Multilayer Perceptron Guided Key Generation Through Mutation with Recursive Replacement in Wireless Communication (MLPKG)
نویسندگان
چکیده
In this paper, a multilayer perceptron guided key generation for encryption/decryption (MLPKG) has been proposed through recursive replacement using mutated character code generation for wireless communication of data/information. Multilayer perceptron transmitting systems at both ends accept an identical input vector, generate an output bit and the network are trained based on the output bit which is used to form a protected variable length secret-key. For each session, different hidden layer of multilayer neural network is selected randomly and weights or hidden units of this selected hidden layer help to form a secret session key. The plain text is encrypted using mutated character code table. Intermediate cipher text is yet again encrypted through recursive replacement technique to from next intermediate encrypted text which is again encrypted to form the final cipher text through chaining , cascaded xoring of multilayer perceptron generated session key. If size of the final block of intermediate cipher text is less than the size of the key then this block is kept unaltered. Receiver will use identical multilayer perceptron generated session key for performing deciphering process for getting the recursive replacement encrypted cipher text and then mutated character code table is used for decoding. Parametric tests have been done and results are compared in terms of Chi-Square test, response time in transmission with some existing classical techniques, which shows comparable results for the proposed technique.
منابع مشابه
Secured Wireless Communication through Simulated Annealing Guided Traingularized Encryption by Multilayer Perceptron Generated Session Key (satmlp)
In this paper, simulated annealing guided traingularized encryption using multilayer perceptron generated session key (SATMLP) has been proposed for secured wireless communication. Both sender and receiver station uses identical multilayer perceptron and depending on the final output of the both side multilayer perceptron, weights vector of hidden layer get tuned in both ends. After this tunnin...
متن کاملSecured Transmission through Multi Layer Perceptron in Wireless Communication (stmlp)
In this paper, a multilayer perceptron guided encryption/decryption (STMLP) in wireless communication has been proposed for exchange of data/information. Multilayer perceptron transmitting systems at both ends generate an identical output bit and the network are trained based on the output which is used to synchronize the network at both ends and thus forms a secret-key at end of synchronizatio...
متن کاملKey Generation and Certification using Multilayer Perceptron in Wireless communication(KGCMLP)
In this paper, a key generation and certification technique using multilayer perceptron (KGCMLP) has been proposed in wireless communication of data/information. In this proposed KGCMLP technique both sender and receiver uses an identical multilayer perceptrons. Both perceptrons are start synchronization by exchanging some control frames. During synchronization process message integrity test an...
متن کاملGroup Session Key Exchange Multilayer Perceptron Based Simulated Annealing
In this paper, a group session Key Exchange multilayer Perceptron based Simulated Annealing guided Automata and Comparison based Metamorphosed encryption technique (GSMLPSA) has been proposed in wireless communication of data/information. Both sender and receiver uses identical multilayer perceptron and depending on the final output of the both side multilayer perceptron, weights vector of hidd...
متن کاملCryptanalysis of Key Exchange method in Wireless Communication
In this paper, a cryptanalysis of key exchange method using multilayer perceptron (CKE) has been proposed in wireless communication of data/information. In this proposed CKE technique both sender and receiver uses an identical multilayer perceptrons for synchronization between them. After achieving the full synchronization weights vectors of both the parties’ becomes identical and this identica...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1208.2334 شماره
صفحات -
تاریخ انتشار 2012