of
Engineering, Technology & Management, working in the field of Network Security,
Steganography, Remote Sensing & GIS Application, Image Processing. 25 years of teaching
and research experiences. Eight Scholars awarded Ph.D. and 8 are pursuing. Total number
of publications 267.

59

Más contenido relacionado

La actualidad más candente

Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...zaidinvisible
 
Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...
Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...
Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...ijcisjournal
 
A probabilistic data encryption scheme (pdes)
A probabilistic data encryption scheme (pdes)A probabilistic data encryption scheme (pdes)
A probabilistic data encryption scheme (pdes)Alexander Decker
 
A new dna based approach of generating key dependent shift rows transformation
A new dna based approach of generating key dependent shift rows transformationA new dna based approach of generating key dependent shift rows transformation
A new dna based approach of generating key dependent shift rows transformationIJNSA Journal
 
DESIGN AND IMPLEMENTATION OF BINARY NEURAL NETWORK LEARNING WITH FUZZY CLUSTE...
DESIGN AND IMPLEMENTATION OF BINARY NEURAL NETWORK LEARNING WITH FUZZY CLUSTE...DESIGN AND IMPLEMENTATION OF BINARY NEURAL NETWORK LEARNING WITH FUZZY CLUSTE...
DESIGN AND IMPLEMENTATION OF BINARY NEURAL NETWORK LEARNING WITH FUZZY CLUSTE...cscpconf
 
A hybrid genetic algorithm and chaotic function model for image encryption
A hybrid genetic algorithm and chaotic function model for image encryptionA hybrid genetic algorithm and chaotic function model for image encryption
A hybrid genetic algorithm and chaotic function model for image encryptionsadique_ghitm
 
Applying Deep Learning Machine Translation to Language Services
Applying Deep Learning Machine Translation to Language ServicesApplying Deep Learning Machine Translation to Language Services
Applying Deep Learning Machine Translation to Language ServicesYannis Flet-Berliac
 
An Efficient Interpolation-Based Chase BCH Decoder
An Efficient Interpolation-Based Chase BCH DecoderAn Efficient Interpolation-Based Chase BCH Decoder
An Efficient Interpolation-Based Chase BCH Decoderijsrd.com
 
Digital Watermarking through Embedding of Encrypted and Arithmetically Compre...
Digital Watermarking through Embedding of Encrypted and Arithmetically Compre...Digital Watermarking through Embedding of Encrypted and Arithmetically Compre...
Digital Watermarking through Embedding of Encrypted and Arithmetically Compre...IJNSA Journal
 
3 mathematical priliminaries DATA compression
3 mathematical priliminaries DATA compression3 mathematical priliminaries DATA compression
3 mathematical priliminaries DATA compressionShubham Jain
 
A New Classifier Based onRecurrent Neural Network Using Multiple Binary-Outpu...
A New Classifier Based onRecurrent Neural Network Using Multiple Binary-Outpu...A New Classifier Based onRecurrent Neural Network Using Multiple Binary-Outpu...
A New Classifier Based onRecurrent Neural Network Using Multiple Binary-Outpu...iosrjce
 
ALGEBRAIC DEGREE ESTIMATION OF BLOCK CIPHERS USING RANDOMIZED ALGORITHM; UPPE...
ALGEBRAIC DEGREE ESTIMATION OF BLOCK CIPHERS USING RANDOMIZED ALGORITHM; UPPE...ALGEBRAIC DEGREE ESTIMATION OF BLOCK CIPHERS USING RANDOMIZED ALGORITHM; UPPE...
ALGEBRAIC DEGREE ESTIMATION OF BLOCK CIPHERS USING RANDOMIZED ALGORITHM; UPPE...ijcisjournal
 
NEW SYMMETRIC ENCRYPTION SYSTEM BASED ON EVOLUTIONARY ALGORITHM
NEW SYMMETRIC ENCRYPTION SYSTEM BASED ON EVOLUTIONARY ALGORITHMNEW SYMMETRIC ENCRYPTION SYSTEM BASED ON EVOLUTIONARY ALGORITHM
NEW SYMMETRIC ENCRYPTION SYSTEM BASED ON EVOLUTIONARY ALGORITHMijcsit
 
New binary memristor crossbar architecture based neural networks for speech r...
New binary memristor crossbar architecture based neural networks for speech r...New binary memristor crossbar architecture based neural networks for speech r...
New binary memristor crossbar architecture based neural networks for speech r...inventionjournals
 
Lecture Notes: EEEC6440315 Communication Systems - Information Theory
Lecture Notes:  EEEC6440315 Communication Systems - Information TheoryLecture Notes:  EEEC6440315 Communication Systems - Information Theory
Lecture Notes: EEEC6440315 Communication Systems - Information TheoryAIMST University
 
Stegnography of high embedding efficiency by using an extended matrix encodin...
Stegnography of high embedding efficiency by using an extended matrix encodin...Stegnography of high embedding efficiency by using an extended matrix encodin...
Stegnography of high embedding efficiency by using an extended matrix encodin...eSAT Publishing House
 

La actualidad más candente (19)

Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...
 
Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...
Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...
Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...
 
Image Compression, Introduction Data Compression/ Data compression, modelling...
Image Compression, Introduction Data Compression/ Data compression, modelling...Image Compression, Introduction Data Compression/ Data compression, modelling...
Image Compression, Introduction Data Compression/ Data compression, modelling...
 
A probabilistic data encryption scheme (pdes)
A probabilistic data encryption scheme (pdes)A probabilistic data encryption scheme (pdes)
A probabilistic data encryption scheme (pdes)
 
A new dna based approach of generating key dependent shift rows transformation
A new dna based approach of generating key dependent shift rows transformationA new dna based approach of generating key dependent shift rows transformation
A new dna based approach of generating key dependent shift rows transformation
 
DESIGN AND IMPLEMENTATION OF BINARY NEURAL NETWORK LEARNING WITH FUZZY CLUSTE...
DESIGN AND IMPLEMENTATION OF BINARY NEURAL NETWORK LEARNING WITH FUZZY CLUSTE...DESIGN AND IMPLEMENTATION OF BINARY NEURAL NETWORK LEARNING WITH FUZZY CLUSTE...
DESIGN AND IMPLEMENTATION OF BINARY NEURAL NETWORK LEARNING WITH FUZZY CLUSTE...
 
