Extreme learning machine based sub-key generation for cryptography system
The key generation process is the substantial step in any cryptosystem. Incorporating Artificial Neural Network (ANN) in the algorithmic work of cryptography achieves good performance in realizing high accuracy and security. In this paper, ANN based sub-key generation algorithm is presented. Extreme...
Main Authors: | , , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2015
|
Subjects: | |
Online Access: | http://eprints.utm.my/61676/1/RobiahAhmad2015_ExtremeLearningMachineBasedSub-Key.pdf |
_version_ | 1796861144287150080 |
---|---|
author | Atee, Hayfaa Abdulzahra Ahmad, Robiah Mohd. Noor, Norliza Rahma, Abdul Monem S. |
author_facet | Atee, Hayfaa Abdulzahra Ahmad, Robiah Mohd. Noor, Norliza Rahma, Abdul Monem S. |
author_sort | Atee, Hayfaa Abdulzahra |
collection | ePrints |
description | The key generation process is the substantial step in any cryptosystem. Incorporating Artificial Neural Network (ANN) in the algorithmic work of cryptography achieves good performance in realizing high accuracy and security. In this paper, ANN based sub-key generation algorithm is presented. Extreme learning Machine (ELM) type is adopted for one hidden layer neural network. Initial key includes all needed information about ANN topology, activation function, and seeds for Pseudo-Random Number Generation (PRNG) in each round to initialize input-hidden layer weights and data. Sub-key in each round is generated from output layer weights. Evaluation measures have proved complete sensitivity and inevitability of this approach. In addition, it contributes in reducing the risks of breaking the symmetric key algorithms due to the generated independent sub-key in each round. Thus, it can be integrated in any cryptosystem for subkey generation. |
first_indexed | 2024-03-05T19:51:55Z |
format | Conference or Workshop Item |
id | utm.eprints-61676 |
institution | Universiti Teknologi Malaysia - ePrints |
language | English |
last_indexed | 2024-03-05T19:51:55Z |
publishDate | 2015 |
record_format | dspace |
spelling | utm.eprints-616762017-07-31T08:34:56Z http://eprints.utm.my/61676/ Extreme learning machine based sub-key generation for cryptography system Atee, Hayfaa Abdulzahra Ahmad, Robiah Mohd. Noor, Norliza Rahma, Abdul Monem S. QA76 Computer software The key generation process is the substantial step in any cryptosystem. Incorporating Artificial Neural Network (ANN) in the algorithmic work of cryptography achieves good performance in realizing high accuracy and security. In this paper, ANN based sub-key generation algorithm is presented. Extreme learning Machine (ELM) type is adopted for one hidden layer neural network. Initial key includes all needed information about ANN topology, activation function, and seeds for Pseudo-Random Number Generation (PRNG) in each round to initialize input-hidden layer weights and data. Sub-key in each round is generated from output layer weights. Evaluation measures have proved complete sensitivity and inevitability of this approach. In addition, it contributes in reducing the risks of breaking the symmetric key algorithms due to the generated independent sub-key in each round. Thus, it can be integrated in any cryptosystem for subkey generation. 2015 Conference or Workshop Item PeerReviewed application/pdf en http://eprints.utm.my/61676/1/RobiahAhmad2015_ExtremeLearningMachineBasedSub-Key.pdf Atee, Hayfaa Abdulzahra and Ahmad, Robiah and Mohd. Noor, Norliza and Rahma, Abdul Monem S. (2015) Extreme learning machine based sub-key generation for cryptography system. In: ICRIL International Conference of Innovation in Science and Technology, 20-21 April, 2015, Kuala Lumpur, Malaysia. |
spellingShingle | QA76 Computer software Atee, Hayfaa Abdulzahra Ahmad, Robiah Mohd. Noor, Norliza Rahma, Abdul Monem S. Extreme learning machine based sub-key generation for cryptography system |
title | Extreme learning machine based sub-key generation for cryptography system |
title_full | Extreme learning machine based sub-key generation for cryptography system |
title_fullStr | Extreme learning machine based sub-key generation for cryptography system |
title_full_unstemmed | Extreme learning machine based sub-key generation for cryptography system |
title_short | Extreme learning machine based sub-key generation for cryptography system |
title_sort | extreme learning machine based sub key generation for cryptography system |
topic | QA76 Computer software |
url | http://eprints.utm.my/61676/1/RobiahAhmad2015_ExtremeLearningMachineBasedSub-Key.pdf |
work_keys_str_mv | AT ateehayfaaabdulzahra extremelearningmachinebasedsubkeygenerationforcryptographysystem AT ahmadrobiah extremelearningmachinebasedsubkeygenerationforcryptographysystem AT mohdnoornorliza extremelearningmachinebasedsubkeygenerationforcryptographysystem AT rahmaabdulmonems extremelearningmachinebasedsubkeygenerationforcryptographysystem |