Call For Papers
Contact Us

  Applicability of Chaotic Network and Jordan Network in Cryptography with Comparative Analysis  
  Authors : Anindita Das Bhattacharjee; Abhijit Mitra; Asiya Amreen Zaman
  Cite as:


This research aims to demonstrate the functionalities and prediction capabilities of different neural networks on substitution cipher. To acquire the best possible extent of applicability all possible plaintexts are verified. The normalized Feed Forward Back Propagation Network with Feature Scaling approach results in 50% - 60% of accuracy whereas N – state Sequential Machine with Jordan Network enhanced the accuracy to 100%. This comparative study illustrates the strength of recursive backpropagation over simple back-propagation technique. The incompatibility to deal with plaintext with alphanumeric value makes NState Sequential Machine less efficient. Further, in comparison with former researches on N-State Sequential Machine; that was designed for 3-bit plaintext input with alphabet range [A-H], modifications are performed, to increases the accepted input bit range from 3-bit to 5-bit. This increases the input alphabet acceptance range [A-Z] including few punctuations marks- but falls short to deal with ‘alphanumeric values’. Finally, Chaotic Network is implemented and proved to be a most promising, efficient, significant and well-suited technique to deal with all input plaintexts.


Published In : IJCSN Journal Volume 7, Issue 2

Date of Publication : April 2018

Pages : 49-53

Figures :14

Tables : 21


Anindita Das Bhattacharjee : Started her career in industry as a trainee software developer for a year. She has done M. Tech in Computer Science from National Institute of Technology (NIT), Durgapur. She secured a position of First Class Second in M. Tech. Currently she is working in Swami Vivekananda Institute of Science and Technology. She has been teaching for about 10 years in Computer Science. She is an author of a book “Artificial Intelligence and Soft Computing for Beginners” published in 2013 and author of book chapters in the book “Intelligent Analysis for Multimedia Information” published by IGI Global and indexed in Scopus.

Abhijit Mitra : Pursuing B. Tech. Final year student in Computer Science and Engineering in Swami Vivekananda Institute of Science and Technology.

Asiya Amreen Zaman : Pursuing B. Tech. Final year student in Computer Science and Engineering in Swami Vivekananda Institute of Science and Technology. Secured 3rd position in International Olympiad of Science and 2nd position in Olympiad of English 2011, New Delhi.


Chaotic Neural Network, Cryptography, Feature Scaling, Jordan Network, Modified Caesar Cipher, N – State Sequential Machine, Pangrams, Unity Based Normalization

At the initial stage, it was intended to depict statistically the prediction capability of three specific Neural Networks on Modified Caesar Substitution Cipher technique (with Substitution Factor k=6) to identify the best suited Neural Networks. This research achieves conclusion in interdependent five sequential stages.


