SlideShare a Scribd company logo
Dynamic data encryption using the concepts of ANN
Dynamic data encryption using the concepts of ANN
Existing
System
TXT
KEY
HIDDEN
LAYER
HIDDEN
LAYER
TXT
KEY
INTERNET
SENDER SIDE
RECEIVER SIDE
PLAIN TEXT
S
E
N
D
E
R
R
E
C
E
I
V
E
R
R.K.
PLAIN TEXT
ENCRYPTED TEXT
ENCRYPTED TEXT
AUTOMATIC LOCKING PROCEDURE
MANUAL UNLOCKING PROCEDURE
FEATURES:
• Dynamic key generation.
• Asymmetric key algorithm.
• No limitation in the length of the plain text.
• Automatic locking.
PlainText
KeyGen Algo
Intermidiate CipherText
EvenPositionElement
OddPositionElement Final CipherText
Exploring Hidden layers (1)
PlainText
KeyremoveAlgo
Intermidiate CipherText
1st
Partition
2nd
Partition Received CipherText
Exploring Hidden layers (2)
Dynamic data encryption using the concepts of ANN
Q W E R T Y U I O P
A S D F G H J K L Z
X C V B N M q w e r
t y u i o p a s d f
g h j k l z x c v b
n m 1 2 3 4 5 6 7 8
9 0 @ # $ % ^ & _ ~
` ! + - * /  | { }
[ ] ( ) = : ; “ ‘ <
> , . ?
1 2 3 4 5 6 7
Elements from 32th position to 62th position of key board
Elements from 1st
position to 31th position of key board
… N
Average of all the key elements and it’s corresponding position
Key Generation
P R K1 O G K2 R A K3 M
MESSAGE
KEY ELEMENTS
Locking Procedure (1)
P R K1 O G K2 R A K3 M
K1 K2 K3 Z
r B K1 e o K2 B t K3 z
Locking Procedure (2)
P R O G R A M
R G A P O R M
G R A O M P R
G R A O M P R
Hidden Layer at Sender side
G R A O M P R
O M P RG R A
R A O MG
P O R MR G A
P R O G R A M
P R
Hidden Layer at Receiver side
M M K1 M M K2 M M K3 M M K4 M M K5 M M K6 M M K7
K1 K2 K3 K4 K5 K6 K7
K1 K2 K3 K4 K5 A Key at receiver’s end
Elements from the key positions are fetched
Key removal (part 1)
Received ciphertext :
M M K1 M M K2 M M K3 M M K4 M M K5 M M K6 M M K7
M M M M M M M M M M M M M M
Plain Text
Key removal (part 2)
(-) (-)(-) (-)(-) (-)(-) (-)(-)(-) (-) (-) (-) (-)
A A A AA A A A A A A A A A
P P P P P P P P P P P P P P
K1 K2 K3 K4 K5 AKey at receiver’s end :
Dynamic data encryption using the concepts of ANN
Dynamic data encryption using the concepts of ANN
Dynamic data encryption using the concepts of ANN
Dynamic data encryption using the concepts of ANN
Dynamic data encryption using the concepts of ANN
Dynamic data encryption using the concepts of ANN
Dynamic data encryption using the concepts of ANN
Dynamic data encryption using the concepts of ANN
Dynamic data encryption using the concepts of ANN
UNIT Only numbers Only strings Alphanumeric Strings
Algorithm
for key
generation
SUCCESS SUCCESS SUCCESS
Algorithm
for Locking
SUCCESS SUCCESS SUCCESS
Algorithm
for Hidden
Layer at
sender side
SUCCESS SUCCESS SUCCESS
Algorithm
for Hidden
Layer at
receiver side
SUCCESS SUCCESS SUCCESS
Unlocking
Algorithm
SUCCESS SUCCESS SUCCESS
Unit Testing
Final
Output
Long
Alphanumeric
Text
SUCCESS
Short
Alphanumeric
Text
SUCCESS
Integration Testing
FUTURE SCOPE
• Complex mathematical functions can be introduced for
generating keys.
• More Hidden Layer can be incorporated.
• Can be applied to Multimedia Messaging.
Dynamic data encryption using the concepts of ANN

More Related Content

PDF
Golangにおける端末制御 リッチなターミナルUIの実現方法
PDF
How to develop a rich terminal UI application
PDF
Deep speech
PDF
PPT
Sequential Logic Circuit
PDF
BKK16-503 Undefined Behavior and Compiler Optimizations – Why Your Program St...
PDF
2. Stream Ciphers
PPTX
D and T Flip Flop
Golangにおける端末制御 リッチなターミナルUIの実現方法
How to develop a rich terminal UI application
Deep speech
Sequential Logic Circuit
BKK16-503 Undefined Behavior and Compiler Optimizations – Why Your Program St...
2. Stream Ciphers
D and T Flip Flop

