Design And Implementation  of Network Security Using Neural Network

Authors

  • Pankaj Sadhukhan Bachelor of Computer Science, Ramakrishna Mission Vivekananda Centenary College, Rahara, West Bengal, India Author
  • Aniruddha Karmokar Bachelor of Computer Science, Ramakrishna Mission Vivekananda Centenary College, Rahara, West Bengal, India Author
  • Arkodip Ganguly Bachelor of Computer Science, Ramakrishna Mission Vivekananda Centenary College, Rahara, West Bengal, India Author
  • Soumya Paul Principal and Professor in Computer Science Engineering, St. Mary’s Technical Campus Kolkata, West Bengal, India Author

DOI:

https://doi.org/10.32628/IJSRST52411186

Keywords:

Symmetric Key Cryptography, Neural Network

Abstract

The number of internet users is increasing day by day. To keep internet surfing safe from vulnerable exploits we need to design new powerful algorithm. Hence this paper is mainly concerns with implementation of Neural Network using symmetric key cryptography to ensure confidentiality, authentication, integrity and message non-repudiation. In order to achieve the above objectives first an encryption algorithm is developed and implemented. The program takes a plain text as an input from the user to generate an intermediate cipher text and sends it to the source node of the neural network. At this point the intermediate cypher text is passed through some successive hidden layers of neural network’s concept to produce final cipher text. Now to recover the plain text from the final cipher text a decryption algorithm is developed and implemented.              

Downloads

Download data is not yet available.

References

Cryptography and Network Security, Third Edition, by Atul Kahate.

An Introduction to Neural Networks, by Kevin Gurney, Kevin N. Gurney.

Downloads

Published

03-04-2024

Issue

Section

Research Articles

How to Cite

Design And Implementation  of Network Security Using Neural Network. (2024). International Journal of Scientific Research in Science and Technology, 11(2), 22-27. https://doi.org/10.32628/IJSRST52411186

Similar Articles

1-10 of 88

You may also start an advanced similarity search for this article.