Abstract
Chaotic encryption have been widely studied and applied in cryptology field because its good randomicity and sensitivity to initial value. But nowadays it can’t effectively defend passive attacks from outer world under development of hi-tech. Neural network be used into chaotic algorithm for its mnemonic function and self-study function can improve anti-passive-attacks ability of chaotic security system. This method can change length of secret-key at will also, which made the security system more flexible and practical.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Jakimoski, G., Kocarev, L.: Chaos, Cryptography: Block Encryption Ciphers Based on Chaotic Maps. Circuits and Systems – I: Fundamental Theory and Applications 2, 163–169 (2001)
Zhao, J., Luo, S., Wen, J.: A Chaotic Encryption Basic on Neural Network. Computer Research and Development 12, 1475–1479 (2001)
John, M.C., Verhagonj, P.: Chaos In Cryptography. The Escape From The Strange Attractor (1991)
Liew, P., Yee, D., Silva, L.C.: Application of Multilayer Perceptron Networks in Symmetric Block Ciphers. In: Proceedings of the 2002 International Joint Conference on IJCNN 2002, vol. 2, pp. 1455–1458 (2002)
Su, S., Lin, A., Yen, J.: Design and Realization of a New Chaotic Neural Encryption/ Decryption Network. In: The 2000 IEEE Asia-Pacific Conference on Circuits and Systems, IEEE APCCAS 2000, pp. 335–338 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yang, X., Huang, X., Huang, H. (2005). Improving Ability of Passive Attacks of Chaotic Encryption by Using Neural Network. In: Wang, J., Liao, XF., Yi, Z. (eds) Advances in Neural Networks – ISNN 2005. ISNN 2005. Lecture Notes in Computer Science, vol 3497. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11427445_102
Download citation
DOI: https://doi.org/10.1007/11427445_102
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25913-8
Online ISBN: 978-3-540-32067-8
eBook Packages: Computer ScienceComputer Science (R0)