Implementation and research of the algorithm of cryptographic protection of data with the public key based on the neural network

Abstract

The algorithm of cryptographic protection of data with the public key using a multilayer perceptron is implemented. The design of a software solution is an object-oriented class hierarchy. The decomposition is carried out in such a way that it allows easy modifing the system, in particular the possibility of replacing the neural network or the threshold function with other similar components. An experimental study of the software system for comparing the effectiveness of various threshold functions, as well as the effect of parallelization of learning algorithms on the algorithm's speed was conducted.

Authors and Affiliations

S. I. Bondarchuk, V. N. Kovalchuk, A. M. Kovalchuk, A. A. Yefimenko

Keywords

Related Articles

Increase of operational reliability and durability of square sectoral working bodies of flexible screw conveyors

The construction of the device for guiding screw sectional working bodies of increased operational reliability and durability and the method of determination of the force of guiding the design parameters are given. Two m...

Analysis of self-oscillations of the wheeled vehicle model when driving on a straight-line segment of the overpass

There is the problem of traffic congestion of large cities of Ukraine. The introduction of the monorail will solve this problem. To ensure the comfort and safety of the transport of passengers it is proposed to investiga...

Aerials of digital on-air broadcasting

Aerials of digital on-air broadcasting have the specific structural features, that consist in that for the best reception of digital signals without distortion of signal form, gain-frequency response of aerial as links o...

Determination of forces acting on the car wheel at towing

The article analyzes the relevance of the research topics, defines goals and objectives, subject and object of research. Based on analysis of the literature, it was found that interaction model available propulsion wheel...

Innovative solutions of the underground exploitation of coal deposits

The article offers the development of a tool to estimate the state of operation schedules of coal mines relying upon the analysis of actual state of an operation schedule taking into consideration hierarchic connections...

Download PDF file
  • EP ID EP420456
  • DOI -
  • Views 130
  • Downloads 0

How To Cite

S. I. Bondarchuk, V. N. Kovalchuk, A. M. Kovalchuk, A. A. Yefimenko (2018). Implementation and research of the algorithm of cryptographic protection of data with the public key based on the neural network. Вісник Житомирського державного технологічного університету. Серія: Технічні науки, 82(2), 195-203. https://europub.co.uk/articles/-A-420456