Skip to main content

Parallelization of a Block Cipher Based on Chaotic Neural Networks

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 9120))

Abstract

In this paper the results of parallelizing a block cipher based on chaotic neural networks are presented. A data dependence analysis of loops is applied in order to parallelize the algorithm. The parallelism of the algorithm is demonstrated in accordance with the OpenMP standard. As a result of this study, it is stated that the most time-consuming loops of the algorithm are suitable for parallelization. The efficiency measurements of a parallel algorithm working in standard modes of operation are shown.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Guo, D., Cheng, L., Cheng, L.: A New Symmetric Probabilistic Encryption Scheme based on chaotic attractors of neural networks. Applied Intelligence 10(1), 71–84 (1999)

    Article  Google Scholar 

  2. Chan, C., Cheng, L.: The Convergence Properties of a Clipped Hopfield Network and its Application in the Design of Keystream Generator. IEEE Transactions on Neural Networks 12(2), 340–348 (2001)

    Article  Google Scholar 

  3. Rachel, M., Einat, K., Wolfgang, K.: Public Channel Cryptography by Synchronization of Neural Networks and Chaotic Maps. Physical Review Letters 91(11), 118701/1–118701/4 (2003)

    Google Scholar 

  4. Karras, D., Zorkadis, V.: On Neural Network Techniques in the Secure Management of Communication Systems through Improving and Quality Assessing Pseudorandom stream Generators. Neural Netwtworks 16(5-6), 899–905 (2003)

    Article  Google Scholar 

  5. Lian, S., Chen, G., Cheung, A., Wang, Z.: A Chaotic-Neural-Network-Based Encryption Algorithm for JPEG2000 Encoded Images. In: Yin, F.-L., Wang, J., Guo, C. (eds.) ISNN 2004. LNCS, vol. 3174, pp. 627–632. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  6. Xiao, D., Liao, X.: A Combined Hash and Encryption Scheme by Chaotic Neural Network. In: Yin, F.-L., Wang, J., Guo, C. (eds.) ISNN 2004. LNCS, vol. 3174, pp. 633–638. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  7. Yu, W., Cao, J.: Cryptography Based on Delayed Chaotic Neural Networks. Physics Letters A 356(4-5), 333–338 (2006)

    Article  MATH  Google Scholar 

  8. Lian, S.: A Block Bipher Based on Chaotic Neural Networks. Neurocomputing 72, 1296–1301 (2009)

    Article  Google Scholar 

  9. Lian, S., Chen, X.: Traceable Content Protection Based on Chaos and Neural Networks. Applied Soft Computing 11(7), 4293–4301 (2011)

    Article  Google Scholar 

  10. Fadil, T.A., Yaakob, S.N., Ahmad, R.B., Yahya, A.: A Chaotic Neural Network-Based Encryption Algorithm for MPEG-2 Encoded Video Signal. International Journal of Artificial Intelligence and Soft Computing 3(4), 360–371 (2013)

    Article  Google Scholar 

  11. Bielecki, W., Burak, D.: Exploiting Loop-Level Parallelism in the AES Algorithm. WSEAS Transactions on Computers 5(1), 125–133 (2006)

    Google Scholar 

  12. Beletskyy, V., Burak, D.: Parallelization of the IDEA Algorithm. In: Bubak, M., van Albada, G.D., Sloot, P.M.A., Dongarra, J. (eds.) ICCS 2004. LNCS, vol. 3036, pp. 635–638. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  13. Burak, D.: Parallelization of Encryption Algorithm Based on Chaos System and Neural Networks. In: Wyrzykowski, R., Dongarra, J., Karczewski, K., Waśniewski, J. (eds.) PPAM 2013, Part II. LNCS, vol. 8385, pp. 364–373. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

  14. Masuda, N., Aihara, K.: Cryptosystems with Discretized Chaotic Maps. IEEE Transactionson Circuits and Systems I: Fundamental Theory and Applications 49(1), 28–40 (2002)

    Article  MathSciNet  Google Scholar 

  15. Kelly, W., Maslov, V., Pugh, W., Rosser, E., Shpeisman, T., Wonnacott, D.: New User Interface for Petit and Other Extensions. User Guide (1996)

    Google Scholar 

  16. Chapman, B., Jost, G., van der Pas, R.: Using OpenMP - Portable Shared Memory Parallel Programming. MIT Press (2007)

    Google Scholar 

  17. OpenMP Application Program Interface. Version 4.0 (July 2013)

    Google Scholar 

  18. Allen, R., Kennedy, K.: Optimizing compilers for modern architectures: A Dependencebased Approach. Morgan Kaufmann Publishers, Inc. (2001)

    Google Scholar 

  19. Aho, A., Lam, M., Sethi, R., Ullman, J.: Compilers: Principles, Techniques, and Tools, 2nd edn. Prentice-Hall (2006)

    Google Scholar 

  20. Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. John Wiley & Sons (1995)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dariusz Burak .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Burak, D. (2015). Parallelization of a Block Cipher Based on Chaotic Neural Networks. In: Rutkowski, L., Korytkowski, M., Scherer, R., Tadeusiewicz, R., Zadeh, L., Zurada, J. (eds) Artificial Intelligence and Soft Computing. ICAISC 2015. Lecture Notes in Computer Science(), vol 9120. Springer, Cham. https://doi.org/10.1007/978-3-319-19369-4_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-19369-4_18

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-19368-7

  • Online ISBN: 978-3-319-19369-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics