研究生: |
黃庭影 Huang, Ting Ying |
---|---|
論文名稱: |
改良式雙向聯想記憶類神經網路加解密之研究 The Improvement of Encryption and Decryption on Bi-directional Association Memory based Neural Network |
指導教授: |
莊謙本
Chuang, Chien-Pen 周明 Jou, Min |
學位類別: |
碩士 Master |
系所名稱: |
機電工程學系 Department of Mechatronic Engineering |
論文出版年: | 2008 |
畢業學年度: | 96 |
語文別: | 中文 |
論文頁數: | 95 |
中文關鍵詞: | 人工類神經網路 、雙向聯想記憶 、加解密模型 、偽狀態 、空間變換 、完美秘密 、安全性程度 |
英文關鍵詞: | Artificial Neural Network (ANN), Bi-directional Association Memory (BAM), Cryptosystem, spurious states, space transformation, perfect secrecy, security |
論文種類: | 學術論文 |
相關次數: | 點閱:205 下載:2 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
過去在加解密模型上的演算法大都著重於邏輯式的演算法,在建構加解密系統上較為複雜,且架構不具廣義性。由於已經有研究者提出模仿生物神經系統的人工類神經網路架構(Architecture of Artificial Neural Network, ANN)為基礎下的加解密模型(Back-propagation and Overstoraged Hopfiled Neural Network(OHNN))進行加解密,但都有其限制(例如:加密量的限制、解密後資料完整性的限制、穩定度的限制等限制因素)。
本論文提出應用類神經網路雙向聯想記憶(Bi-directional Association Memory, BAM)的演算方法建構加解密模型進行加解密,此方法使得加解密模型在建構上具有簡便性及廣義性,並且利用BAM的雙向狀態穩定的特性解決穩定度的限制。由於BAM主要利用區域極小值(local minima)儲存資料,且其學習規則是採用Hebbian 學習法,因此可能使網路能量區域極小值的數量超過原先儲存的資料量,而造成偽狀態(spurious states)的情況發生,使得資訊喪失資料完整性的原則。為了解決上述的問題,故配合空間變換(space transformation)的概念,得以避開偽狀態的影響並且增加加密量、確保解密後資料完整性的原則、降低解密時間。再利用Shannon所提出的完美秘密(perfect secrecy)的概念量化證明本系統的安全性(security)程度。
Most algorithms developed for encryption and decryption were concentrated on logic analysis. But it is complex for system construction and difficult to apply wide-spread. Recently, even though biomimetic-based architecture of artificial neural network was proposed to improve reliability and performance of encryption methods such as back-propagation and overstoraged Hopfield Neural Network were developed to fulfill this expectation. But the limitations of encryption capacity, complexity and data completeness after decryption, reliability are still needed to overcome.
This paper proposed a new algorithm to improve reliability and convenience of encryption and decryption with reformed Bi-directional Association Memory (BAM) model to reduce spurious states and data separation caused by former local minima information analysis based on Hebbian learning rule. The space transformation was used to escape crosstalk and noise vector caused by spurious states to keep the completeness of processed information in addition to enhance its security. MATLAB simulation model was used to testify the performance of BAM cryptosystem. The experimental results showed that the security of this proposed system has been improved by Shannon’s perfect secrecy conception.
[1] 黃明祥、林詠章 著, “資訊與網路安全概論:建構安全的電子商務系統(Introduction to Information and Network Security)”, McGraw-Hill, Inc. 2005。
[2] Niansheng Liu and Doinghui Guo,“ Security Analysis of Public-key Encryption Scheme Based on Neural Networks and Its Implementing”, Computational Intelligence and Security, 2006 International Conference on Volume 2, 3-6 Nov. 2006 Page(s):1327 – 1330.
[3] Duan Suoli, Wang Shuzhao and Yang Xiaokuo, “Research on Signal’s Encryption and Decryption Using Nonlinear System and its Inversion” , Electronic Measurement and Instruments, 2007. ICEMI '07. 8th International Conference on Aug. 16 2007-July 18 2007 Page(s):3-870 - 3-873.
[4] Bart Kosko, “Bidirectional Associative Memories” , IEEE Transactions on System, Man, and Cybernetics, Vol. 18, No. 1, January/February 1988.
[5] 蘇木春、張孝德 編著,“機械學習:類神經網路、模糊系統以及基因演算法則(修訂二版)”, 全華科技圖書股份有限公司,2006年3月。
[6] 陳彥銘、林秉忠 著, “802.11無線網路安全白皮書”,台灣電腦網路危機處理暨協調中心,民92年2月。
[7] Atul Kahate 原著, 黃明祥 校閱,楊政穎 編譯,”網路安全與密碼學(Cryptography and Network Security)”, McGraw-Hill, Inc. 2006。
[8] http://64.62.138.83/i1/030101_sci_stain.jpg
[9] http://life.nthu.edu.tw/~g864264/Neuroscience/neuron/cell.htm
[10] 鍾慶豐 著, “近代密碼學與其應用”, 儒林圖書有限公司, 2005年6月。
[11] 王進德 編著, “類神經網路與模糊控制理論入門與應用”, 全華科技圖書股份有限公司,2006。
[12] 周鵬程 編著, “類神經網路入門:活用MATLAB”, 全華科技圖書股份有限公司, 2006。
[13] 沈淵源 編著, “密碼學之旅與MATHEMATIC同行”, 全華科技圖書股份有限公司,,2006年2月。
[14] 鄧安文 編著, “密碼學-加密演算法與密碼分析計算實驗(Cryptography-Algorithms on Ciphers, Cryptanalysis and Computational Experiment)” ,全華科技圖書股份有限公司, 2006年10月。
[15] Miao Zhenjiang, Yuan Baozong, “An Extended BAM Neural Network Model”, Neural Networks, 1993. IJCNN '93-Nagoya. Proceedings of 1993 International Joint Conference on Volume 3, 25-29 Oct. 1993 Page(s):2682 - 2685 vol. 3.
[16] C. S. Leung, “Encoding Method for Bidirectional Associative Memory Using Projection on Convex Sets”, Neural Networks, IEEE Transactions on Volume 4, Issue 5, Sept. 1993 Page(s):879 – 881.
[17] George J. Klir and Bo Yuan, “Fuzzy Sets and Fuzzy Logic Theory and Applications”, Prentice-Hall International, Inc. 1995.
[18] Shanguang CHEN, Jinhe WEI, Yongjum ZHANG, Yong BAO, “A New Model for Bidirectional Associative Memories”, Neural Networks, 1996., IEEE International Conference on Vol. 1, 3-6 June 1996 Page(s):594 - 599 vol. 1.
[19] Timothy J. Ross, “Fuzzy Logic with Engineering Applications, International Edition”, McGraw-Hill, Inc. 1997.
[20] Henry Stark and Yongyi Yang, “Vector Space Projects: A Numerical Approach to Signal and Image Processing, Neural Nets, and Optics”, John Wiley & Sons, Inc. 1998.
[21] Simon Haykin, “Neural Networks: A Comprehensive Foundation, 2nd Edition”, Prentice Hall International, Inc. 1999.
[22] Mark Ciampa, “Security+Guide to Network Security Fundamentals, 2e” Thomson Learning Company, 2005.
[23] Satish Kumar, “Neural Networks - A Classroom Approach”, McGraw-Hill Inc. 2005.
[24] Hichael Negnevitsky, “Artificial Intelligence: A Guide to Itelligent System, 2nd Edition”, Addison-Wesley, 2005.