Scientific Journal Of King Faisal University: Basic and Applied Sciences
Scientific Journal of King Faisal University: Basic and Applied Science
Asymmetric Encryption Method Proposed for Arabic Letters Using Artificial Neural Networks
(Mohammad Taha Kafarnawi)Abstract
Asymmetric encryption algorithms suffer the problem of high execution time. This paper presents a proposed methodology to perform encryption and decryption of messages written in Arabic, using artificial intelligence represented by artificial neural networks based on the RSA algorithm. The method is based on dividing the message into partial messages. The arrays of weights and biases in the neural network layers are considered the encryption or decryption key, according to their function. All steps of the proposed method and how it works were shown and used in the MATLAB environment to design a system for encrypting and decrypting messages written in Arabic. The results proved the effectiveness of the proposed methodology and its superiority over the RSA algorithm in terms of execution time for both encryption and decryption. The encryption time in the proposed algorithm is close to the time of decryption, unlike what it was in the RSA algorithm, where the encryption time was relatively much greater than the decryption time. The proposed method was tested on four text files of 50KB, 100KB, 150KB, and 200KB, over two hundred iterations. The average improvement in execution time was 1,330ms and 4,497.5ms for encoding and decoding, respectively.
KEYWORDS
Data protection, decryption, execution time, security, RSA algorithm, performance
PDF
References
Al-Abaidy, S.A. (2020). Artificial neural network based image encryption technique. Int. J. Services Operations and Informatics, 10(3), 181–9.
Agarwal, N. and Agarwal, P. (2013). Use of artificial neural network in the field of security. MIT International Journal of Computer Science & Information Technology, 3(1), 42–44.
Al Azawee, H., Husien, S. and Mohd Yunus, M.A. (2015). Encryption function on artificial neural network. Springer, Neural Comput & Applic. 2015(3), a/b. DOI 10.1007/s00521-015-2028-3
Al Badawi, A., Chao, J., Lin, J. Mun, C.F., Jie Sim, J., Meng Tan, B.H., Nan, X.M., Aung, K.M. and Chandrasekhar, V. (2020). Towards the AlexNet moment for homomorphic encryption: HCNN, the first homomorphic CNN on encrypted data with GPUs. IEEE Transactions on Emerging Topics in Computing, 9(n/a), 1330–43. DOI: 10.1109/TETC.2020.3014636.
Bevi, A.R., Tumu, S. and Prasad, N.V. (2018). Design and investigation of a chaotic neural network architecture for cryptographic applications. Computers and Electrical Engineering/Elsevier. 72(2018) 179–90.
Chakraborty, M., Jana, B., Mandal, T. and Kule, M. (2018). A Performance Analysis of RSA Scheme using artificial neural network. In: 2018 9thInternational Conference On Computing, Communication and Networking Technologies (ICCCNT), Bengaluru, India, 10-12/07/2018.
Du, Y. and Stephanus, A. (2018). Levenberg-Marquardt neural network algorithm for degree of arteriovenous fistula stenosis classification using a dual optical photoplethysmography sensor. Sensors (Basel), 18(7), 1–18. DOI: 10.3390/s18072322.
Faraz, F.M., Maen, T.A. and Omidreza, K. (2013). A hybrid encryption algorithm based on RSA small-e and efficient-RSA for cloud computing environments. Journal of Advances in Computer Network, 1(3), 238–41.
Forgá, R. and Okay, M. (2019). Contribution to symmetric cryptography by convolutional neural networks. Slovak Academy of Sciences, 2(16), n/a.
George Amalarethinam, D.I. and Leena, H.M. (2017). Enhanced RSA algorithm with varying key sizes for data security in cloud. IEEE, 9(17), 172–5.
Haghipour, S. and Sokouti, B. (2009). Approaches in RSA cryptosystem using artificial neural network. Oriental Journal of Computer Science & Technology, 2(1), 11–17
Intila, C., Gerardo B. and Medina R. (2019). A study of public key ‘e’ in RSA algorithm. In: International Conference on Information Technology and Digital Applications (ICITDA 2018), Manila, Philippines, 08-09/11/2018. IOP Conference Series: Materials Science and Engineering, 482(012016), 1–9. DOI:10.1088/1757-899X/482/1/012016
Kengnou Telem, A.N., Segning, C., Kenne, G. and Fotsin, H.B (2014). A simple and robust gray Image encryption scheme using chaotic logistic map and artificial neural network. Hindawi Publishing Corporation, 2014(n/a), 1–13.
Lu, Z.M. and Mohamed, H. (2021). A complex encryption system design implemented by AES. Journal of Information Security, 12(2), 177–87. DOI:10.4236/jis.2021.122009
Omar, G.A. and Shawkat, K.G. (2018). A survey on cryptography algorithms. International Journal of Scientific and Research Publications (IJSRP), 8(7), 495–516.
Shambhavi, D. and Sonal, S. (2018). Enhanced RSA algorithm for data security in cloud. IRE Journals, 1(9), 2456–8880.
Taleb Obaid, A.S. (2020). Study a public key in RSA algorithm. EJERS, European Journal of Engineering Research and Science, 5(4), 395–8.
Unicode Organization. Available at: https://home.unicode.org/ (accessed on 3/3/2021)
Yousif, E.Y. and ANabi, M.A.B. (2017). Performance enhancement of RSA algorithm using artificial neural networks. International Journal of Computer Science and Mobile Computing, 6(9), 21–7.