Bh36352357
Bh36352357Bh36352357
Bh36352357
 
A hybrid genetic algorithm and chaotic function model for image encryption
A hybrid genetic algorithm and chaotic function model for image encryptionA hybrid genetic algorithm and chaotic function model for image encryption
A hybrid genetic algorithm and chaotic function model for image encryption
 
Applying Deep Learning Machine Translation to Language Services
Applying Deep Learning Machine Translation to Language ServicesApplying Deep Learning Machine Translation to Language Services
Applying Deep Learning Machine Translation to Language Services
 
Unit 3
Unit 3Unit 3
Unit 3
 
An Efficient Interpolation-Based Chase BCH Decoder
An Efficient Interpolation-Based Chase BCH DecoderAn Efficient Interpolation-Based Chase BCH Decoder
An Efficient Interpolation-Based Chase BCH Decoder
 
Digital Watermarking through Embedding of Encrypted and Arithmetically Compre...
Digital Watermarking through Embedding of Encrypted and Arithmetically Compre...Digital Watermarking through Embedding of Encrypted and Arithmetically Compre...
Digital Watermarking through Embedding of Encrypted and Arithmetically Compre...
 
3 mathematical priliminaries DATA compression
3 mathematical priliminaries DATA compression3 mathematical priliminaries DATA compression
3 mathematical priliminaries DATA compression
 
A New Classifier Based onRecurrent Neural Network Using Multiple Binary-Outpu...
A New Classifier Based onRecurrent Neural Network Using Multiple Binary-Outpu...A New Classifier Based onRecurrent Neural Network Using Multiple Binary-Outpu...
A New Classifier Based onRecurrent Neural Network Using Multiple Binary-Outpu...
 
ALGEBRAIC DEGREE ESTIMATION OF BLOCK CIPHERS USING RANDOMIZED ALGORITHM; UPPE...
ALGEBRAIC DEGREE ESTIMATION OF BLOCK CIPHERS USING RANDOMIZED ALGORITHM; UPPE...ALGEBRAIC DEGREE ESTIMATION OF BLOCK CIPHERS USING RANDOMIZED ALGORITHM; UPPE...
ALGEBRAIC DEGREE ESTIMATION OF BLOCK CIPHERS USING RANDOMIZED ALGORITHM; UPPE...
 
NEW SYMMETRIC ENCRYPTION SYSTEM BASED ON EVOLUTIONARY ALGORITHM
NEW SYMMETRIC ENCRYPTION SYSTEM BASED ON EVOLUTIONARY ALGORITHMNEW SYMMETRIC ENCRYPTION SYSTEM BASED ON EVOLUTIONARY ALGORITHM
NEW SYMMETRIC ENCRYPTION SYSTEM BASED ON EVOLUTIONARY ALGORITHM
 
New binary memristor crossbar architecture based neural networks for speech r...
New binary memristor crossbar architecture based neural networks for speech r...New binary memristor crossbar architecture based neural networks for speech r...
New binary memristor crossbar architecture based neural networks for speech r...
 
Lecture Notes: EEEC6440315 Communication Systems - Information Theory
Lecture Notes:  EEEC6440315 Communication Systems - Information TheoryLecture Notes:  EEEC6440315 Communication Systems - Information Theory
Lecture Notes: EEEC6440315 Communication Systems - Information Theory
 
Stegnography of high embedding efficiency by using an extended matrix encodin...
Stegnography of high embedding efficiency by using an extended matrix encodin...Stegnography of high embedding efficiency by using an extended matrix encodin...
Stegnography of high embedding efficiency by using an extended matrix encodin...
 

Destacado

TeachMeetNZ - Engage students and make a difference - 8 June 2013
TeachMeetNZ - Engage students and make a difference - 8 June 2013TeachMeetNZ - Engage students and make a difference - 8 June 2013
TeachMeetNZ - Engage students and make a difference - 8 June 20131MvdS
 
37번 여의주 예방논문2 발표
37번 여의주 예방논문2 발표37번 여의주 예방논문2 발표
37번 여의주 예방논문2 발표Benedict Choi
 
Education from a (relatively) mature perspective
Education from a (relatively) mature perspectiveEducation from a (relatively) mature perspective
Education from a (relatively) mature perspectivekathyscott25
 
Unidad 2 Introducción al diseño de los lenguajes de programacion
Unidad 2 Introducción al diseño de los lenguajes de programacionUnidad 2 Introducción al diseño de los lenguajes de programacion
Unidad 2 Introducción al diseño de los lenguajes de programacionLilia Velasco
 
Diseño y construcción de una máquina serigráfica automatizada
Diseño y construcción de una máquina serigráfica automatizadaDiseño y construcción de una máquina serigráfica automatizada
Diseño y construcción de una máquina serigráfica automatizadaRaúl Cordova
 
Blogging - February 2014
Blogging - February 2014Blogging - February 2014
Blogging - February 20141MvdS
 
61번 최석우 예방논문2 발표
61번 최석우 예방논문2 발표61번 최석우 예방논문2 발표
61번 최석우 예방논문2 발표Benedict Choi
 
Analisi delle vendite2
Analisi delle vendite2Analisi delle vendite2
Analisi delle vendite2Ghekose
 
Why do I do what I do?
Why do I do what I do?Why do I do what I do?
Why do I do what I do?1MvdS
 
