skip to main content
10.1145/3377929.3389933acmconferencesArticle/Chapter ViewAbstractPublication PagesgeccoConference Proceedingsconference-collections
poster

Preliminary study of applied binary neural networks for neural cryptography

Published:08 July 2020Publication History

ABSTRACT

Adversarial neural cryptography is deemed as an encouraging area of research that could provide different perspective in the post-quantum cryptography age, specially for secure transmission of information. Nevertheless, it is still under explored with a handful of publications on the subject. This study proposes the theoretical implementation of a neuroevolved binary neural network based on boolean logic functions only (BiSUNA), with the purpose of encrypting/decrypting a payload between two agents, hiding information from a competitor.

References

  1. Chiu-Wing Sham, Wai-Chiu Wong, and E. R. Y. Young. 2002. Congestion estimation with buffer planning in floorplan design. In Proceedings 2002 Design, Automation and Test in Europe Conference and Exhibition. 696--701.Google ScholarGoogle ScholarCross RefCross Ref
  2. Murilo Coutinho, et al. 2018. Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography. Sensors 18, 5 (2018).Google ScholarGoogle Scholar
  3. Guerric Meurice de Dormale and Jean-Jacques Quisquater. 2007. High-speed hardware implementations of Elliptic Curve Cryptography: A survey. Journal of Systems Architecture 53, 2 (2007), 72 -- 84.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Ian Goodfellow, et al. 2014. Generative Adversarial Nets. In Advances in Neural Information Processing Systems 27, Z. Ghahramani, M. Welling, C. Cortes, N. D. Lawrence, and K. Q. Weinberger (Eds.). Curran Associates, Inc., 2672--2680.Google ScholarGoogle Scholar
  5. Goshgar Ismayilov and Haluk Rahmi Topcuoglu. 2020. Neural network based multi-objective evolutionary algorithm for dynamic workflow scheduling in cloud computing. Future Generation Computer Systems 102 (2020), 307 -- 322.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. Katz and Y. Lindell. 2008. Introduction to modern cryptography. Chapman & Hall/CRC.Google ScholarGoogle Scholar
  7. Chun-Yan Lo, Francis C. M. Lau, and Chiu-Wing Sham. 2018. Fixed-Point Implementation of Convolutional Neural Networks for Image Classification. In 2018 International Conference on Advanced Technologies for Communications (ATC). 105--109.Google ScholarGoogle Scholar
  8. Jingwei Lu, Wing-Kai Chow, and Chiu-Wing Sham. 2012. A new clock network synthesizer for modern VLSI designs. Integration 45, 2 (2012), 121 -- 131.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. L. Ma, Chiu-Wing Sham, J. Sun, and R. V. Tenorio. 2019. A Real-Time Flexible Telecommunication Decoding Architecture using FPGA Partial Reconfiguration. IEEE Transactions on Circuits and Systems II: Express Briefs (2019), 1--1.Google ScholarGoogle Scholar
  10. Jakub Nalepa, et al. 2020. Towards resource-frugal deep convolutional neural networks for hyperspectral image segmentation. Microprocessors and Microsystems 73 (2020), 102994.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Tai-Wen Yue and Suchen Chiang. 2000. A neural network approach for visual cryptography. In Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks. IJCNN 2000. Neural Computing: New Challenges and Perspectives for the New Millennium, Vol. 5. 494--499 vol.5.Google ScholarGoogle Scholar
  12. R. Valencia, C. Sham, and O. Sinnen. 2019. Using Neuroevolved Binary Neural Networks to solve reinforcement learning environments. In 2019 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS). 301--304.Google ScholarGoogle Scholar
  13. R. Valencia, C. W. Sham, and O. Sinnen. 2019. Evolved Binary Neural Networks Through Harnessing FPGA Capabilities. In 2019 International Conference on Field-Programmable Technology (ICFPT). 395--398.Google ScholarGoogle Scholar
  14. Wenwu Yu and Jinde Cao. 2006. Cryptography based on delayed chaotic neural networks. Physics Letters A 356, 4 (2006), 333 -- 338.Google ScholarGoogle ScholarCross RefCross Ref
  15. Y. Zhu, et al. 2018. Neural Cryptography Based on the Topology Evolving Neural Networks. In 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW). 472--478.Google ScholarGoogle Scholar

Index Terms

  1. Preliminary study of applied binary neural networks for neural cryptography

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          GECCO '20: Proceedings of the 2020 Genetic and Evolutionary Computation Conference Companion
          July 2020
          1982 pages
          ISBN:9781450371278
          DOI:10.1145/3377929

          Copyright © 2020 Owner/Author

          Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 8 July 2020

          Check for updates

          Qualifiers

          • poster

          Acceptance Rates

          Overall Acceptance Rate1,669of4,410submissions,38%

          Upcoming Conference

          GECCO '24
          Genetic and Evolutionary Computation Conference
          July 14 - 18, 2024
          Melbourne , VIC , Australia

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader