A block cipher based on chaotic neural networks

In this paper, the neural network composed of a chaotic neuron layer and a linear neuron layer is used to construct a block cipher that transforms the data from the plaintext form into the unintelligible form under the control of the key. Among them, the chaotic neuron layer realizes data diffusion, the linear neuron layer realizes data confusion, and the two layers are repeated for several times to strengthen the cipher. The decryption process is symmetric to the encryption process. Theoretical analysis and experimental results show that the block cipher has good computing security and is more suitable for image encryption. It is expected to attract more researchers in this field.

[1]  Wolfgang Kinzel,et al.  Public channel cryptography by synchronization of neural networks and chaotic maps. , 2003, Physical review letters.

[2]  Donghui Guo,et al.  A New Symmetric Probabilistic Encryption Scheme Based on Chaotic Attractors of Neural Networks , 2004, Applied Intelligence.

[3]  Richard Mollin An introduction to cryptography , 2001, CRC Press series on discrete mathematics and its applications.

[4]  K. Aihara,et al.  Cryptosystems with discretized chaotic maps , 2002 .

[5]  Richard A. Mollin,et al.  An Introduction to Cryptography, Second Edition (Discrete Mathematics and Its Applications) , 2006 .

[6]  Shiguo Lian,et al.  Multimedia Content Protection Based on Chaotic Neural Networks , 2007, Computational Intelligence in Information Assurance and Security.

[7]  Jinsheng Sun,et al.  A chaotic stream cipher and the usage in video protection , 2007 .

[8]  Pengwei Hao,et al.  Matrix factorizations for reversible integer mapping , 2001, IEEE Trans. Signal Process..

[9]  Lee-Ming Cheng,et al.  The convergence properties of a clipped Hopfield network and its application in the design of keystream generator , 2001, IEEE Trans. Neural Networks.

[10]  Vasilios Zorkadis,et al.  On neural network techniques in the secure management of communication systems through improving and quality assessing pseudorandom stream generators , 2003, Neural Networks.

[11]  Shiguo Lian,et al.  Secure hash function based on neural network , 2006, Neurocomputing.

[12]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[13]  Guanrong Chen,et al.  A Chaotic-Neural-Network-Based Encryption Algorithm for JPEG2000 Encoded Images , 2004, ISNN.