On neural network techniques in the secure management of communication systems through improving and quality assessing pseudorandom stream generators

Random components play an especially important role in the management of secure communication systems, with emphasis on the key management of cryptographic protocols. For this reason, the existence of strong pseudo random number generators is highly required. This paper presents novel techniques, which rely on Artificial Neural Network (ANN) architectures, to strengthen traditional generators such as IDEA and ANSI X.9 based on 3DES and IDEA. Additionally, this paper proposes a non-linear test method for the quality assessment of the required non-predictability property, which relies on feedforward neural networks. This non-predictability test method along with commonly used empirical tests based on statistics is proposed as a methodology for quality assessing strong pseudorandom stream generators. By means of this methodology, traditional and Neural Network based pseudorandom stream generators are evaluated. The results show that the proposed generators behave significantly better than the traditional ones, in particular, in terms of non-predictability.

[1]  Simon Haykin,et al.  Neural Networks: A Comprehensive Foundation , 1998 .

[2]  Gustavus J. Simmons,et al.  Contemporary Cryptology: The Science of Information Integrity , 1994 .

[3]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[4]  Kurt Hornik,et al.  Multilayer feedforward networks are universal approximators , 1989, Neural Networks.

[5]  George Cybenko,et al.  Approximation by superpositions of a sigmoidal function , 1992, Math. Control. Signals Syst..

[6]  Averill M. Law,et al.  Simulation Modeling and Analysis , 1982 .

[7]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[8]  Vasilios Zorkadis,et al.  On Applying Multilayer Perceptron Learning Properties to (Pseudo) Random Number Generation and Evaluation , 1998, Neural Parallel Sci. Comput..

[9]  Donald Ervin Knuth,et al.  The Art of Computer Programming , 1968 .

[10]  Ed Dawson,et al.  A computer package for measuring the strength of encryption algorithms , 1994, Comput. Secur..

[11]  Charles P. Pfleeger,et al.  Security in computing , 1988 .

[12]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[13]  Giovanni Di Crescenzo,et al.  Contemporary cryptology , 2005, Advanced courses in mathematics : CRM Barcelona.

[14]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[15]  Xuanqin Mou,et al.  Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography , 2001, INDOCRYPT.

[16]  Dieter Gollmann,et al.  Authentication services in distributed systems , 1993, Comput. Secur..