PRNG Implementation Based on Chaotic Neural Network (CNN)
In this work, a neural network with chaos activation function has been applied as a pseudo-random number generator (PRNG). Chaotic neural network (CNN) is used because of its noise like behaviour which is important for cryptanalyst to know about the hidden information as it is hard to predict. A suitable adaptive architecture was adopted to generate a binary number and the result was tested for randomness using National Institute of Standard Technology (NIST) randomness tests.
Although the applications of CNN in cryptography have less effective than traditional implementations, this is because these systems need large numbers of digital logic or even a computer system. This work will focus on applications that can use the proposed system in an efficient way that minimize the system complexity.
2. Ü. Güler and S. Ergün, “A high speed, fully digital IC random number generator,” International Symposium on Circuits and Systems (ISCAS 2010), Paris, France. May 30-June 2, 2010.
3. A. Rukhin, et al. "A Statistical Test Suite for Random and Pseudo-random Number Generators for Cryptographic Applications”, NIST Special Publication 800-22, 2001.
4. S. Chatzidakis, P. Forsberg, and L. H. Tsoukalas, “Chaotic neural networks for intelligent signal encryption,” IEEE 5th International Conference on Information, Intelligence, Systems and Applications, IISA 2014.
5. P. Singla, P. Sachdeva, and M. Ahmad, “A chaotic neural network based Cryptographic pseudo-random sequence design,” 4th International Conference on Advanced Computing & Communication Technologies, ACCT '14, 2014.
6. F. Hsiao, Y. Tsai, K. Hsieh and Z. Lin, “Fuzzy Control for Exponential H∞ Synchronization of Chaotic Cryptosystems Using an Improved Genetic Algorithm,” 11th IEEE.
International Conference on Control & Automation (ICCA), Taichung, Taiwan. June 18-20, 2014.
7. S. Behnia, A. Akhavan, A. Akhshani, and A. Samsudin ,“ A novel dynamic model of pseudo random number generator,” Journal of Computational and Applied Mathematics 235 (2011) 3455–3463.
8. A. Akhshani, A. Akhavan, A. Mobaraki, S.-C. Lim, and Z. Hassan, “Pseudo random number generator based on quantum chaotic map,” Commun Nonlinear Sci Numer Simulat 19 (2014) 101–111.
9. A. S. Mansingka, A. G. Radwan, and K. N. Salama, “ Fully digital 1-D, 2-D and 3-D multiscroll chaos as hardware pseudo random number generators,” 55th IEEE International Midwest Symposium on Circuits and Systems (MWSCAS) Circuits and Systems (MWSCAS), pp 1180-1183. August 2012.
10. Shiguo Lian, “A block cipher based on chaotic neural networks,” Neurocomputing 72, pp. 1296–1301, 2009.
11. Ö. F. Ertuğrul, “A Novel Approach to Synchronization Problem of Artificial Neural Network in Cryptography,” American Association for Science and Technology, AASCIT Communications, Volume 1, Issue 2, pp. 27-32, July 2014.
12. A. Yay and Y. Kutlu, “Neural network based cryptography,” Neural Network World 24 (2), 177-192, 2014.
13. S. D. Joshi, V. R. Udupi, and D. R. Joshi, “A novel neural network approach for digital image data encryption/decryption,” IEEE International Conference on Power, Signals, Controls and Computation (EPSCICON), June 2012.
14. S. Jhajharia, S. Mishra, and S. Bali, “Public key cryptography using neural networks and genetic algorithms,” IEEE 6th International Conference on Contemporary Computing (IC3), pp. 137-142. Aug. 2013.
15. P. Kotlarz and Z. Kotulski, “Neural network as a programmable block cipher,” Advances in Information Processing and Protection, pp 241-250, 2007.
16. A. A. El-Zoghabi, A. H. Yassin, and H. H. Hussien, “Survey report on cryptography based on neural network,” International Journal of Emerging Technology and Advanced Engineering, vol. 3, Issue 12, Dec 2013.