What's hot (20)

PPT
Lec14 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Se...
PDF
Flip-Flop (Clocked Bistable)
PPT
Exploring Petri Net State Spaces
PPTX
Crypto talk OpenValue meetup 20-3-18
PPTX
A petri-net
PPTX
Flip flop conversions
PPTX
PDF
CNIT 141: 5. More About Block Ciphers + Modular Arithmetic 2
PPTX
Latches and flip flop
PPTX
Conversion of flip flop
PPTX
Petri Nets: Properties, Analysis and Applications
PPTX
latches
PPT
Flipflops JK T SR D All FlipFlop Slides
PDF
Flip flop
ODP
D Flip Flop
PPTX
บทที่4_6-ระบบเครือข่ายและการสื่อสาร+อินเทอร์เน็ต+การแก้ปัญหา
PPTX
Group 10 flip flop and rs latch 1
DOCX
All flipflop
PPT
Flip flop
PDF
Internet Technology (October – 2016) [Revised Syllabus | Question Paper]
Lec14 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Se...
Flip-Flop (Clocked Bistable)
Exploring Petri Net State Spaces
Crypto talk OpenValue meetup 20-3-18
A petri-net
Flip flop conversions
CNIT 141: 5. More About Block Ciphers + Modular Arithmetic 2
Latches and flip flop
Conversion of flip flop
Petri Nets: Properties, Analysis and Applications
latches
Flipflops JK T SR D All FlipFlop Slides
Flip flop
D Flip Flop
บทที่4_6-ระบบเครือข่ายและการสื่อสาร+อินเทอร์เน็ต+การแก้ปัญหา
Group 10 flip flop and rs latch 1
All flipflop
Flip flop
Internet Technology (October – 2016) [Revised Syllabus | Question Paper]
Ad

Viewers also liked (12)

PPTX
DOCX
Tarea iii ejercicios estructuras repetitivas (jesus palma )
PPTX
Pp1 cuffia tur
PPS
Comunicacion tea
PDF
Morning tea 14 02-2017
DOCX
Tarea ejercicios estructuras anidadas (jesus palma )
PPT
Un paso adelante en las carreras de Bibliotecología de la UNMdP
PDF
Schader_Honors_Thesis
PPT
La revolución del entrenamiento musical
PDF
Chilean Capital Market
PPSX
ABP - Utilizando Moodle
PPT
S.o.s.manual para el profesor virtual
Tarea iii ejercicios estructuras repetitivas (jesus palma )
Pp1 cuffia tur
Comunicacion tea
Morning tea 14 02-2017
Tarea ejercicios estructuras anidadas (jesus palma )
Un paso adelante en las carreras de Bibliotecología de la UNMdP
Schader_Honors_Thesis
La revolución del entrenamiento musical
Chilean Capital Market
ABP - Utilizando Moodle
S.o.s.manual para el profesor virtual
Ad

Similar to Dynamic data encryption using the concepts of ANN (20)

PPTX
cryptographyandnetworksecu-module-1.pptx
PPTX
Chapter-Three Part One.pptxghgjhhjghjhjhhj
PDF
Dr Shivu_GAT_Computer Network_Module 5.pdf
PPTX
Cryptography and Network security # Lecture 4
PPTX
Secret key cryptography
PPT
Crypt
PPTX
Rass presentation
PPT
ICSE6104 Lecture bbbbbbbbbbbbbbbbbbbb 2.ppt
PPT
What is Encryption
PPTX
IANSunit 1_cryptography_2.pptxv xvxvxvxv
PPTX
MODULE1_CLASSICALENCRYPTIONTECHNIQUES.pptx
PPTX
ServerDecwweddgccgccfgvxgxcvfxvhfxvr.pptx
PPT
EncryptionTechChap2.ppt
PPT
Cyber security Unit 3 Cryptography and Network security
PPTX
Mod1 basics cryptography first module vtu
PPTX
Cryptography in discrete structure .pptx
PPTX
Module 1.pptx
PDF
Fundamentals of Cryptography: Securing Data in the Digital Age
PPT
Computer systems security 7-cryptography.ppt
PPT
CISSP EXAM PREPARATION FOR A PASSED SCORE
cryptographyandnetworksecu-module-1.pptx
Chapter-Three Part One.pptxghgjhhjghjhjhhj
Dr Shivu_GAT_Computer Network_Module 5.pdf
Cryptography and Network security # Lecture 4
Secret key cryptography
Crypt
Rass presentation
ICSE6104 Lecture bbbbbbbbbbbbbbbbbbbb 2.ppt
What is Encryption
IANSunit 1_cryptography_2.pptxv xvxvxvxv
MODULE1_CLASSICALENCRYPTIONTECHNIQUES.pptx
ServerDecwweddgccgccfgvxgxcvfxvhfxvr.pptx
EncryptionTechChap2.ppt
Cyber security Unit 3 Cryptography and Network security
Mod1 basics cryptography first module vtu
Cryptography in discrete structure .pptx
Module 1.pptx
Fundamentals of Cryptography: Securing Data in the Digital Age
Computer systems security 7-cryptography.ppt
CISSP EXAM PREPARATION FOR A PASSED SCORE

