Symmetric Encryption using Artificial Neural Network, Binary Tree Traversal, and Interleaving Salting
We have proposed a novel way of symmetric encryption utilizing interleaving salting, Binary Tree traversal, and an Artificial Neural Network in a sequential manner. We have presented the use of an Artificial Neural Network as an invertible(reversible) mathematical function so that decryption of the...
Saved in:
Published in | International journal of engineering and advanced technology Vol. 11; no. 6; pp. 96 - 100 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
30.08.2022
|
Online Access | Get full text |
Cover
Loading…
Abstract | We have proposed a novel way of symmetric encryption utilizing interleaving salting, Binary Tree traversal, and an Artificial Neural Network in a sequential manner. We have presented the use of an Artificial Neural Network as an invertible(reversible) mathematical function so that decryption of the encrypted output may be possible. Knowledge of the encryption pipeline, salt, and neural network weights is required for decryption. As the same set of values is required for encryption and decryption, our proposed approach is a type of symmetric-key algorithm. Each user will have a unique key. Thus if a key attributing to a particular user is compromised, the integrity of the data of the remaining users will still be maintained. Our approach can be utilized to encrypt text data such as messages, documents, and letters. The encryption process consists of interleaving salting, creation of binary tree by considering the input as its level order traversal, and passing the preorder and inorder traversal of the constructed binary tree as input to the Artificial Neural Network. The output of the Artificial Neural Network would be the encrypted data. Decryption would require determining the input of an Artificial Neural Network from the output, hence solving multiple sets of linear equations and constructing a binary tree from its preorder and inorder traversal. We have then analyzed the variation of performance with the change in the input string size. The codebase of our proposed approach is publicly available at https://github.com/Atishaysjain/Symmetric-Encryption-using-ANN-and-Binary-Trees. |
---|---|
AbstractList | We have proposed a novel way of symmetric encryption utilizing interleaving salting, Binary Tree traversal, and an Artificial Neural Network in a sequential manner. We have presented the use of an Artificial Neural Network as an invertible(reversible) mathematical function so that decryption of the encrypted output may be possible. Knowledge of the encryption pipeline, salt, and neural network weights is required for decryption. As the same set of values is required for encryption and decryption, our proposed approach is a type of symmetric-key algorithm. Each user will have a unique key. Thus if a key attributing to a particular user is compromised, the integrity of the data of the remaining users will still be maintained. Our approach can be utilized to encrypt text data such as messages, documents, and letters. The encryption process consists of interleaving salting, creation of binary tree by considering the input as its level order traversal, and passing the preorder and inorder traversal of the constructed binary tree as input to the Artificial Neural Network. The output of the Artificial Neural Network would be the encrypted data. Decryption would require determining the input of an Artificial Neural Network from the output, hence solving multiple sets of linear equations and constructing a binary tree from its preorder and inorder traversal. We have then analyzed the variation of performance with the change in the input string size. The codebase of our proposed approach is publicly available at https://github.com/Atishaysjain/Symmetric-Encryption-using-ANN-and-Binary-Trees. |
Author | Gupta, Mihir Jain, Atishay Dennisan, Aju Singh, Vibhu Kumar |
Author_xml | – sequence: 1 givenname: Atishay surname: Jain fullname: Jain, Atishay – sequence: 2 givenname: Mihir surname: Gupta fullname: Gupta, Mihir – sequence: 3 givenname: Vibhu Kumar surname: Singh fullname: Singh, Vibhu Kumar – sequence: 4 givenname: Aju surname: Dennisan fullname: Dennisan, Aju |
