Applying Neural Networks to Cryptography
S. Muthamil Selvan M.S1, S.Narasimhaiah2, Y Sai Manikanta Reddy3, B. Hemanth Kumar4

1S. Muthamil Selvan M.S, Department of Computer Science, SRM Institute of Science and Technology, Chennai (Tamil Nadu), India.

2S.Narasimhaiah, Department of Computer Science, SRM Institute of Science and Technology, Chennai (Tamil Nadu), India.

3Y Sai Manikanta Reddy, Department of Computer Science, SRM Institute of Science and Technology, Chennai (Tamil Nadu), India.

4B Hemanth Kumar, Department of Computer Science, SRM Institute of Science and Technology, Chennai (Tamil Nadu), India.

Manuscript received on 10 December 2020 | Revised Manuscript received on 12 December 2020 | Manuscript Accepted on 15 December 2020 | Manuscript published on 30 December 2020 | PP: 14-18 | Volume-1 Issue-1 December 2020 | Retrieval Number: 100.1/ijainn.A1004011121

Open Access | Ethics and Policies | Indexing and Abstracting

© The Authors. Published by Lattice Science Publication (LSP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: This paper is small part that investigates about methods involved in encryption of data by using cryptographic methods for cell phones and smart devices, by utilizing neural systems method.This is considered as the major problem because of increased in usage of mobile and tablets in mobile transactions across the world in place of conventional pc. The major goal is to provide strong authentication systems that can efficiently handle the encryption systems like: Strong Authentication (HTTS), Authentication system for mobile, Near Field Communication, advanced encryption system , one time password infusion with neural networks (in view of natural building blocks of neural network in human brain and how data stored, analyzed and retrieved)will provide strong authentication for the mobile phone users and I t also increases the mobile security standards. The main theme is to determine the foremost fusion of cryptography techniques in combination with neural network algorithms it provides formidable increase security over the authentication of the cell phones. This can be attained by inspecting and evoluvating of the cryptographic methods with neural network algorithms, using the NS-3 Network Simulator, Python SciPy Library under BSD. The outcomes and finishes of the examinations may fill in as a guide cell phones.

Keywords: Data Sets, Mobile Transaction.