Problem statement: The problem in cryptanalysis can be described as an unknown and the neural networks are ideal tools for black-box system identification. In this study, a mathematical black-box model is developed and system identification techniques are combined with adaptive system techniques, to construct the Neuro-Identifier. Approach: The Neuro-Identifier was discussed as a black-box model to attack the target cipher systems. Results: In this study this model is a new addition in cryptography that presented the methods of block (SDES) crypto systems discussed. The constructing of Neuro-Identifier mode achieved two objectives: The first one was to construct emulator of Neuro-model for the target cipher system, while the second was to (cryptanalysis) determine the key from given plaintext-ciphertext pair. Conclusion: Present the idea of the equivalent cipher system, which is identical 100% to the unknown system and that means that an unknown hardware, or software cipher system could be reconstructed without known the internal circuitry or algorithm of it
The openness of business toward telecommunication network in general and internet in particular is performed at the prize of high security risks. Every professional knows that the only way to secure completely a private network is to make it unreachable. However, even if this solution was undertaken for many years, nowadays it is not possible to close private network especially for business purpose. Thus security management becomes an important issue that must be considered carefully.This research concentrates on one particular aspect. where the networks becomes more complex (number of machines, number of users, number of connections....), making them more vulnerable to various kinds of complex security attacks. Therefore the Intrusion Detection Systems (IDSs) require more advanced models to deal with these requirements. Multi-Agent System (MAS) is suggested to provide powerful for the modeling and development of complex systems for detecting attacks. This can be done by depending on decomposition ofthe system into several interacting and autonomous entities called agents. Agent is an entity functions continuously an autonomously in an environment in which other processes take place and other agents exist.
Abstract:One of the serious problems is how to authenticate the passport document for its holder. The major factor of this authenticity is the corresponding of the Passport's photo with its holder. Most of the Passport document contains a holder's signature in addition, of course, to the full name. We propose a firm authentication method by extracting some features for the original name of the holder with the passport number and digest them in a form, by applying some techniques, that can be hidden in the passport's photo. The modern method of issuing a passport now is by using a computer in fixing the passport's photo (imaging). In using this method we could hide the invisible watermark which contains the digest name and passport number inside the passport's photo. During the hidden process there are many techniques could be applied to disguise any color difference appears during the hidden process. After using this technique, it is very simple to use the computer in scanning and verifying, at check point, that the passport's photo has been not replaced and that by comparing the invisible watermark with the digest name of the holder and passport number.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.