38번 유고은 예방논문1 발표
38번 유고은 예방논문1 발표38번 유고은 예방논문1 발표
38번 유고은 예방논문1 발표Benedict Choi
 
Encuesta en la ciudad de Chancay
Encuesta en la ciudad de ChancayEncuesta en la ciudad de Chancay
Encuesta en la ciudad de ChancayPedro Natividad H
 
Het verhaal achter ‘mijn’ lepel
Het verhaal achter ‘mijn’ lepelHet verhaal achter ‘mijn’ lepel
Het verhaal achter ‘mijn’ lepelAnne Kuiper
 
Curiosity talk summer_interns_jun2013
Curiosity talk summer_interns_jun2013Curiosity talk summer_interns_jun2013
Curiosity talk summer_interns_jun2013Mouna Lyra
 

Destacado (20)

Case study
Case studyCase study
Case study
 
Xipre
XipreXipre
Xipre
 
TeachMeetNZ - Engage students and make a difference - 8 June 2013
TeachMeetNZ - Engage students and make a difference - 8 June 2013TeachMeetNZ - Engage students and make a difference - 8 June 2013
TeachMeetNZ - Engage students and make a difference - 8 June 2013
 
37번 여의주 예방논문2 발표
37번 여의주 예방논문2 발표37번 여의주 예방논문2 발표
37번 여의주 예방논문2 발표
 
Education from a (relatively) mature perspective
Education from a (relatively) mature perspectiveEducation from a (relatively) mature perspective
Education from a (relatively) mature perspective
 
Unidad 2 Introducción al diseño de los lenguajes de programacion
Unidad 2 Introducción al diseño de los lenguajes de programacionUnidad 2 Introducción al diseño de los lenguajes de programacion
Unidad 2 Introducción al diseño de los lenguajes de programacion
 
Storyboard
StoryboardStoryboard
Storyboard
 
Diseño y construcción de una máquina serigráfica automatizada
Diseño y construcción de una máquina serigráfica automatizadaDiseño y construcción de una máquina serigráfica automatizada
Diseño y construcción de una máquina serigráfica automatizada
 
Blogging - February 2014
Blogging - February 2014Blogging - February 2014
Blogging - February 2014
 
Mira app prototype
Mira app prototypeMira app prototype
Mira app prototype
 
61번 최석우 예방논문2 발표
61번 최석우 예방논문2 발표61번 최석우 예방논문2 발표
61번 최석우 예방논문2 발표
 
VIPUL VYAS
VIPUL VYASVIPUL VYAS
VIPUL VYAS
 
Presentacion del proyecto
Presentacion del proyectoPresentacion del proyecto
Presentacion del proyecto
 
Analisi delle vendite2
Analisi delle vendite2Analisi delle vendite2
Analisi delle vendite2
 
Why do I do what I do?
Why do I do what I do?Why do I do what I do?
Why do I do what I do?
 
38번 유고은 예방논문1 발표
38번 유고은 예방논문1 발표38번 유고은 예방논문1 발표
38번 유고은 예방논문1 발표
 
Encuesta en la ciudad de Chancay
Encuesta en la ciudad de ChancayEncuesta en la ciudad de Chancay
Encuesta en la ciudad de Chancay
 
Het verhaal achter ‘mijn’ lepel
Het verhaal achter ‘mijn’ lepelHet verhaal achter ‘mijn’ lepel
Het verhaal achter ‘mijn’ lepel
 
Baldor+ +algebra
Baldor+ +algebraBaldor+ +algebra
Baldor+ +algebra
 
Curiosity talk summer_interns_jun2013
Curiosity talk summer_interns_jun2013Curiosity talk summer_interns_jun2013
Curiosity talk summer_interns_jun2013
 

Similar a Neuro genetic key based recursive modulo 2 substitution using mutated character for online wireless communication (ngkrmsmc)

Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...pijans
 
GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...
GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...
GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...ijwmn
 
Improving The Performance of Viterbi Decoder using Window System
Improving The Performance of Viterbi Decoder using Window System Improving The Performance of Viterbi Decoder using Window System
Improving The Performance of Viterbi Decoder using Window System IJECEIAES
 
Soft computing based cryptographic technique using kohonen's selforganizing m...
Soft computing based cryptographic technique using kohonen's selforganizing m...Soft computing based cryptographic technique using kohonen's selforganizing m...
Soft computing based cryptographic technique using kohonen's selforganizing m...ijfcstjournal
 
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...IOSR Journals
 
A genetic algorithm to solve the
A genetic algorithm to solve theA genetic algorithm to solve the
A genetic algorithm to solve theIJCNCJournal
 
Computational intelligence based simulated annealing guided key generation in...
Computational intelligence based simulated annealing guided key generation in...Computational intelligence based simulated annealing guided key generation in...
Computational intelligence based simulated annealing guided key generation in...ijitjournal
 
Intelligent soft computing based
Intelligent soft computing basedIntelligent soft computing based
Intelligent soft computing basedijasa
 
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUEEFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUEIJNSA Journal
 
Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...
Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...
Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...ijcsta
 
Cryptography using artificial neural network
Cryptography using artificial neural networkCryptography using artificial neural network
Cryptography using artificial neural networkMahira Banu
 
ANALYSIS OF ELEMENTARY CELLULAR AUTOMATA CHAOTIC RULES BEHAVIOR
ANALYSIS OF ELEMENTARY CELLULAR AUTOMATA CHAOTIC RULES BEHAVIORANALYSIS OF ELEMENTARY CELLULAR AUTOMATA CHAOTIC RULES BEHAVIOR
ANALYSIS OF ELEMENTARY CELLULAR AUTOMATA CHAOTIC RULES BEHAVIORijsptm
 
Optimal parameter selection for unsupervised neural network using genetic alg...
Optimal parameter selection for unsupervised neural network using genetic alg...Optimal parameter selection for unsupervised neural network using genetic alg...
Optimal parameter selection for unsupervised neural network using genetic alg...IJCSEA Journal
 