17. A. G. Bafghi, R. Safabakhsh, and B. Sadeghiyan, “Finding the differential characteristics of block ciphers with neural networks,” Information Sciences 178, pp. 3118–3132, 2008.
18. L. P. Yee and L. C. De Silva, “Application of multilayer perceptron networks in symmetric block ciphers,” International Symposium on Neural Networks - ISNN , vol. 2, pp. 1455-1458, 2002.
19. M. Arvandi, S. Wu and A. Sadeghian, “On the use of recurrent neural networks to design symmetric ciphers,” IEEE Computational Intelligence Magazine, vol. 3, no. 2, pp. 42-53, May 2008.
20. J. M. Zurada, Introduction to Artificial Neural Systems, West Publishing Company, 1992.
21. (2014, Dec 15). Chaotic System, Available: http://www.businessdictionary.com/definition/chaotic-system.html#ixzz3LujgV3Th.
22. P. Y. Kostenko, A. N. Barsukov, A. V. Antonov, and S. I. Sivachinko, “Recovery of binary message, masked with derivative of mackey–glass chaotic process,” Radioelectronics and Communications Systems, vol. 52, no. 2, pp. 89–9, 2009.
23. D. Viswanath, “The fractal property of the Lorenz attractor,” Physica D 190, pp.115–128, 2004.
24. E. McEvoy, “Using Matlab to integrate ordinary differential equations (ODEs),” June 17, 2009.
25. (2014, Dec 15). Lorenz system, available: http://en.wikipedia.org/wiki/Lorenz_system.
26. [Y. Li, D. Xiao, S. Deng, Q. Han, and G. Zhou, “Parallel Hash function construction based on chaotic maps with changeable parameters,” Neural Computing and Applications, 20, pp.1305–1312, 2011.
How to Cite
Authors retain copyright
The use of a Creative Commons License enables authors/editors to retain copyright to their work. Publications can be reused and redistributed as long as the original author is correctly attributed.
- The researcher(s), whether a single or joint research paper, must sell and transfer to the publisher (the Academic Journal of Nawroz University) through all the duration of the publication which starts from the date of entering this Agreement into force, the exclusive rights of the research paper/article. These rights include the translation, reuse of papers/articles, transmit or distribute, or use the material or parts(s) contained therein to be published in scientific, academic, technical, professional journals or any other periodicals including any other works derived from them, all over the world, in English and Arabic, whether in print or in electronic edition of such journals and periodicals in all types of media or formats now or that may exist in the future. Rights also include giving license (or granting permission) to a third party to use the materials and any other works derived from them and publish them in such journals and periodicals all over the world. Transfer right under this Agreement includes the right to modify such materials to be used with computer systems and software, or to reproduce or publish it in e-formats and also to incorporate them into retrieval systems.
- Reproduction, reference, transmission, distribution or any other use of the content, or any parts of the subjects included in that content in any manner permitted by this Agreement, must be accompanied by mentioning the source which is (the Academic Journal of Nawroz University) and the publisher in addition to the title of the article, the name of the author (or co-authors), journal’s name, volume or issue, publisher's copyright, and publication year.
- The Academic Journal of Nawroz University reserves all rights to publish research papers/articles issued under a “Creative Commons License (CC BY-NC-ND 4.0) which permits unrestricted use, distribution, and reproduction of the paper/article by any means, provided that the original work is correctly cited.
- Reservation of Rights
The researcher(s) preserves all intellectual property rights (except for the one transferred to the publisher under this Agreement).
- Researcher’s guarantee
The researcher(s) hereby guarantees that the content of the paper/article is original. It has been submitted only to the Academic Journal of Nawroz University and has not been previously published by any other party.
In the event that the paper/article is written jointly with other researchers, the researcher guarantees that he/she has informed the other co-authors about the terms of this agreement, as well as obtaining their signature or written permission to sign on their behalf.
The author further guarantees:
- The research paper/article does not contain any defamatory statements or illegal comments.
- The research paper/article does not violate other's rights (including but not limited to copyright, patent, and trademark rights).
This research paper/article does not contain any facts or instructions that could cause damages or harm to others, and publishing it does not lead to disclosure of any confidential information.