Recently uploaded (20)

PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PPTX
Essential Infomation Tech presentation.pptx
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
medical staffing services at VALiNTRY
PDF
Understanding Forklifts - TECH EHS Solution
PPTX
Reimagine Home Health with the Power of Agentic AI​
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
Softaken Excel to vCard Converter Software.pdf
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PPTX
L1 - Introduction to python Backend.pptx
PDF
top salesforce developer skills in 2025.pdf
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
How Creative Agencies Leverage Project Management Software.pdf
Operating system designcfffgfgggggggvggggggggg
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
Essential Infomation Tech presentation.pptx
Odoo Companies in India – Driving Business Transformation.pdf
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
medical staffing services at VALiNTRY
Understanding Forklifts - TECH EHS Solution
Reimagine Home Health with the Power of Agentic AI​
Wondershare Filmora 15 Crack With Activation Key [2025
Softaken Excel to vCard Converter Software.pdf
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
L1 - Introduction to python Backend.pptx
top salesforce developer skills in 2025.pdf
Adobe Illustrator 28.6 Crack My Vision of Vector Design
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
How Creative Agencies Leverage Project Management Software.pdf

Dynamic data encryption using the concepts of ANN

  • 4. TXT KEY HIDDEN LAYER HIDDEN LAYER TXT KEY INTERNET SENDER SIDE RECEIVER SIDE PLAIN TEXT S E N D E R R E C E I V E R R.K. PLAIN TEXT ENCRYPTED TEXT ENCRYPTED TEXT AUTOMATIC LOCKING PROCEDURE MANUAL UNLOCKING PROCEDURE
  • 5. FEATURES: • Dynamic key generation. • Asymmetric key algorithm. • No limitation in the length of the plain text. • Automatic locking.
  • 9. Q W E R T Y U I O P A S D F G H J K L Z X C V B N M q w e r t y u i o p a s d f g h j k l z x c v b n m 1 2 3 4 5 6 7 8 9 0 @ # $ % ^ & _ ~ ` ! + - * / | { } [ ] ( ) = : ; “ ‘ < > , . ?
  • 10. 1 2 3 4 5 6 7 Elements from 32th position to 62th position of key board Elements from 1st position to 31th position of key board … N Average of all the key elements and it’s corresponding position Key Generation
  • 11. P R K1 O G K2 R A K3 M MESSAGE KEY ELEMENTS Locking Procedure (1)
  • 12. P R K1 O G K2 R A K3 M K1 K2 K3 Z r B K1 e o K2 B t K3 z Locking Procedure (2)
  • 13. P R O G R A M R G A P O R M G R A O M P R G R A O M P R Hidden Layer at Sender side
  • 14. G R A O M P R O M P RG R A R A O MG P O R MR G A P R O G R A M P R Hidden Layer at Receiver side
  • 15. M M K1 M M K2 M M K3 M M K4 M M K5 M M K6 M M K7 K1 K2 K3 K4 K5 K6 K7 K1 K2 K3 K4 K5 A Key at receiver’s end Elements from the key positions are fetched Key removal (part 1) Received ciphertext :
  • 16. M M K1 M M K2 M M K3 M M K4 M M K5 M M K6 M M K7 M M M M M M M M M M M M M M Plain Text Key removal (part 2) (-) (-)(-) (-)(-) (-)(-) (-)(-)(-) (-) (-) (-) (-) A A A AA A A A A A A A A A P P P P P P P P P P P P P P K1 K2 K3 K4 K5 AKey at receiver’s end :
  • 26. UNIT Only numbers Only strings Alphanumeric Strings Algorithm for key generation SUCCESS SUCCESS SUCCESS Algorithm for Locking SUCCESS SUCCESS SUCCESS Algorithm for Hidden Layer at sender side SUCCESS SUCCESS SUCCESS Algorithm for Hidden Layer at receiver side SUCCESS SUCCESS SUCCESS Unlocking Algorithm SUCCESS SUCCESS SUCCESS Unit Testing
  • 28. FUTURE SCOPE • Complex mathematical functions can be introduced for generating keys. • More Hidden Layer can be incorporated. • Can be applied to Multimedia Messaging.