Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Issue title: Special section: Intelligent data analysis and applications & smart vehicular technology, communications and applications
Guest editors: Valentina Emilia Balas and Lakhmi C. Jain
Article type: Research Article
Authors: Mundra, Ankita | Mundra, Shikhab; * | Srivastava, Jai Shankera | Gupta, Punitc
Affiliations: [a] Department of Information Technology, School of Computing and IT, Manipal University Jaipur, Dehmi Kalan, Near GVK Toll Plaza, Jaipur, Rajasthan, India | [b] Department of Computer Science and Engineering, School of Computing and IT, Manipal University Jaipur, Dehmi Kalan, Near GVK Toll Plaza, Jaipur, Rajasthan, India | [c] Department of Computer and Communication Engineering, Manipal University Jaipur Dehmi Kalan, Near GVK Toll Plaza, Jaipur, Rajasthan, India
Correspondence: [*] Corresponding author. Shikha Mundra, School of Computing and IT, Manipal University Jaipur, E-mail: [email protected].
Abstract: Cryptography is the study of techniques which used to transforms the original text (plain text) to cipher text (non understandable text). Due to recent progress on digitized data exchange in electronic way, information security has become crucial in data storage and transmission. Some of the cryptographic algorithm has provided a promising solution which not only protects the data but also authenticates the systems and its participants, so the threat of various attacks is minimized. Nonetheless in the advancement of computing resources the cryptanalysis techniques also emerged and performing competitively in the field of information security with good results. In this paper, we have proposed the optimized deep neural network approach for cryptanalysis of symmetric encryption algorithm 64-bit DES (Data encryption standard). Our approach has used back propagation technique with multiple hidden layers and advanced activation function also we have addressed the problem of vanishing gradient. Further, the implementation results show that we have achieved 90% accuracy which is significantly higher as compared to previous approaches. We have also compared the proposed technique with the existing ones against three parameters i.e. time, loss, accuracy.
Keywords: Cryptography, encryption, decryption, plaintext, cipher text, DES
DOI: 10.3233/JIFS-179679
Journal: Journal of Intelligent & Fuzzy Systems, vol. 38, no. 5, pp. 5921-5931, 2020
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]