skip to main content
10.1145/3475827.3475835acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicomsConference Proceedingsconference-collections
research-article

The Application of Neural Networks in Cryptography

Published:27 October 2021Publication History

ABSTRACT

In this paper, it will be shown cooperation between Petri nets and neural networks. The approach to the formation of the structure of a neural network with the help of Petri nets model , which you can describe the algorithms and, in particular, encryption algorithms Built model in networks Petri, according to the proposed approach, is the basis for further construction neural network. The idea of an informal transformation, which makes sense from because the structure of the Petri net provides a justification for the structure of the neural network, which leads to a decrease in the number of parameters for training in the neural network (in the considered). At the same time, training is only a fine adjustment of the parameter values. Also the transformation can be explained by the fact that both Petri nets and neural networks are function description languages, with the difference that in the case of neural networks, the function being set must first be trained (or find the values of the parameters). This is discussed by the example of a simulator for encryption algorithms nets. Also, in the article Probabilistic Petri Nets and their properties are described, except for the technique of their use for system's research. 5 theorems are proved and 5 generalizing conclusions about application of languages of to a problem of Probabilistic Petri nets resolvability are made.

References

  1. Rovinelli, A., Sangid, M.D., Proudhon, H., Ludwig, W. Using machine learning and a data-driven approach to identify the small fatigue crack driving force in polycrystalline materials (2018) npj Computational Materials, 4 (1), article № 35, .Google ScholarGoogle Scholar
  2. Wang, Z., Liang, M., Delahaye, D. A hybrid machine learning model for short-term estimated time of arrival prediction in terminal manoeuvring area (2018) Transportation Research Part C: Emerging Technologies, 95, pp. 280-294.Google ScholarGoogle Scholar
  3. Mazuroski, W., Berger, J., Oliveira, R.C.L.F., Mendes, N. An artificial intelligence-based method to efficiently bring CFD to building simulation (2018) Journal of Building Performance Simulation, 11 (5), pp. 588-603.Google ScholarGoogle ScholarCross RefCross Ref
  4. Hawchar, L., El Soueidy, C.-P., Schoefs, F. Global kriging surrogate modeling for general time-variant reliability-based design optimization problems (2018) Structural and Multidisciplinary Optimization, 58 (3), pp. 955-968.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Liouane, Z., Lemlouma, T., Roose, P., Weis, F., Messaoud, H. An improved extreme learning machine model for the prediction of human scenarios in smart homes (2018) Applied Intelligence, 48 (8), pp. 2017-2030.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Gonzalez, R., Fiacchini, M., Iagnemma, K. Slippage prediction for off-road mobile robots via machine learning regression and proprioceptive sensing (2018) Robotics and Autonomous Systems, 105, pp. 85-93.Google ScholarGoogle Scholar
  7. Genevès, P., Calmant, T., Layaïda, N., Lepelley, M., Artemova, S., Bosson, J.-L. Scalable Machine Learning for Predicting At-Risk Profiles Upon Hospital Admission (2018) Big Data Research, 12, pp. 23-34..Google ScholarGoogle Scholar
  1. The Application of Neural Networks in Cryptography

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        ICoMS '21: Proceedings of the 2021 4th International Conference on Mathematics and Statistics
        June 2021
        102 pages
        ISBN:9781450389907
        DOI:10.1145/3475827

        Copyright © 2021 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 27 October 2021

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited
      • Article Metrics

        • Downloads (Last 12 months)16
        • Downloads (Last 6 weeks)1

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format