BookMark | eNpNkMtuwjAQRa2KSqWUP-jCH0CoX0nsJUXQIqF2AftocCaVaXCQHaj4-4aURWekOXd1NTqPZOAbj4Q8czaVqVHsxe0R2ulS5kJMmeY8E-KODIVQJtEm1YN_-YGMY9yzbvJUSMaHBDeXwwHb4CxdeBsux9Y1np6i8190FlpXOeugph94Cj3anyZ8T-ir8xAudBsQuwNnDBHqCQVf0pVvMdQI52vFBuq24xO5r6COOL5xRLbLxXb-nqw_31bz2Tqxhouk3FWghATgIK4rrWUaMGUg0GRK50ZlImeVNlbvMp0yZUudQ2lQmFwaLkdE_dXa0MQYsCqOwR26RwvOil5W0csqelnFTZb8BeiZYV8 |
Cites_doi | 10.1007/3-540-45624-4_29 10.1109/TICST.2015.7369364 10.5121/ijnsa.2011.3305 10.1007/978-3-642-87126-9 10.1109/2.485891 10.1007/978-3-540-24676-3_30 10.1007/978-3-540-24691-6_1 10.1109/ICSEMR.2014.7043664 10.1088/2040-8986/aa8738 |
ContentType | Journal Article |
CorporateAuthor | SCOPE, Vellore Institute of Technology, Vellore (Tamil Nadu), India |
CorporateAuthor_xml | – name: SCOPE, Vellore Institute of Technology, Vellore (Tamil Nadu), India |
DBID | AAYXX CITATION |
DOI | 10.35940/ijeat.F3722.0811622 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | CrossRef |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 2249-8958 |
EndPage | 100 |
ExternalDocumentID | 10_35940_ijeat_F3722_0811622 |
GroupedDBID | AAYXX ALMA_UNASSIGNED_HOLDINGS CITATION M~E OK1 |
ID | FETCH-LOGICAL-c912-dbfa423aa1a2a2a23cc08ae50a2e96487946270f89c8b68504cd87ad9e2973913 |
ISSN | 2249-8958 |
IngestDate | Fri Aug 23 02:34:39 EDT 2024 |
IsDoiOpenAccess | false |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | true |
Issue | 6 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c912-dbfa423aa1a2a2a23cc08ae50a2e96487946270f89c8b68504cd87ad9e2973913 |
OpenAccessLink | https://doi.org/10.35940/ijeat.f3722.0811622 |
PageCount | 5 |
ParticipantIDs | crossref_primary_10_35940_ijeat_F3722_0811622 |
PublicationCentury | 2000 |
PublicationDate | 2022-08-30 |
PublicationDateYYYYMMDD | 2022-08-30 |
PublicationDate_xml | – month: 08 year: 2022 text: 2022-08-30 day: 30 |
PublicationDecade | 2020 |
PublicationTitle | International journal of engineering and advanced technology |
PublicationYear | 2022 |
References | ref12 ref11 ref10 ref0 ref2 ref1 ref8 ref7 ref9 ref4 ref3 ref6 ref5 |
References_xml | – ident: ref4 doi: 10.1007/3-540-45624-4_29 – ident: ref3 doi: 10.1109/TICST.2015.7369364 – ident: ref7 doi: 10.5121/ijnsa.2011.3305 – ident: ref0 doi: 10.1007/978-3-642-87126-9 – ident: ref5 doi: 10.1109/2.485891 – ident: ref6 doi: 10.1007/978-3-540-24676-3_30 – ident: ref11 doi: 10.1007/978-3-540-24691-6_1 – ident: ref9 – ident: ref1 doi: 10.1109/ICSEMR.2014.7043664 – ident: ref8 – ident: ref2 doi: 10.1088/2040-8986/aa8738 – ident: ref10 – ident: ref12 |
SSID | ssj0000752301 |
Score | 2.2481954 |
Snippet | We have proposed a novel way of symmetric encryption utilizing interleaving salting, Binary Tree traversal, and an Artificial Neural Network in a sequential... |
SourceID | crossref |
SourceType | Aggregation Database |
StartPage | 96 |
Title | Symmetric Encryption using Artificial Neural Network, Binary Tree Traversal, and Interleaving Salting |
Volume | 11 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1JbxMxFLZCuXChrIJCkQ_c2gmzeBYfI9RFlcIlAfU28hY1EU2rMHMoB_4d_4v37JmxoVHVokiTxIqekrwvfku-95mQj0xrnZSLHHY_IyKW6SqqpNKRYvi3EZNlKrDfMf1SnH5lZ-f5-Wj0O2AttY0cq59b50r-x6uwBn7FKdkHeHYwCgvwGPwLV_AwXO_l49nN5SWeiKUOjtZqc-N-_a2t_icbSwLCfjjqb9g7S_i2DnVDuPONMahujswMq_vfkYOR5GmE7TTMxPemD24rT3r3PcRAecJ4aUMnAdvTC5pb7fsz0UkXoKCSp_GctNcumZ0uL5YDa3gGBm3z59tSXrQHlhQ-5N9IzvnhmriTVRv2MKD8xaZs7Lc6yCN4VHEn4j42W9b6vToJMBluvLwIQnhixU9vRYcs5wz5lMsVhLnxcVam6RgyoqRwk9F_i3H_EyQH6iIUTdZOba3U1krdWXlEHqew3yGzcPrLt_ogK4NCD0v_4TO5IU5r6NOWtxMkSUG2M39GnnZlCp04zD0nI7N-QXb7I0BoFxFeEjNAkHoIUgtB6iFIHQRpB8FD6gBIEYB0AOAhBdTQEH60g98rMj8-mn8-jbqTOyLFkzTSciEgTRciESneMqXiSpg8FqnhBZTInBVpGS8qripZVHnMlK5KobnBk9R4kr0mO-urtXlDaC4KLXONA9Sc5UYKlcBzLrISDS6KtyTqv6n62umz1He5aO-Br39HnnjAvic7zaY1-5CGNvKDdfIfcQmLOQ |
link.rule.ids | 315,783,787,27938,27939 |
linkProvider | ISSN International Centre |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Symmetric+Encryption+using+Artificial+Neural+Network%2C+Binary+Tree+Traversal%2C+and+Interleaving+Salting&rft.jtitle=International+journal+of+engineering+and+advanced+technology&rft.au=Jain%2C+Atishay&rft.au=Gupta%2C+Mihir&rft.au=Singh%2C+Vibhu+Kumar&rft.au=Dennisan%2C+Aju&rft.date=2022-08-30&rft.issn=2249-8958&rft.eissn=2249-8958&rft.volume=11&rft.issue=6&rft.spage=96&rft.epage=100&rft_id=info:doi/10.35940%2Fijeat.F3722.0811622&rft.externalDBID=n%2Fa&rft.externalDocID=10_35940_ijeat_F3722_0811622 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2249-8958&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2249-8958&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2249-8958&client=summon |