Design and Implementation of Stream Cipher Using Neural Network
ثبت نشده
چکیده
The centaral problem in stream cipher cryptograph is the the difficulty to generate a long unpredicatable sequence of binary signals from short and random key. Unpredicatable sequence are desirable in cryptography because it is impossible, given a reasonable segment of its signals and computer resources, to find out more about them. Pseudorandom bit generators have been widely used to construct these sequences. The paper presents a PN sequence generator that uses neural network. Computer simulation tests have been carried out to check the randomness of the generated through statistical tests. There tests have shown the successful PN sequence generator passes all the recommended tests. The paper also proposes and validates the data encryption and decryption process using neural network instead of using traditional methods (Exclusive or). This task increases the difficulty in the breaking the cipher. صخللما يرصق يئاوشع حاتفم نم ةعقوتم يرغ ةعباتتم ةيئانث تاراشا ديلوت ةبوعص في بيايسنلاا يرفشتلا ةلكشم زكرمتت . يرـغ تلاسـلستم ديلوت نا نكملما يرغ نم تلاسلستلما هذه للاخ نم هنلا ا بوغرم ةيلمع يرفشتلا ةيلمع نم لعيج ةعقوتم بنتلا ؤ تاراـشا عطاـقم ىلع لوصلحاب ديدتحو يرفشتلا ةيلمع لشف لىا يدؤت دق رثكا تامولعم لىا لوصولل تابسالحا دراوم . تمدختـسا ةـيهمولا ةيئاوشعلا ماقرلاا تادلوم نا تلاسلستلما كلت ءانبل عساو لكشب . ادختساب يهمو يئاوشع ماقرا دلوم ءانب تم ثحبلا اذه في م ةيبصعلا تاكبشلا . يئاوشـع صحفل بيوساح ةاكامح جمانرب مدختسا حاـتفلما هيئاصحلاا تارابتخلاا مادختساب . تارابتخاب جئاتنلا حانج حوضوب تنيب كلذكو يهمولا يئاوشعلا ماقرلاا دلوم حانج تارابتخلاا هذه ينبت تانايبلا عاجرتسا ةيلمع عم ةيئاوشع . ادختـساب ةرفشـلا كـفو يرفشتلا تايلمع مادختسا ةيحلاص نم ققحتلا تم اضيا ثحبلا اذه في م تاكبشلا ةيديلقتلا قرطلا نع اضوع ةيبصعلا Exclusive or) ( ةرفشلا رسك ةبوعص نم تداز تيلاو .
منابع مشابه
Stream Flow Prediction in Flood Plain by Using Artificial Neural Network (Case Study: Sepidroud Watershed)
In order to determine hydrological behavior and water management of Sepidroud River (North of Iran-Guilan) the present study has focused on stream flow prediction by using artificial neural network. Ten years observed inflow data (2000-2009) of Sepidroud River were selected; then these data have been forecasted by using neural network. Finally, predicted results are compared to the observed dat...
متن کاملA Stream Cipher Based on Chaotic Permutations
In this paper we introduce a word-based stream cipher consisting of a chaotic part operating as a chaotic permutation and a linear part, both of which designed on a finite field. We will show that this system can operate in both synchronized and self-synchronized modes. More specifically, we show that in the self-synchronized mode the stream cipher has a receiver operating as an unknown input o...
متن کاملEstimation of Cadmium and Uranium in a stream sediment from Eshtehard region in Iran using an Artificial Neural Network
Considering the importance of Cd and U as pollutants of the environment, this study aims to predict the concentrations of these elements in a stream sediment from the Eshtehard region in Iran by means of a developed artificial neural network (ANN) model. The forward selection (FS) method is used to select the input variables and develop hybrid models by ANN. From 45 input candidates, 13 and 14 ...
متن کاملDesign of Stream Cipher for Text Encryption using Soft Computing based Techniques
In cryptography, encryption is the process of transforming information referred to as plaintext using an algorithm (called a cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is information which is, referred to as ciphertext. Stream ciphers are used to encrypt individual bits. This is achieved by adding a ...
متن کاملBiometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm
Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...
متن کامل