ANALYSIS OF SIGNAL TRANSITION ACTIVITY IN FIR FILTERS IMPLEMENTED BY PARALLEL...
ANALYSIS OF SIGNAL TRANSITION ACTIVITY IN FIR FILTERS IMPLEMENTED BY PARALLEL...ANALYSIS OF SIGNAL TRANSITION ACTIVITY IN FIR FILTERS IMPLEMENTED BY PARALLEL...
ANALYSIS OF SIGNAL TRANSITION ACTIVITY IN FIR FILTERS IMPLEMENTED BY PARALLEL...cscpconf
 
Analysis of signal transition
Analysis of signal transitionAnalysis of signal transition
Analysis of signal transitioncsandit
 
Design, Analysis and Implementation of Modified Luby Transform Code
Design, Analysis and Implementation of Modified Luby Transform CodeDesign, Analysis and Implementation of Modified Luby Transform Code
Design, Analysis and Implementation of Modified Luby Transform CodeIOSR Journals
 

Similar a Neuro genetic key based recursive modulo 2 substitution using mutated character for online wireless communication (ngkrmsmc) (20)

Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
 
GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...
GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...
GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...
 
Improving The Performance of Viterbi Decoder using Window System
Improving The Performance of Viterbi Decoder using Window System Improving The Performance of Viterbi Decoder using Window System
Improving The Performance of Viterbi Decoder using Window System
 
B041306015
B041306015B041306015
B041306015
 
Soft computing based cryptographic technique using kohonen's selforganizing m...
Soft computing based cryptographic technique using kohonen's selforganizing m...Soft computing based cryptographic technique using kohonen's selforganizing m...
Soft computing based cryptographic technique using kohonen's selforganizing m...
 
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
 
A genetic algorithm to solve the
A genetic algorithm to solve theA genetic algorithm to solve the
A genetic algorithm to solve the
 
Research Paper
Research PaperResearch Paper
Research Paper
 
Computational intelligence based simulated annealing guided key generation in...
Computational intelligence based simulated annealing guided key generation in...Computational intelligence based simulated annealing guided key generation in...
Computational intelligence based simulated annealing guided key generation in...
 
Intelligent soft computing based
Intelligent soft computing basedIntelligent soft computing based
Intelligent soft computing based
 
Text encryption
Text encryptionText encryption
Text encryption
 
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUEEFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
 
Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...
Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...
Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...
 
Cryptography using artificial neural network
Cryptography using artificial neural networkCryptography using artificial neural network
Cryptography using artificial neural network
 
ANALYSIS OF ELEMENTARY CELLULAR AUTOMATA CHAOTIC RULES BEHAVIOR
ANALYSIS OF ELEMENTARY CELLULAR AUTOMATA CHAOTIC RULES BEHAVIORANALYSIS OF ELEMENTARY CELLULAR AUTOMATA CHAOTIC RULES BEHAVIOR
ANALYSIS OF ELEMENTARY CELLULAR AUTOMATA CHAOTIC RULES BEHAVIOR
 
Optimal parameter selection for unsupervised neural network using genetic alg...
Optimal parameter selection for unsupervised neural network using genetic alg...Optimal parameter selection for unsupervised neural network using genetic alg...
Optimal parameter selection for unsupervised neural network using genetic alg...
 
ANALYSIS OF SIGNAL TRANSITION ACTIVITY IN FIR FILTERS IMPLEMENTED BY PARALLEL...
ANALYSIS OF SIGNAL TRANSITION ACTIVITY IN FIR FILTERS IMPLEMENTED BY PARALLEL...ANALYSIS OF SIGNAL TRANSITION ACTIVITY IN FIR FILTERS IMPLEMENTED BY PARALLEL...
ANALYSIS OF SIGNAL TRANSITION ACTIVITY IN FIR FILTERS IMPLEMENTED BY PARALLEL...
 
Analysis of signal transition
Analysis of signal transitionAnalysis of signal transition
Analysis of signal transition
 
I1803014852
I1803014852I1803014852
I1803014852
 
Design, Analysis and Implementation of Modified Luby Transform Code
Design, Analysis and Implementation of Modified Luby Transform CodeDesign, Analysis and Implementation of Modified Luby Transform Code
Design, Analysis and Implementation of Modified Luby Transform Code
 

Más de ijcsity

International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...ijcsity
 
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATION
NETWORK MEDIA ATTENTION AND  GREEN TECHNOLOGY INNOVATION NETWORK MEDIA ATTENTION AND  GREEN TECHNOLOGY INNOVATION
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATION ijcsity
 
4th International Conference on Artificial Intelligence and Machine Learning ...
4th International Conference on Artificial Intelligence and Machine Learning ...4th International Conference on Artificial Intelligence and Machine Learning ...
4th International Conference on Artificial Intelligence and Machine Learning ...ijcsity
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...ijcsity
 
5th International Conference on Machine Learning & Applications (CMLA 2023)
5th International Conference on Machine Learning & Applications (CMLA 2023)5th International Conference on Machine Learning & Applications (CMLA 2023)
5th International Conference on Machine Learning & Applications (CMLA 2023)ijcsity
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...ijcsity
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...ijcsity
 
8th International Conference on Networks, Communications, Wireless and Mobile...
8th International Conference on Networks, Communications, Wireless and Mobile...8th International Conference on Networks, Communications, Wireless and Mobile...
8th International Conference on Networks, Communications, Wireless and Mobile...ijcsity
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...ijcsity
 
10th International Conference on Computer Science and Information Technology ...
10th International Conference on Computer Science and Information Technology ...10th International Conference on Computer Science and Information Technology ...
10th International Conference on Computer Science and Information Technology ...ijcsity
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...ijcsity
 
International Conference on Speech and NLP (SPNLP 2023)
International Conference on Speech and NLP (SPNLP 2023) International Conference on Speech and NLP (SPNLP 2023)
International Conference on Speech and NLP (SPNLP 2023) ijcsity
 
SPNLP CFP - 27 mar.pdf
SPNLP CFP - 27 mar.pdfSPNLP CFP - 27 mar.pdf
SPNLP CFP - 27 mar.pdfijcsity
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...ijcsity
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...ijcsity
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...ijcsity
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...ijcsity
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...ijcsity
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...ijcsity
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...ijcsity
 

Más de ijcsity (20)

International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...
 
