Use of Neural Networks in cryptography: A review

In cryptography secret information is made unreadable for an unauthorized user. There are many cryptographic algorithms are available, but they are more complex techniques and requires more computational power. This paper gives a review of how Neural Networks contributes a help in cryptography and how neural network and cryptography together can be used for security.

[1]  Adi Shamir,et al.  Analysis of Neural Cryptography , 2002, ASIACRYPT.

[2]  Nadir N. Charniya Design of Near-Optimal Classifier Using Multi-Layer Perceptron Neural Networks for Intelligent Sensors , 2013 .

[3]  Wolfgang Kinzel,et al.  Neural cryptography , 2002, Proceedings of the 9th International Conference on Neural Information Processing, 2002. ICONIP '02..

[4]  Ajit Singh Neural Cryptography for Secret Key Exchange and Encryption with AES , 2013 .

[5]  Jacek M. Zurada,et al.  Introduction to artificial neural systems , 1992 .

[6]  Nengchao Wang,et al.  A Novel Blind Watermarking Scheme Based on Neural Network in Wavelet Domain , 2006, 2006 6th World Congress on Intelligent Control and Automation.

[7]  Sahana S. Bisalapur,et al.  Design of An Efficient Neural Key Generation , 2011 .

[8]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[9]  Wolfgang Kinzel,et al.  Neural cryptography with queries , 2005 .

[10]  Der-Chyuan Lou,et al.  Adaptive digital watermarking using neural network technique , 2003, IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings..

[11]  Yao Hongxun,et al.  Neural network based steganalysis in still images , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).

[12]  D. A. Karras,et al.  Improving pseudorandom bit sequence generation and evaluation for secure Internet communications using neural network techniques , 2003, Proceedings of the International Joint Conference on Neural Networks, 2003..

[13]  Chengyun Yang,et al.  Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network , 2005, 2005 IEEE International Conference on Multimedia and Expo.

[14]  Andreas Ruttor,et al.  Synchronization of neural networks by mutual learning and its application to cryptography , 2004, NIPS.

[15]  Lee-Ming Cheng,et al.  Pseudorandom generator based on clipped Hopfield neural network , 1998, ISCAS '98. Proceedings of the 1998 IEEE International Symposium on Circuits and Systems (Cat. No.98CH36187).

[16]  Wolfgang Kinzel,et al.  Interacting Neural Networks and Cryptography , 2002 .