Unknown

Dataset Information

0

Implementation of synchronization of multi-fractional-order of chaotic neural networks with a variety of multi-time-delays: Studying the effect of double encryption for text encryption.


ABSTRACT: This research proposes the idea of double encryption, which is the combination of chaos synchronization of non-identical multi-fractional-order neural networks with multi-time-delays (FONNSMD) and symmetric encryption. Symmetric encryption is well known to be outstanding in speed and accuracy but less effective. Therefore, to increase the strength of data protection effectively, we combine both methods where the secret keys are generated from the third part of the neural network systems (NNS) and used only once to encrypt and decrypt the message. In addition, a fractional-order Lyapunov direct function (FOLDF) is designed and implemented in sliding mode control systems (SMCS) to maintain the convergence of approximated synchronization errors. Finally, three examples are carried out to confirm the theoretical analysis and find which synchronization is achieved. Then the result is combined with symmetric encryption to increase the security of secure communication, and a numerical simulation verifies the method's accuracy.

SUBMITTER: Abd Latiff FN 

PROVIDER: S-EPMC9249245 | biostudies-literature | 2022

REPOSITORIES: biostudies-literature

altmetric image

Publications

Implementation of synchronization of multi-fractional-order of chaotic neural networks with a variety of multi-time-delays: Studying the effect of double encryption for text encryption.

Abd Latiff Fatin Nabila FN   Mior Othman Wan Ainun WA  

PloS one 20220701 7


This research proposes the idea of double encryption, which is the combination of chaos synchronization of non-identical multi-fractional-order neural networks with multi-time-delays (FONNSMD) and symmetric encryption. Symmetric encryption is well known to be outstanding in speed and accuracy but less effective. Therefore, to increase the strength of data protection effectively, we combine both methods where the secret keys are generated from the third part of the neural network systems (NNS) an  ...[more]

Similar Datasets

| S-EPMC11888872 | biostudies-literature
| S-EPMC8942225 | biostudies-literature
| S-EPMC5877833 | biostudies-literature
| S-EPMC11639445 | biostudies-literature
| S-EPMC10613294 | biostudies-literature
| S-EPMC8847423 | biostudies-literature
| S-EPMC8415202 | biostudies-literature
| S-EPMC5976724 | biostudies-literature
| S-EPMC8987931 | biostudies-literature
| S-EPMC5585654 | biostudies-literature