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATION
NETWORK MEDIA ATTENTION AND  GREEN TECHNOLOGY INNOVATION NETWORK MEDIA ATTENTION AND  GREEN TECHNOLOGY INNOVATION
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATION
 
4th International Conference on Artificial Intelligence and Machine Learning ...
4th International Conference on Artificial Intelligence and Machine Learning ...4th International Conference on Artificial Intelligence and Machine Learning ...
4th International Conference on Artificial Intelligence and Machine Learning ...
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...
 
5th International Conference on Machine Learning & Applications (CMLA 2023)
5th International Conference on Machine Learning & Applications (CMLA 2023)5th International Conference on Machine Learning & Applications (CMLA 2023)
5th International Conference on Machine Learning & Applications (CMLA 2023)
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...
 
8th International Conference on Networks, Communications, Wireless and Mobile...
8th International Conference on Networks, Communications, Wireless and Mobile...8th International Conference on Networks, Communications, Wireless and Mobile...
8th International Conference on Networks, Communications, Wireless and Mobile...
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...
 
10th International Conference on Computer Science and Information Technology ...
10th International Conference on Computer Science and Information Technology ...10th International Conference on Computer Science and Information Technology ...
10th International Conference on Computer Science and Information Technology ...
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...
 
International Conference on Speech and NLP (SPNLP 2023)
International Conference on Speech and NLP (SPNLP 2023) International Conference on Speech and NLP (SPNLP 2023)
International Conference on Speech and NLP (SPNLP 2023)
 
SPNLP CFP - 27 mar.pdf
SPNLP CFP - 27 mar.pdfSPNLP CFP - 27 mar.pdf
SPNLP CFP - 27 mar.pdf
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...
 

Último

Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Último (20)

Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Neuro genetic key based recursive modulo 2 substitution using mutated character for online wireless communication (ngkrmsmc)

