Design and Implementation of Network Security Using Neural Network Architecture
Design and Implementation of Network Security Using Neural Network Architecture
ORG
115
Assistant Prof., Assoc. Prof., Dept. of Computer Application, B. P. Poddar Institute of Management & Technology, Affiliated to West Bengal University of Technology
MCA final year Dept. of Computer Application, B. P. Poddar Institute of Management & Technology, Affiliated to West Bengal University of Technology
Abstract: Over the last few years, secured transmission of data has been a major issue in data communication. This implementation mainly concerns about the security of confidential information and data transmission through Neural Network in order to provide confidentiality, authentication, integrity and non-repudiation of the messages. First, an encryption algorithm is developed and implemented to achieve the aforesaid purpose. It is basically a program that takes any plain text as input from the user and produces a cipher text which is sent to the source node of neural network. Now the cipher text is again encrypted and fragmented in successive layers of neural networks concept and finally all the fragments are collected and decrypted at destination node to get the cipher text which was input to the source node. Then the cipher text is decrypted to get original plain text.
2. Problem Statement
Encryption method follows as the first and the basic criteria in order to encrypt a plain text is to input a password because the key array is generated from this password. In symmetrickey cryptography, it is obvious that when a text is encrypted with a secret key, it is decrypted with the same key. The plain text is encrypted to produce cipher (cipher 0) using key array. The cipher 0 text is sent as input to the source node of neural network and the cipher get encrypted in successive layers and
JOURNAL OF COMPUTING, VOLUME 4, ISSUE 8, AUGUST 2012, ISSN (Online) 2151-9617 https://sites.google.com/site/journalofcomputing WWW.JOURNALOFCOMPUTING.ORG
116
decrypted at destination node to produce the initial cipher (cipher 0). The same key array is used in decryption to get back the actual text. So, decryption requires knowledge of the same key.
Send e1 to NODE N+1 of layer L+1 ELSE Step 4: Set e: = ASCII (cipher character) key[i]-w. Send e to Node N +2 of layer L+1 Step 5: Set i: = i+1. Step 6: Stop
Encryption: cipher 0 = encrypt (plaintext, key []) Encryption at layer l of neural network: cipher n= decrypt (cipher, key [], weight of node n ) Decryption at destination: cipher 0 = decrypt ( cipher n, key[] ,weight of destination) Decryption: Plaintext = decrypt (cipher 0, key [])
JOURNAL OF COMPUTING, VOLUME 4, ISSUE 8, AUGUST 2012, ISSN (Online) 2151-9617 https://sites.google.com/site/journalofcomputing WWW.JOURNALOFCOMPUTING.ORG
117
(pos) (26pos)
So, We take Key[ ]={18,11,12,21,1,24,21,21} STEP 3: We change our Initial Matrix I (6 X6) into a new Reference Matrix R (6X6) using position of element of password (pos):
This is our Reference Matrix R (6X6) STEP 4: Let us take a plain text which is required to be encrypted. Plain text: THE SKY IS BLUE The text consists of 15 characters. So, a (4X4) matrix would be sufficient to accommodate all characters as follows:
0 T S I L 1 H K S U 2 E Y @ E 3 @ @ B @
The 1st elemen t in password array is H. So, we reverse the Row that consists of H and we get the following:
0 @ F L R X 1 A G M S Y 2 B H N T Z 3 C I O U 4 D J P V 5 E K Q W
0 1 2 3 4 5
0 0 6 12 18 24
1 1 7 13 19 25
2 2 8 14 20 26
3 3 9 15 21
4 4 10 16 22
5 5 11 17 23
0 1 2 3 4 5
0 1 2 3
0 1 2 3
@ K L R X A J M S Y B I N T Z C H O U D G P V E F Q W
0 20 19 9 12
1 8 11 19 21
2 5 25 0 5
3 0 0 2 0
0 1 2 3 4 5
STEP 5: Now, we take a matrix B (4X4) where B (i, j) =26-A (i, j). Matrix (B) =>
0 1 2 3 0 6 7 17 14 1 18 15 7 5 2 21 1 26 21 3 26 26 24 26
The 2nd element in password array is O. So, we reverse the Column that consists of O and we get the following:
JOURNAL OF COMPUTING, VOLUME 4, ISSUE 8, AUGUST 2012, ISSN (Online) 2151-9617 https://sites.google.com/site/journalofcomputing WWW.JOURNALOFCOMPUTING.ORG
118
G
0 F G Q N 1 R O G E 2 U A Z U 3 Z Z X Z
0 1 2 3
0 1 2 3
0 1 2 3
0 Z G X N
1 U O Z E
2 R A G U
3 F Z Q Z
=> 7 => I (1, 1) => R (1, 1) => J Z => 26 => I (4, 2) => R (4, 2) => B A => 1 => I (0, 1) => R (0, 1) => A Q => 17 => I (2, 5) => R (2, 5) => F X => 24 => I (4, 0) => R (4, 0) => @ O => 15 => I (2, 3) => R (2, 3) => N G => 7 => I (1, 1) => R (1, 1) => J Z => 26 => I (4, 2) => R (4, 2) => B N => 14 => I (2, 2) => R (2, 2) => H U => 21 => I (3, 3) => R (3, 3) => I U => 21 => I (3, 3) => R (3, 3) => I F => 6 => I (1, 0) => R (1, 0) => E So, the text now becomes: BWKBJBAF@NJBHIIE i.e. BWKBJBAF NJBHIIE which is to be send through neural network.