[1] Prajapat, S., Thakur, R.S., “Various Approaches Towards Cryptanalysis”, International Journal of Computer Applications (0975 – 8887), Vol 127, No. 14, October 2015, pp. 15–24. [2] Greydanus, S., “Learning the Enigma with Recurrent Neural Networks”, Vol II, September 2017. [3] Shukla, N., Tiwari, A., “An Empirical Investigation of Using ANN Based N – State Sequential Machine and Chaotic Neural Network in the Field of Cryptography”, Vol XII, Issue X, Version I, 2012, pp. 17–26. [4] Paritoshik, Choudhary, P., “Accomplishment of Cryptography using Neural Network in Artificial Intelligence”, International Journal of Advance Research, Ideas and Innovations in Technology, pp. 144–55. [5] Kamila, N.K., Rout, H., Dash, N., “Stego – Cryptography Using Chaotic Neural Network”, American Journal of Signal Processing, 2014, pp. 24–33. [6] Gujral, V., Pradhan, S.K., “Cryptography Using Artificial Neural Networks”, January, 2009. [7] Assad, S.E., “Chaos Based Information Hiding and Security”, In Proceeding: 7th International Conference for Internet Technology and Secured Transactions, London, UK, 10 – 12 December 2012, pp. 67–72. [8] Alallayah, K., Amin, M., AbdElwahed, W., Alhamami, A., “Applying Neural Networks for Simplified Data Encryption Standard (SDES) Cipher System Cryptanalysis”, The International Arab Journal of Information Technology Vol 9, No. 2, March 2012, pp. 163–69. [9] Raj, P., “Cryptography Using Neural Networks”, May, 2015. [10] Kahate, A., (2013) “Cryptography and Network Security”, 3rd ed., New Delhi: McGraw Hill Education (India) Private Limited. [11] Agarwal, B., Agarwal, H., “Survey Report on Chaos- Based Cryptography”, International Journal of Applied Science and Engineering Technology, No. 2, 2012, pp. 1–19. [12] Yayik, A., Kutlu, Y., “Neural Network-Based Cryptography”, pp. 177–92. [13] Rathee, N., Sachdeva, R., Dalel, V., Jaie, Y., “A Novel Approach for Cryptography Using Artificial Neural Networks”, Vol 4, Issue 4, August 2016, pp. 187–193. [14] “Domain 3: Cryptography”, Elsevier, October 2016. Available from: booksite.elsevier.com/samplechapters/9781597495639/02~ Chapter_4.pdf [15] Zhang, B., Jin, C., “Cryptanalysis of a Chaos-based Stream Cipher”, In Proceedings: 9th International Conference for Young Computer Scientists, Hunan, China, 18 – 21 November 2008, pp. 2782–5. [16] Baragad, S.R., Redd, P.S., “Studies on the Advancements of Neural Network based Cryptalytic Works”, International Journal of Emerging Trends and Technology in Computer Science (IJETTCS), Vol 2, Issue 5, September – October, 2013, ISSN 2278-6856. [17] Elkamshoushy, D.H., Aboulsoud, A.K., “Cryptographic Schemes using Chaotic Systems”, In Proceedings: National Radio Science Conference, Tanta, Egypt, 18 – 20 March 2008, pp. 1–6. [18] Banerjee, S., Kurths, J., “Chaos and Cryptography: A new dimension in secure communications”, The European Physical Journal Vol XII, Issue X, Version I, 2012, pp. 1441–45. [19] Laskari, E.C., Meletiou, G.C., Tasoulis, D.K., Vrahatis, M.N., “Studying the performance of artificial neural networks on problems related to cryptography”, Nonlinear Analysis: Real World Applications, Vol 7, pp. 937 – 942, 2006. [20] “Mathworks”, The Mathworks, Inc. Available from: http://in.mathworks.com/help/nnet/ref/trainlm.html;jsessioni d=a15fe82129a83dc8a92470543e5c. [21] Parker, T.S., Chua, L.O., “Chaos – A tutorial for Engineers”, IEEE Proceedings, Vol 75, 1987, pp. 982–1008. [22] John Justin, M., Manimurugan, S., “A survey on various Encryption Techniques, International Journal of Soft Computing and Engineering (IJSCE)”, ISSN: 2231 – 2307, Vol 2, Issue 1, March 2012. [23] Volna, E., Kotyrba, M., Kocien, V., Janosek, M., “Cryptography based on Neural Network”, Department of Informatics and Computers University of Ostrava Dvorakova, Czech Republic. [24] El-Zoghabi, A.A., Yassin, A.H., Hussien, H.H. “Survey Report on Cryptography Based on Neural Network”, Vol 3, Issue 12, 2013, pp. 456–62. [25] Lawande, Q.V., Ivan, B.R., Dhodapkar, S.D., “Chaos- Based Cryptography: A New Approach to Secure Communications”, No. 258, July 2005. [26] Biederman, D.C., Ososanya, E., “Capacity of Several Neural Networks with respect to Digital Adder and Multiplier”. [27] Yu, W., Cao, J., “Cryptography based on Delayed Chaotic Neural Networks”, Department of Mathematics, Southeast University, Nanjing, China. [28] Klimoy, A., Mityagin, A., Shamir, A. “Analysis of Neural Cryptography”, Advances in Cryptography – ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptography and Information Security, Queenstown, New Zealand, December 1 -5, 2002, pp. 288- 98. [29] Shobhy, M.I., Shehata, A.R., “Chaotic Algorithm for Data Encryption”, In proceedings: IEEE International Conference on Acoustics, Speech, and Signal, Salt Lake City, UT, USA, 07 – 11 May 2001, pp. 997–1000. [30] Suryawanshi, S.B., Nawgaje, D.D., “Chaotic Neural Network for Cryptography in Image Processing”, IJCA Proceedings on 2nd National Conference on Information and Communication Technology NCICT, November 2011. [31] Agarwal, N., Agarwal, P., “Use of Artificial Neural Network in the field of Security”, MIT International Journal of Computer Science and Information Technology, Vol 3, No 1, pp. 42 – 44, 2013. [32] Su, S., Lin, A., Yen, J., “Design and Realization of a New Chaotic Neural Encryption/Decryption Network”. Conference on Recent Trends in Information Technology, 3- 5 June, 2012, pp. 107–12. [33] Shukla, P.K., Khare, A., Rizvi, M.A, Stalin, S., Kumar, S., “Applied Cryptography Using Chaos Function for Fast Digital Logic – based Systems in Ubiquitous Computing”, 2015, pp. 1387–1410. [34] Alvarez, G., Montoya, F., Romera, M., Pastor, G., “Cryptanalysis of a Chaotic Encryption System”, 276, 2000, pp. 191–6. [35] Kr?se, B., Smagt, van der, P., (1996) “An Introduction to Neural Networks”, 8th ed., Amsterdam, Available from: https://www.infor.uva.es/~teodoro/neuro-intro.pdf [36] Dalkiran, I., Danisman, K., “Artificial Neural Network Based Chaotic Generator for Cryptology”, 2010, pp. 225–40. [37] Kaur, H., Panag, T.S., “Cryptography using Chaotic Neural Network”, International Journal of Information Technology and Knowledge Management, Vol 4, No. 2, July – December 2011, pp. 417–22. [38] Schmitz, R., “Use of chaotic dynamical systems in cryptography”, J. Franklin Inst., 338, 2001, pp. 429-441. [39] Alvarez, G., Li, S., “Some Basic Cryptographic Requirements for Chaos – Based Cryptosystems”, Vol. 16, 2006, pp. 2129–51.