ABSTRACT
Adversarial neural cryptography is deemed as an encouraging area of research that could provide different perspective in the post-quantum cryptography age, specially for secure transmission of information. Nevertheless, it is still under explored with a handful of publications on the subject. This study proposes the theoretical implementation of a neuroevolved binary neural network based on boolean logic functions only (BiSUNA), with the purpose of encrypting/decrypting a payload between two agents, hiding information from a competitor.
- Chiu-Wing Sham, Wai-Chiu Wong, and E. R. Y. Young. 2002. Congestion estimation with buffer planning in floorplan design. In Proceedings 2002 Design, Automation and Test in Europe Conference and Exhibition. 696--701.Google ScholarCross Ref
- Murilo Coutinho, et al. 2018. Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography. Sensors 18, 5 (2018).Google Scholar
- Guerric Meurice de Dormale and Jean-Jacques Quisquater. 2007. High-speed hardware implementations of Elliptic Curve Cryptography: A survey. Journal of Systems Architecture 53, 2 (2007), 72 -- 84.Google ScholarDigital Library
- Ian Goodfellow, et al. 2014. Generative Adversarial Nets. In Advances in Neural Information Processing Systems 27, Z. Ghahramani, M. Welling, C. Cortes, N. D. Lawrence, and K. Q. Weinberger (Eds.). Curran Associates, Inc., 2672--2680.Google Scholar
- Goshgar Ismayilov and Haluk Rahmi Topcuoglu. 2020. Neural network based multi-objective evolutionary algorithm for dynamic workflow scheduling in cloud computing. Future Generation Computer Systems 102 (2020), 307 -- 322.Google ScholarDigital Library
- J. Katz and Y. Lindell. 2008. Introduction to modern cryptography. Chapman & Hall/CRC.Google Scholar
- Chun-Yan Lo, Francis C. M. Lau, and Chiu-Wing Sham. 2018. Fixed-Point Implementation of Convolutional Neural Networks for Image Classification. In 2018 International Conference on Advanced Technologies for Communications (ATC). 105--109.Google Scholar
- Jingwei Lu, Wing-Kai Chow, and Chiu-Wing Sham. 2012. A new clock network synthesizer for modern VLSI designs. Integration 45, 2 (2012), 121 -- 131.Google ScholarDigital Library
- L. Ma, Chiu-Wing Sham, J. Sun, and R. V. Tenorio. 2019. A Real-Time Flexible Telecommunication Decoding Architecture using FPGA Partial Reconfiguration. IEEE Transactions on Circuits and Systems II: Express Briefs (2019), 1--1.Google Scholar
- Jakub Nalepa, et al. 2020. Towards resource-frugal deep convolutional neural networks for hyperspectral image segmentation. Microprocessors and Microsystems 73 (2020), 102994.Google ScholarDigital Library
- Tai-Wen Yue and Suchen Chiang. 2000. A neural network approach for visual cryptography. In Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks. IJCNN 2000. Neural Computing: New Challenges and Perspectives for the New Millennium, Vol. 5. 494--499 vol.5.Google Scholar
- R. Valencia, C. Sham, and O. Sinnen. 2019. Using Neuroevolved Binary Neural Networks to solve reinforcement learning environments. In 2019 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS). 301--304.Google Scholar
- R. Valencia, C. W. Sham, and O. Sinnen. 2019. Evolved Binary Neural Networks Through Harnessing FPGA Capabilities. In 2019 International Conference on Field-Programmable Technology (ICFPT). 395--398.Google Scholar
- Wenwu Yu and Jinde Cao. 2006. Cryptography based on delayed chaotic neural networks. Physics Letters A 356, 4 (2006), 333 -- 338.Google ScholarCross Ref
- Y. Zhu, et al. 2018. Neural Cryptography Based on the Topology Evolving Neural Networks. In 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW). 472--478.Google Scholar
Index Terms
- Preliminary study of applied binary neural networks for neural cryptography
Recommendations
Universal perceptron and DNA-like learning algorithm for binary neural networks: non-LSBF implementation
Implementing linearly nonseparable Boolean functions (non-LSBF) has been an important and yet challenging task due to the extremely high complexity of this kind of functions and the exponentially increasing percentage of the number of non-LSBF in the ...
Efficient Approximation of Filters for High-Accuracy Binary Convolutional Neural Networks
Computer Vision – ECCV 2020 WorkshopsAbstractIn this paper, we propose an efficient design to convert full-precision convolutional networks into binary neural networks. Our method approximates a full-precision convolutional filter by sum of binary filters with multiplicative and additive ...
Diluted binary neural network
Highlights- We provide a new insight on the reason of BNNs’ performance degradation.
- A ...
AbstractBinary neural networks (BNNs) are promising on resource-constrained devices because they reduce memory consumption and accelerate inference effectively. However, they are still potential on performance improvement. Prior studies ...
Comments