  • 1. International Journal of Computational Science and Information Technology (IJCSITY) Vol.1, No.4, November 2013 NEURO GENETIC KEY BASED RECURSIVE MODULO-2 SUBSTITUTION USING MUTATED CHARACTER FOR ONLINE WIRELESS COMMUNICATION (NGKRMSMC) Arindam Sarkar and J. K. Mandal Department of Computer Science & Engineering, University of Kalyani, W.B, India ABSTRACT In this paper, a neural genetic key based technique for encryption (NGKRMSMC) has been proposed through recursive modulo-2 substitution using mutated character code generation for online wireless communication of data/information. Both sender and receiver get synchronized based on their final output. The length of the key depends on the number of input and output neurons. Coordinated matching weight vectors assist to generate chromosomes pool. Genetic secret key is obtained using fitness function, which is the hamming distance between two chromosomes. Crossover and mutation are used to add elitism of chromosomes. At first mutated character code table based encryption strategy get perform on plain text. . Then the intermediate cipher text is yet again encrypted through recursive positional modulo-2 substitution technique to from next level encrypted text. This 2nd level intermediate cipher text is again encrypted to form the final cipher text through chaining and cascaded xoring of neuro genetic key with the identical length intermediate cipher text block. Receiver will perform same symmetric operation to get back the plain text using identical key. KEYWORDS Neuro Genetic Key based base Recursive Modulo-2 Substitution using Mutated Character (NGKRMSMC), weight vector, input vector, chaining, neuro genetic key. 1. INTRODUCTION In cryptography there are wide variety of techniques are available with some pros and cons to protect data [1]-[3], [7]. These algorithms have their merits and shortcomings. For Example in DES, AES algorithms [9] the cipher block length is nonflexible. ANNRPMS [1] and ANNRBLC [2] allow only one cipher block encoding. In this paper a neural training based genetic algorithm guided online encryption technique for wireless communicationhas been proposed. The organization of this paper is as follows. Section 2 of the paper deals with the proposed neuro synchronization and genetic key generation technique and also random block length based cryptographic techniques using mutated character code generation. Session key based technique has been discussed in section 3. Example of recursive modulo-2 technique is given in section 4. Complexity of the algorithm has been presented in section 5. Results are described in section 6. Conclusions are presented in section 7 and references at end. DOI : 10.5121/ijcsity.2014.1404 49
  • 2. International Journal of Computational Science and Information Technology (IJCSITY) Vol.1, No.4, November 2013 2. THE NGKRMSMC TECHNIQUE In proposed technique mutated character code table and recursive positional modulo-2 substitution algorithm is used to encrypt the plain text. This intermediate cipher text is again encrypted to form the final cipher text using chaining of cascaded xoring of the neuro genetic secret key. Using identical weight vector receiver performs deciphering process to regenerate the plain text. 2.1 Neural synchronization scheme & secret key generation At the beginning of the transmission, a neural network based secret key generation is performed between receiver and sender. The same may be done through the private channel also or it may be done in some other time, which is absolutely free from encryption. Fig. 1. shows the tree based generation process using arbitrary number of nodes (neurons). Corresponding algorithm and genetic key generation is given in two-sub section 1 and.2. Figure1 A tree parity machine with K=3 and N=4 Neural synchronization algorithm Input: - Random weights, input vectors for both neural networks Output: - Session key . Method: - Each party (A and B) uses its own (same) tree parity machine. Neural network parameters: K, N, L values will be identical for both parties and synchronization of the tree parity machines is achieved. Parameters: K - The number of hidden neurons. N - The number of input neurons connected to each hidden neuron, total (K*N) input neurons. L - The maximum value for weight {-L..+L} Step 1. Initialize random weight values. Step 2. Repeat step 3 to 6 until both sender and receiver get synchronized. Step 3. Produce random input vector X. Inputs are generated by a third party (say the server) or one of the communicating parties (figure. 2) 50
  • 3. International Journal of Computational Science and Information Technology (IJCSITY) Vol.1, No.4, November 2013 Figure 2 Neural network for machine A and machine B with K=4 & N=2 Step 4. Compute the values of the hidden neurons  1 if x  0,  N    i  sgn   wij xij  sgn x   0 if x  0,    j 1  1 if x  0.  (1) Step 5. Compute the value of the output neuron   K  N  sgn   w  i 1  j 1 ij  xij    (2) Step 6. Compare the output values of both tree parity machines by exchanging between the networks. If Output (A) ≠ Output (B) then go to step 3 else if Output (A) = Output (B) then Update the weights. In this paper we have used hebbian-learning rule for synchronization (eq. 3).  w i  wi   i xi  i   A   B  (3) In each step there may be three possibilities: 1. Output (A) ≠ Output (B): None of the parties updates its weights. 2. Output (A) = Output (B) = Output (E): All the three parties update weights. 3. Output (A) = Output (B) ≠ Output (E): Parties A and B update their weights, but the attacker cannot do that as the synchronization of two parties are faster than learning of an attacker. Complexity: O(N) computational steps are required to generate a key of length N. The average synchronization time up to N=1000 asymptotically one expects an increase of O (log N). 3 SESSION KEY GENERATION USING GENETIC ALGORITHM The method considered indistinguishable matched neural weight vector from the first segment in the form of blocks of bits with dissimilar size like 8/16/32/64/128/256 to generate the dynamic chromosomes pool. If neural key is exhausted from the formation of pool at some stage, the key can be circular right shifted by multiple of 8 bits to generate new key stream. Step 1. Initially, 200 chromosomes are considered as seeds (every chromosomes has number of bits identical to 8/16/32/64/128/256 bit) from dynamic pool. Parameters of the genetic algorithm used are: population size = 200, Crossover probability(CP) = 0.6-0.9 and Mutation probability(MP) =0.001 Step 2. Hamming distance function is used as a fitness function to evaluate the chromosomes to get the best individuals for forming the key. 51
