PRNG Implementation Based on Chaotic Neural Network (CNN)

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

study of hash functions based on chaotic maps

توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...

The Implementation of A Routing Algorithm Based on Chaotic Neural Network in Multicast Routing Problems1

The paper studies the problem of constructing multicast trees to meet the quality of service requirements of real-time interactive applications operating in high-speed packet-switched environments. A new delay and delay variation constrained energy function is proposed and adopted to chaotic neural networks to solve QoS multicast routing problem. The emulation verifies that the energy function ...

متن کامل

Cryptanalysis of a Chaotic Neural Network based Chaotic Cipher

Recently a Triple key encryption method based on logistic map was proposed. The present paper analysis the security of the proposed encryption method and points out that it can be easily broken by one pair of known/chosen plain-text attack which is supported by mathematical proof and experimental result. In addition, some other security defects are also reported.

متن کامل

AN IMPROVED CONTROLLED CHAOTIC NEURAL NETWORK FOR PATTERN RECOGNITION

A sigmoid function is necessary for creation a chaotic neural network (CNN). In this paper, a new function for CNN is proposed that it can increase the speed of convergence. In the proposed method, we use a novel signal for controlling chaos. Both the theory analysis and computer simulation results show that the performance of CNN can be improved remarkably by using our method. By means of this...

متن کامل

Cryptography Using Chaotic Neural Network

The goal of any cryptographic system is the exchange of information among the intended users without any leakage of information to others who may have unauthorized access to it. In 1976, Diffie and Hellmann found that a common secret key could be created over public channel accessible to any opponent. Since then many public key cryptography have been presented which are based on number theory a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Academic Journal of Nawroz University

سال: 2019

ISSN: 2520-789X

DOI: 10.25007/ajnu.v8n4a459