0 1 2 3
B. Neural Network
Text received at Node 1: BWKBJBAF@NJBHIIE Node 1: Weight (w) =1 Read the 1st character: B position (1st position)] ASCII (B) =67 Weight (w) =1 1) Key [0] =18 ASCII (66-18-
[B is in Odd
0 1 2 3
0 Z G X N
1 E Z O U
2 R A G U
3 Z Q Z F
The sentence becomes: ZERZGZAQXOGZNUUF STEP 8: Now, we encrypt the above text taking the position of each character in the text with respect to our Initial Matrix I (6 X6) and corresponding Reference matrix R (6X6) as shown below: Z => 26 => I (4, 2) => R (4, 2) => B E => 5 => I (0.5) => R (0, 5) => W R => 18 => I (3, 0) => R (3, 0) => K Z => 26 => I (4, 2) => R (4, 2) => B
Node 1: Weight (w) =1 Read the 2nd character: W [W is in Even position (2nd position)] ASCII (w) =87 Weight (w) =1 Key [1] =11 ASCII (87+11+1) ASCII (99) Node 2 c
JOURNAL OF COMPUTING, VOLUME 4, ISSUE 8, AUGUST 2012, ISSN (Online) 2151-9617 https://sites.google.com/site/journalofcomputing WWW.JOURNALOFCOMPUTING.ORG
119
And so on.
C. Decryption
STEP 1: We take @ =0 and [A-Z] = [1-26] as follows: 0 @ 10 J 20 T 1 A 11 K 21 U 2 B 12 L 22 V 3 C 13 M 23 W 4 D 14 N 24 X 5 E 15 O 25 Y 6 F 16 P 26 Z 7 G 17 Q 8 H 18 R 9 I 19 S
0 1 2 3 4 5
0 Z E Q K @
1 A J P V Y
2 X T H C B
3 U O N I
4 D G M S
5 W L F R
STEP 4: Text received at Node 6(Destination Node): BWKBJBAF@NJBHIIE Now, we decrypt the above text taking the position of each character in the text with respect to our Initial Matrix I (6 X6) and corresponding Reference matrix R (6X6) as shown below: B => => => => => => => => => => => => => => => => => => => => => => => => => => => => => => => => R (4, 2) => 26 => R (0, 5) 5 R (3, 0) 18 R (4, 2) 26 R (1, 1) 7 R (4, 2) 26 R (0, 1) 1 R (2, 5) 17 R (4, 0) 24 R (2, 3) 15 R (1, 1) 7 R (4, 2) 26 R (2, 2) 14 R (3, 3) 21 R (3, 3) 21 R (1, 0) 6 => => => => => => => => => => => => => => => => => => => => => => => => => => => => => => I (4, 2) Z I (0.5) E I (3, 0) R I (4, 2) Z I (1, 1) G I (4, 2) Z I (0, 1) A I (2, 5) Q I (4, 0) X I (2, 3) O I (1, 1) G I (4, 2) Z I (2, 2) N I (3, 3) U I (3, 3) U I (1, 0) F
W
0 1 2 3 4 5 0 0 6 12 18 24 1 1 7 13 19 25 2 2 8 14 20 26 3 3 9 15 21 4 4 10 16 22 5 5 11 17 23
Now w
K B J B
A F @
(pos)
STEP 3: We change our Initial Matrix I (6 X6) to generate a new Reference Matrix R (6X6) using position of element of password (pos) as shown in Step 3 of Encryption.
N J B H
0 1 2 3 4 5
0 @ F L R X
1 A G M S Y
2 B H N T Z
3 C I O U
4 D J P V
5 E K Q W
I I E
JOURNAL OF COMPUTING, VOLUME 4, ISSUE 8, AUGUST 2012, ISSN (Online) 2151-9617 https://sites.google.com/site/journalofcomputing WWW.JOURNALOFCOMPUTING.ORG
120
0 1 2 3
0 26 7 24 14
1 5 26 15 21
2 18 1 7 21
3 26 17 26 6
public and ii) Private Key, which is kept secret. Any message encrypted using private key can be decrypted using public key or vice versa. So, the message gets decrypted when it is encrypted by only the authenticated person who knows the private key.
5. References: Books:
1. Cryptography and Network Security, Third Edition, by William Stallings. Cryptography And Network Security (Sie), By Forouzan. An Introduction to Neural Networks, by Kevin Gurney, Kevin N. Gurney.
0 1 2 3
0 1 2 3
0 26 7 24 14
1 21 15 26 5
2 18 1 7 21
3 6 26 17 26
2. 3.
0 1 2 3
0 1 2 3
0 6 7 17 14
1 18 15 7 5
2 21 1 26 21
3 26 26 24 26
0 1 2 3
4. Conclusion:
Implementation of Cryptographic Algorithm (encryption and decryption Schemes) using asymmetric keys contains two keys: i) Public Key, which is known to