Design And Implementation of Network Security Using Neural Network
DOI:
https://doi.org/10.32628/IJSRST52411186Keywords:
Symmetric Key Cryptography, Neural NetworkAbstract
The number of internet users is increasing day by day. To keep internet surfing safe from vulnerable exploits we need to design new powerful algorithm. Hence this paper is mainly concerns with implementation of Neural Network using symmetric key cryptography to ensure confidentiality, authentication, integrity and message non-repudiation. In order to achieve the above objectives first an encryption algorithm is developed and implemented. The program takes a plain text as an input from the user to generate an intermediate cipher text and sends it to the source node of the neural network. At this point the intermediate cypher text is passed through some successive hidden layers of neural network’s concept to produce final cipher text. Now to recover the plain text from the final cipher text a decryption algorithm is developed and implemented.
Downloads
References
Cryptography and Network Security, Third Edition, by Atul Kahate.
An Introduction to Neural Networks, by Kevin Gurney, Kevin N. Gurney.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 International Journal of Scientific Research in Science and Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.