Abstract
The requirements are formed, the method is chosen and the main stages of development of mobile means of neuro-like cryptographic encryption and real-time data decryption are considered. It is shown that the development of mobile means of neuro-like cryptographic encryption and decryption of real-time data with high efficiency of equipment is reduced to minimize hardware costs while providing a variety of requirements, characteristics and limitations. The tabular-algorithmic method of calculating the scalar product has been improved. Namely, the ability to work with floating-point operands has been added and it is focused on hardware and software implementation. Developed on the basis of a universal processor core, supplemented by specialized modules, mobile means of neuro-like cryptographic encryption and data decryption. Which due to the combination of universal and specialized approaches, software and hardware provides effective implementation of algorithms for cryptographic encryption and decryption of data in real time. It is proposed to use a multioperand approach, tables of macroparticle products and bases of elementary arithmetic operations to achieve high technical and economic indicators in the implementation of specialized modules of neuro-like cryptographic encryption and real-time data decryption. Specialized modules of neuro-like cryptographic encryption and data decryption have been implemented using the VHDL hardware programming language and the Quartus II development environment (version 13.1) on the FPGA. The evaluation of hardware and time parameters of the developed specialized module of neurosimilar cryptographic data decryption is carried out.
Publisher
Lviv Polytechnic National University
Reference15 articles.
1. Cryptography Based On Neural Network;Volna;Proceedings of the 26th European Conference on Modeling and Simulation,2012
2. A backpropagation neural network for computer network security;Shihab;Journal of Computer Science Vol 2 No 9,2006
3. A Symmetric Key Cryptographic Algorithm Using Counter Propagation Network (CPN);Sagar V.;Proceedings of the 2014 ACM International Conference on Information and Communication Technology for Competitive Strategies ISBN 978-1-4503-3216-3,2014
4. 4. Arvandi M., Wu S., Sadeghian A., Melek W.W., Woungang I. (2006). Symmetric cipher design using recurrent neural networks. Proceedings of the IEEE International Joint Conference on Neural Networks, pp. 2039- 2046.
5. 5. Tsimbal Yu. V. (2018). Neural network method of symmetric data encryption. Bulletin of the National University «Lviv Polytechnic». Series: Information systems and networks. № 901. S. 118-122.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献