A First Study of the Neural Network Approach in the Rsa Cryptosystem
نویسندگان
چکیده
The RSA cryptosystem is supposed to be the first realization of a public key cryptosystem in 1977. Its (computational) security is relied upon the difficulty of factorization. In order to break the RSA cryptosystem it is enough to factorize where is the product of two large prime numbers, . This is equivalent to calculate where is the Euler function. In this paper Neural Networks are trained in order the function to be computed.
منابع مشابه
Approaches in RSA Cryptosystem using Artificial Neural Network
RSA cryptosystem, the first public key cryptography presented in 1977. Neural networks are often used as a powerful discriminating estimator for tasks in function approximation. This paper describes a neural-network-based method relies on Radial Basis Function and Levenberg-Marquardt Backpropagation for estimating the behavior of the function used in RSA cryptosystem to calculate the function. ...
متن کاملNeural Network Sensitivity to Inputs and Weights and its Application to Functional Identification of Robotics Manipulators
Neural networks are applied to the system identification problems using adaptive algorithms for either parameter or functional estimation of dynamic systems. In this paper the neural networks' sensitivity to input values and connections' weights, is studied. The Reduction-Sigmoid-Amplification (RSA) neurons are introduced and four different models of neural network architecture are proposed and...
متن کاملA Comparison of Regression and Neural Network Based for Multiple Response Optimization in a Real Case Study of Gasoline Production Process
Most of existing researches for multi response optimization are based on regression analysis. However, the artificial neural network can be applied for the problem. In this paper, two approaches are proposed by consideration of both methods. In the first approach, regression model of the controllable factors and S/N ratio of each response has been achieved, then a fuzzy programming has been app...
متن کاملCryptography through Interpolation, Approximation and Computational Intelligence Methods
Recently, numerous techniques and methods have been proposed to address hard and complex algebraic and number theoretical problems related to cryptography. We review several interpolation and approximation techniques. In particular, we discuss techniques related to polynomial interpolation, discrete Fourier transforms, as well as, polynomial approximation. Subsequently, we focus on a recently p...
متن کاملPrediction of Energy Consumption in the First Line of Tehran Metro: GMDH Neural Network Approach
Today, energy and its consumption are the main strategic plan of organizations and also the development of urban transport systems by considering a variety of economic, scientific, industrial, climate and growing urbanization is essential. Analysis of past trends in energy is the key to predict future trends, with regard to the rate of development of metro, for planning and future-oriented macr...
متن کامل