Research on Encryption Algorithm Based on the Chebyshev Neural Network

Article Preview

Abstract:

The author gives an insight of some CNNs-based cryptosystems, and then figure out the encryption algorithm based on the Chebyshev neural network is not as secure as it is announced since any attacker is able to decrypt the cipher-text by network synchronization.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

884-886

Citation:

Online since:

February 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Zou A-Jin, Xiao Xiu-Chun. Chebyshev neural network identifier. Coal mine automation. 4, 10 -11(1998).

Google Scholar

[2] Liu NianSheng, Guo DongHui, Wu BoXi. Chaotic neural network and its application in secure communication . Telecommunications technology. 5, 141-146. (2002).

Google Scholar

[3] Liu NianSheng, Guo DongHui, Wu BoXi. Chaotic neural network and its application in secure communication. Computer application . 11: 40-43. (2002).

Google Scholar

[4] Zou A-jin, Xiao Chun-xiu. Asynchronous encryption based on chaotic neural network control system. Computer engineering. 34(12): 160-161. (2008).

Google Scholar

[5] Liu Guang-jie. One way Hash function based on chaotic neural network [J]. Journal of physics. 55(11): 5688-5693. (2006).

Google Scholar