  • 4. International Journal of Computational Science and Information Technology (IJCSITY) Vol.1, No.4, November 2013 Step 3. Perform one-point crossover, where a crossover point on the chromosome are elected randomly, and two parent individuals are interchanged at these points. Step 4. Mutation is performed by bit flipping. Step 5. Genetic processing is continued until the optimized key (the master key) is obtained. 3.1 Character Code Table Generation For the plain text “tree” Fig 3 shows corresponding tree representation of probability of occurrence of each character in the plain text. Character „t‟ and „r‟ occur once and character „e‟ occurs twice. Preorder traversal get used to find out the character code. Character values are extracted from the decimal representation of character code. Left branch is coded as „0‟ and that of right branch „1‟. Table 1 tabulated the code and value of a particular character in the plain text. Mutated tree is generated using mutation. Fig 4, 5 and 6 are the mutated trees. After mutation new code values as obtained are tabulated in table 2. Tree having n-1 intermediate nodes can generate 2n-1 mutated trees. 4 0 2 e 4 1 2 0 1 1 e 1 0 2 2 1 1 t 1 r r Figure4 Mutated at Position 1,2 & 3,4 4 4 0 2 1 1 2 1 0 1 t 1 t Figure3 Character Code Tree e 0 e 0 2 2 0 r Figure5 Mutated at Position 3,4 1 1 1 t 1 r Figure6 Mutated at Position 1,2 52
  • 5. International Journal of Computational Science and Information Technology (IJCSITY) Vol.1, No.4, November 2013 Table 1. Code table Character of plain text Code t 10 Value of that Character 2 r 11 3 e 0 0 Table 2. Mutated Code Table Character Code Value Code Value Code Value t 01 1 r 00 0 11 10 3 2 00 01 0 1 e 1 2 0 0 1 2 4 RECURSIVE MODULO-2 ENCRYPTION TECHNIQUE Now, plain text characters are already converted into the mutated code using the mutated code table. Then it is divided into blocks. The decimal equivalent of the block of bits under consideration is one integral value from which the recursive modulo-2 operation starts. The modulo-2 operation is performed to check whether integral value is even or odd and the position of that integral value in the series of natural even or odd numbers is evaluated. Process is carried out Recursively to a finite number of times, which is exactly the length of the source block. After each modulo-2 operation, 0 or 1 is pushed to the output stream in MSB-to-LSB order; depending on the fact whether the integral value is even or odd. In this way intermediate encrypted text is generated. Set: P = 0. LOOP: Evaluate: Temp = Remainder of DL-P / 2. If Temp = 0 Evaluate: DL-P-1 = DL-P / 2. Set: tP = 0. Else If Temp = 1 Evaluate: DL-P-1 = (DL-P + 1) / 2. Set: tP = 1. Set: P = P + 1. If (P > (L – 1)) Exit. END LOOP Figure7 Algorithm for Recursive Modulo-2 encryption technique. Thus overall complexity of encryption algorithm is O(L).The key is padded with the recursive modulo-2 encrypted text block to form the 2nd level intermediate cipher block. Then the neuro genetic secret key is use to xored with the same length first 2nd level intermediate cipher text block to produce the first final cipher block (neuro genetic secret key XOR with same length cipher text). This newly generated block again xored with the immediate next block and so on. 53
  • 6. International Journal of Computational Science and Information Technology (IJCSITY) Vol.1, No.4, November 2013 This chaining of cascaded xoring mechanism is performed until all the blocks get exhausted. If the last block size of intermediate cipher text is less than the require xoring block size (i.e. neuro genetic vector size) then this block is kept unchanged. Recursive Modulo-2 Decryption Technique During decryption the encrypted message is xored with the neuro genetic key to extract the intermediate encrypted stream. Then the intermediate encrypted stream is decomposed into a set of blocks, each consisting of a fixed number of bits using same rule of encryption. Then perform the recursive modulo-2 decryption operation. Finally, character code value is decrypted using character code table to get the plain text. Complexity of this decryption algorithm is also O(L). Set: P = L – 1 and T = 1. LOOP: If tP = 0 Evaluate: T = Tth even number in the series of natural numbers. Else If tP = 1 Evaluate: T = Tth odd number in the series of natural numbers. Set: P = P – 1. If P < 0 Exit. END LOOP Evaluate: S = s0 s1 s2 s3 s4 … sL-1, which is the binary equivalent of T Figure 8 Algorithm for Recursive Modulo-2 decryption technique. Example of Recursive Modulo-2 Operation Consider a separate plaintext (P) as: “Local Area Network”. The Process of Recursive Modulo-2 Encryption To generate the source stream of bits, we take the reference of Table 3. Table 3. Character-to-Byte Conversion for the Text “Local Area Network” 54
  • 7. International Journal of Computational Science and Information Technology (IJCSITY) Vol.1, No.4, November 2013 Message stream of bits S is: S=01001100/01101111/01100011/01100001/01101100/00100000/01000001/01110010/0110010 1/01100001/00100000/01001110/01100101/01110100/01110111/01101111/01110010/01101011. Decompose S into a set of 5 blocks, each of the first four being of size 32 bits and the last one being of 16 bits. During this process of decomposition, we scan S along the MSB-to-LSB direction. Thus we obtain S1=01001100011011110110001101100001, S2=01101100001000000100000101110010, S3=01100101011000010010000001001110, S4=01100101011101000111011101101111, S5=0111001001101011. For the block S1, corresponding to which the decimal value is (1282368353)10, the process of encryption is shown below: 1282368353  6411841771  3205920891  1602960451  801480231  400740121  200370060  1000185030  50092521  25046260  12523130  6261571  3130791  1565401  787200  391350  195681  97840  48920  24460  12230  6121  3060  1530  771  391  201  100  50  31  21  10  11. From this we generate the target block T1 corresponding to S1 as: T1=11111001001110010000100111001101. Applying the similar process, we generate target blocks T 1, T2, T3, T4 and T5 corresponding to source blocks S1, S2, S3, S4 and S5 respectively. T2=01110001011111011111101111001001 T3=01001101111110110111100101011001 T4=10001001000100011101000101011001 T5=1110100110110001. Now, combining target blocks in the same sequence, we get the target stream of bits T as the following: T=11111001/00111001/00001001/11001101/01110001/01111101/11111011/11001001/0100110 1/11111011/01111001/01011001/10001001/00010001/11010001/01011001/11101001/10110001. After padding the key with the above intermediate cipher text and xoring with the neural secret key, final encrypted cipher text is generated. This stream of bits, in the form of a stream of characters, is transmitted as the encrypted message. The Process of Recursive Modulo-2 Decryption At the destination end, receiver‟s secret neural key is used to xoring the cipher text to get back the key and intermediate cipher text. Using secret key, the receiver gets the information on different block lengths. Using that secret key, all the blocks T1, T2, T3, T4 and T5 are formed as follows: T1=11111001001110010000100111001101 T2=01110001011111011111101111001001 T3=01001101111110110111100101011001 T4=10001001000100011101000101011001 T5=1110100110110001. Apply the process of decryption to generate source blocks Si for all Ti, 1 ≤ i ≤5. 32-bit stream is regenerated S1=01001100011011110110001101100001.” 55
