Neuro-Inspired Algorithms to Enhance Cryptography

Neuro-Inspired Algorithms to Enhance Cryptography

R. Thenmozhi (SRM Institute of Science and Technology, India), D. Vetriselvi (SRM Institute of Science and Technology, India), and A. Arokiaraj Jovith (SRM Institute of Science and Technology, India)
DOI: 10.4018/979-8-3693-4159-9.ch006
OnDemand:
(Individual Chapters)
Forthcoming
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Neurocryptology objective is to create novel and creative approaches to improve the security of cryptographic systems by incorporating knowledge from neuroscience, particularly the study of the cognitive functions of the human brain. Instead of using mathematical methods and keys to secure communication and data, neurocryptology makes use of knowledge about how the brain processes information and spots patterns. The form and operation of neural networks and biological brains serve as inspiration for neural-inspired algorithms, which have the potential to improve cryptography in several ways. Encryption keys can be created using neural networks. In order to improve encryption techniques, neural networks can be incorporated. Behavioral biometric authentication techniques can be improved by neural network-inspired algorithms. This chapter is discussing about the neuro inspired algorithms to enhance cryptographic protocols. It reviewing the different algorithms that underlie well-known cryptographic cryptosystems
Chapter Preview
Top

Introduction

Cryptography

The practice and study of methods for protecting data and communication against unauthorised access is known as cryptography.

Cryptography is a branch of study and application that deals with data security and communication by using encoding methods to make sure that only people with the proper authorization can access and understand the data. Ensuring the confidentiality, integrity, and authenticity of data and messages is crucial for a variety of applications, including safe online communication and data protection.

Here are the components of cryptography:

Figure 1.

Components of cryptographic system

979-8-3693-4159-9.ch006.f01
  • Plain Text: It is imperative to ensure the protection of data during the process of transmission.

  • Encryption Algorithm: The process of converting a given plaintext and encryption key into a ciphertext can be achieved through the utilisation of a mathematical approach known as an encryption algorithm. The cryptographic method generates ciphertext by utilising an encryption key and plaintext as input.

  • Ciphertext: The ciphertext refers to the transformed version of the plaintext that is generated via the utilisation of an encryption method and a specific encryption key. The security measures implemented for the encrypted text are insufficient. It exhibits a continuous movement through a publicly accessible conduit. The interception or compromising of a communication channel is possible for any individual who possesses access to it.

  • Decryption Algorithm: The decryption algorithm is a mathematical technique that, when provided with a ciphertext and decryption key, produces a unique plaintext. The cryptographic technique in question can produce plaintext by utilising a decryption key and an input of ciphertext. The decryption algorithm and the encryption algorithm are intimately interconnected due to their inherent reversal of operations.

  • Encryption Key: The encryption key is known to the sender. To derive the ciphertext, the sender inputs both the encryption key and the plaintext into the encryption process.

  • Decryption Key: The decryption key is a value that is known to the recipient. While the decryption key and the encryption key may not be identical, they are intrinsically linked. To determine the original plaintext, the recipient inputs the encrypted message, known as the ciphertext, together with the decryption key into the decryption algorithm.

Complete Chapter List

Search this Book:
Reset