Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Fuzzy key communication system and confrontation network system based on deep learning

A deep learning and communication system technology, applied in the field of fuzzy key communication system and confrontation network system, can solve the problem that Bob cannot guarantee restoration, and achieve the effect of improving analysis depth, strengthening communication performance, and accurate communication

Active Publication Date: 2020-07-03
SOUTH CHINA AGRI UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the information protection encryption algorithm can be learned through Google Brain's confrontation network. This model can also realize encrypted communication when there is a small loss or difference in the key obtained by Bob. However, when there is a certain amount of information loss in the communication process, Bob will There is no guarantee that plaintext can be restored

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fuzzy key communication system and confrontation network system based on deep learning
  • Fuzzy key communication system and confrontation network system based on deep learning
  • Fuzzy key communication system and confrontation network system based on deep learning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] This embodiment 1 discloses a fuzzy key communication system based on deep learning, such as figure 1 As shown, including the communication party Alice and the communication party Bob.

[0041] The communicating party Alice includes an encryption model; the encryption model is obtained after deep learning of the first neural network model, and is used to input plaintext P and key K, and uses the input plaintext P and key K to form ciphertext C; the first neural network model Including the first fully connected layer and multi-layer convolutional layer from input to output;

[0042] The communicating party Bob includes a decryption model; the decryption model is obtained after deep learning of the second neural network model, and is used to input the key and ciphertext, and decrypts the input ciphertext C according to the input key CK to obtain the plaintext information P Bob ;Such as Figure 2a As shown, the second neural network model includes the first fully connect...

Embodiment 2

[0052] This embodiment discloses a fuzzy key communication system based on deep learning, such as Figure 4 As shown, the difference between this embodiment and Embodiment 1 is that the activation function of the layer close to the input end of the second neural network model in the second fully connected layer and the third fully connected layer of the second neural network model is set to tanh function.

[0053] In Embodiment 1, after adding a fully connected layer to the second neural network of the communication party Bob, the decryption ability of the entire communication system has been improved to a certain extent, but as Figure 3b As shown, it is impossible to implement error-free decryption for keys with a difference of 3 bits or more (n is greater than or equal to 3). After analyzing the system, it is found that in the second neural network model, when the fully connected layer near the input uses the Sigmoid function, it is not good for the weight update of the mo...

Embodiment 3

[0056] This embodiment discloses a fuzzy key communication system based on deep learning. This embodiment performs the following processing on the basis of Embodiment 1 or 2. In the second fully connected layer and the third fully connected layer of the second neural network model Both the connection layer and the first fully connected layer of the first neural network model are processed by batch normalization, and the processing of batch normalization is as follows: normalize the input so that the average value of the input is 0 and the variance is 1, and then Output to the next layer through the activation function.

[0057] After batch normalization processing in this embodiment, the stability of the communication system is greatly improved, and the probability that the model cannot find the lowest loss point due to different initialization conditions is reduced. During the training process, the learning rate can be increased without affecting the training of the model, th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a fuzzy key communication system and confrontation network system based on in-depth learning. The system comprises a communication party Alice and a communication partyBob; the communication party Alice includes an encryption model; the encryption model is obtained after in-depth learning by a first neural network model; the communication party Bob includes a decryption model, and the decryption model is obtained after in-depth learning by a second neural network model, for inputting a key and a ciphertext, and decrypting the input ciphertext according to the fuzzy key to obtain plaintext information; the second neural network model includes a second fully connected layer, a third fully connected layer, and multi-layer convolutional layer from input to output; the key entered by the decryption model of the communicating party Bob is a fuzzy key. The present invention also discloses a confrontation network that is obtained by in-depth learning after thecommunication system joins an Eve model. The system can enhance communication performance of network in a fuzzy key communication environment, and realize accurate communication under the fuzzy key environment.

Description

technical field [0001] The invention belongs to the field of computer technology and information security communication technology, and in particular relates to a deep learning-based fuzzy key communication system and an adversarial network system. Background technique [0002] With the development of deep learning technology, it has also begun to try to use it in various fields. General encryption algorithms are designed by people themselves, but now it is possible to make encryption algorithms using generative adversarial networks in deep learning. Among them, the confrontation network Google Brain is confronted by two neural networks. One neural network Eve is responsible for deciphering the ciphertext of the communication, and the other neural network is composed of two parts Alice and Bob; the encrypted communication between Alice and Bob, Eve is responsible for deciphering the communication Content; the above two neural networks carry out the network confrontation bet...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/00
CPCH04L9/002H04L9/0861
Inventor 李西明吴嘉润郭玉彬吴少乾
Owner SOUTH CHINA AGRI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products