  • 8. International Journal of Computational Science and Information Technology (IJCSITY) Vol.1, No.4, November 2013 All the source blocks of bits are regenerated and combining those blocks in the same sequence, the source stream of bits obtained to get the source message or the plaintext. 5 RESULTS Results are presented in terms of encryption decryption time, Chi-Square test, source file size vs. encryption time along with source file size vs. encrypted file size. The results are also compared with existing RSA technique. Table 4. Encryption / decryption time vs. File size Encryption Time (s) Decryption Time (s) Source (bytes) 18432 NGKRMSMC ANNRPMS NGKRMSMC ANNRPMS 5. 32 Encrypted (bytes) 18432 5. 98 5.52 4.85 23044 35425 36242 59398 8.04 14.59 15.17 23.02 7. 37 13. 98 14. 53 22. 39 23040 35425 36242 59398 7.63 14.08 14.70 22.51 6.96 13. 37 14. 01 21. 88 Encryption & decryption time Table 4 shows encryption and decryption time with respect to the source and encrypted size respectively. Source size Figure9 Source size vs. encryption time & decryption time Encryption /decryption time is marginally high because of incorporation of genetic technique and mutated character coding. Table 5 shows Chi-Square value for different source stream size on applying various encryption algorithms. It is seen that the Chi-Square value of NGKRMSMCC is better compared to the RBCMPCC algorithm and comparable with values of the RSA technique. 56
  • 9. International Journal of Computational Science and Information Technology (IJCSITY) Vol.1, No.4, November 2013 Table 5. Source size vs. Chi-Square value Stream Size (bytes) 1500 2500 3000 3250 3500 Chi-Square value (TDES) 1228.5803 2948.2285 3679.0432 4228.2119 4242.9165 Chi-Square value Proposed NGKRMS MCC 2465.0749 5643.5271 6759.2956 6997.6173 10572.7263 Chi-Square value (RBCM CPCC) 2464.0324 5642.5835 6714.6741 6994.6189 10570.4671 Chi-Square value (RSA) 5623.14 22638.99 12800.355 15097.77 15284.728 Figure 10 shows graphical representation of table 5. Figure10 Source size vs. Chi-Square value 6 COMPLEXITY OF THE TECHNIQUE The complexity of the technique will be O (L), which can be computed using following three steps. Step 1: To generate a key of length N needs O (N) Computational steps. The average synchronization time is independent of the size N of the networks (up to N=1000). The complexity of synchronization is O (log N). Step 2: Complexity of the encryption technique is O (L). Step 2.1: Corresponding to the source block S = s0 s1 s2 s3 s4… sL-1, evaluate the equivalent decimal integer, DL. It takes O (L) amount of time. Step 2.2: Step 3 and step 4 executed exactly L number of times for the values of the variable P ranging from 0 to (L-1) increasing by 1 after each execution of the loop where the complexity is O (L) as L no. of iterations are needed. Step 2.3: Apply modulo-2 operation on DL-P to check if DL-P is even or odd, takes constant amount of time i.e. O(1). Step 2.4: If DL-P is found to be even, compute DL-P-1 = DL-P / 2, where DL-P-1 is its position in the series of natural even numbers. Assign tP = 0. If DL-P is found to be odd, compute DL-P-1 = (DL-P + 1) / 2, where DL-P-1 is its position in the series of natural odd numbers. Assign tP=1 which generates the complexity as O (1). Step 2.5: evaluate: DL, the decimal equivalent, corresponding to the source block S = s0 s1 s2 s3 s4 … sL-1 which takes O (L) amount of time. 57
  • 10. International Journal of Computational Science and Information Technology (IJCSITY) Vol.1, No.4, November 2013 Step 3: Complexity of the decryption technique is O (L). Step 3.1: Set P=L-1and T=1.So time complexity of assignments is O (1). Step 3.2: Complexity of loop is O (L) because L iterations are needed. Step 3.3: If tP = 0,T = Tth even number in the series of natural even numbers. If tP = 1,T = Tth odd number in the series of natural even numbers. Complexity is O (1) as it takes constant amount of times. Step 3.4: Set P=P-1. This step takes constant amount of time i.e. O(1). Step 3.5: Complexity to convert T into the corresponding stream of bits S = s0 s1 s2 s3 s4…sL-1, which is the source block is O(L) as this step also takes constant amount of time for merging s0 s1 s2 s3 s4…sL-1 . So, overall time complexity of the entire technique is O(L). 7 CONCLUSION The paper presents a novel approach for generation of secret key using neural synchronization. This proposed technique allows key exchange through public channel. So likelihood of attack of the technique is much less than the simple RBCMCCC [4]algorithm. ACKNOWLEDGEMENTS The author expresses deep sense of gratitude to the DST, Govt. of India, for financial assistance through INSPIRE Fellowship leading for a PhD work under which this work has been carried out. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] Mandal, J. K., Sarkar Arindam, “An Adaptive Neural Network Guided Secret Key Based Encryption Through Recursive Positional Modulo-2 Substitution For Online Wireless Communication (ANNRPMS)”, in Proc. International Conference on Recent Trends In Information Technology (ICRTIT 2011) Conf. BY IEEE, 3-5 June 2011, Madras Institute of Technology, Anna University, Chennai, Tamil Nadu, India. 978-1-4577-0590-8/11 Mandal, J. K., Sarkar Arindam, “An Adaptive Neural Network Guided Random Block Length Based Cryptosystem (ANNRBLC)”, in Proc. 2nd International Conference On Wireless Communications, Vehicular Technology, Information Theory And Aerospace & Electronic System Technology” (Wireless Vitae 2011) Conf By IEEE Societies, February 28, 2011- March 03, 2011,Chennai, Tamil Nadu, India. ISBN 978-87-92329-61-5. Mandal, J. K., Sarkar Arindam “Neural Network Guided Secret Key based Encryption through Cascading Chaining of Recursive Positional Substitution of Prime Non-Prime (NNSKECC)” [TP48][PID-63], in Proc. of International Confrence of Computing and Systems-2010 Conf by ICCS-2010, Novembar 19-20, 2010, The University of Burdwan,pp 291-297. Jayanta Kumar Pal, J. K. Mandal “A Random Block Length Based Cryptosystem through Multiple Cascaded Permutation Combinations and Chaining of Blocks” in Proc. Fourth International Conference on Industrial and Information Systems, ICIIS 2009 Conf, 28 – 31December2009, SriLanka. T. Godhavari, N. R. Alainelu and R. Soundararajan “Cryptography Using Neural Network “in Proc.by Conf IEEE Indicon 2005, Chennai, India, 11-13 Dec. 2005.ggggjgggggggggggg Wolfgang Kinzel and ldo Kanter, "Interacting neural networks and cryptography", Advances in Solid State Physics, Ed. by B. Kramer (Springer, Berlin. 2002), Vol. 42, p. 383 arXiv- cond-mat/0203011. Dong Hu "A new service based computing security model with neural cryptography"IEEE07/2009.J J. K. Mandal, et al, “A 256-bit Recursive Pair Parity Encoder for Encryption”, in Proc Advances in Modeling, D; Computer Science & Statistics (AMSE), Conf vol. 9, No. 1, pp. 1-14, France, 2004. Atul Kahate, Cryptography and Network Security, 2003, Tata McGraw-Hill publishing Company Limited, Eighth reprint 2006. 58
  • 11. International Journal of Computational Science and Information Technology (IJCSITY) Vol.1, No.4, November 2013 Author Arindam Sarkar INSPIRE FELLOW (DST, Govt. of India), MCA (VISVA BHARATI, Santiniketan, University First Class First Rank Holder), M.Tech (CSE, K.U, University First Class First Rank Holder). Total number of publications 25. Jyotsna Kumar Mandal M. Tech.(Computer Science, University of Calcutta), Ph.D.(Engg., Jadavpur University) in the field of Data Compression and Error Correction Techniques, Professor in Computer Science and Engineering, University of Kalyani, India. Life Member of Computer Society of India since 1992 and life member of cryptology Research Society of India. Dean Faculty of Engineering, Technology & Management, working in the field of Network Security, Steganography, Remote Sensing & GIS Application, Image Processing. 25 years of teaching and research experiences. Eight Scholars awarded Ph.D. and 8 are pursuing. Total number of publications 267. 59