透過您的圖書館登入
IP:18.118.184.237
  • 學位論文

改良式雙向聯想記憶類神經網路加解密之研究

The Improvement of Encryption and Decryption on Bi-directional Association Memory based Neural Network

指導教授 : 莊謙本 周明
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


過去在加解密模型上的演算法大都著重於邏輯式的演算法,在建構加解密系統上較為複雜,且架構不具廣義性。由於已經有研究者提出模仿生物神經系統的人工類神經網路架構(Architecture of Artificial Neural Network, ANN)為基礎下的加解密模型(Back-propagation and Overstoraged Hopfiled Neural Network(OHNN))進行加解密,但都有其限制(例如:加密量的限制、解密後資料完整性的限制、穩定度的限制等限制因素)。 本論文提出應用類神經網路雙向聯想記憶(Bi-directional Association Memory, BAM)的演算方法建構加解密模型進行加解密,此方法使得加解密模型在建構上具有簡便性及廣義性,並且利用BAM的雙向狀態穩定的特性解決穩定度的限制。由於BAM主要利用區域極小值(local minima)儲存資料,且其學習規則是採用Hebbian 學習法,因此可能使網路能量區域極小值的數量超過原先儲存的資料量,而造成偽狀態(spurious states)的情況發生,使得資訊喪失資料完整性的原則。為了解決上述的問題,故配合空間變換(space transformation)的概念,得以避開偽狀態的影響並且增加加密量、確保解密後資料完整性的原則、降低解密時間。再利用Shannon所提出的完美秘密(perfect secrecy)的概念量化證明本系統的安全性(security)程度。

並列摘要


Most algorithms developed for encryption and decryption were concentrated on logic analysis. But it is complex for system construction and difficult to apply wide-spread. Recently, even though biomimetic-based architecture of artificial neural network was proposed to improve reliability and performance of encryption methods such as back-propagation and overstoraged Hopfield Neural Network were developed to fulfill this expectation. But the limitations of encryption capacity, complexity and data completeness after decryption, reliability are still needed to overcome. This paper proposed a new algorithm to improve reliability and convenience of encryption and decryption with reformed Bi-directional Association Memory (BAM) model to reduce spurious states and data separation caused by former local minima information analysis based on Hebbian learning rule. The space transformation was used to escape crosstalk and noise vector caused by spurious states to keep the completeness of processed information in addition to enhance its security. MATLAB simulation model was used to testify the performance of BAM cryptosystem. The experimental results showed that the security of this proposed system has been improved by Shannon’s perfect secrecy conception.

參考文獻


[2] Niansheng Liu and Doinghui Guo,“ Security Analysis of Public-key Encryption Scheme Based on Neural Networks and Its Implementing”, Computational Intelligence and Security, 2006 International Conference on Volume 2, 3-6 Nov. 2006 Page(s):1327 – 1330.
[4] Bart Kosko, “Bidirectional Associative Memories” , IEEE Transactions on System, Man, and Cybernetics, Vol. 18, No. 1, January/February 1988.
[15] Miao Zhenjiang, Yuan Baozong, “An Extended BAM Neural Network Model”, Neural Networks, 1993. IJCNN '93-Nagoya. Proceedings of 1993 International Joint Conference on Volume 3, 25-29 Oct. 1993 Page(s):2682 - 2685 vol. 3.
[16] C. S. Leung, “Encoding Method for Bidirectional Associative Memory Using Projection on Convex Sets”, Neural Networks, IEEE Transactions on Volume 4, Issue 5, Sept. 1993 Page(s):879 – 881.
[17] George J. Klir and Bo Yuan, “Fuzzy Sets and Fuzzy Logic Theory and Applications”, Prentice-Hall International, Inc. 1995.

被引用紀錄


許家銘(2014)。基於類神經網路實作具情感模型與制約模型之寵物機器人〔碩士論文,中原大學〕。華藝線上圖書館。https://doi.org/10.6840/cycu201400887

延伸閱讀