Spiking Neurons with ASNN Based-Methods for the Neural Block Cipher
Problem statement: This paper examines Artificial Spiking Neural Network (ASNN) which inter-connects group of artificial neurons that uses a mathematical model with the aid of block cipher. The aim of
Problem statement: This paper examines Artificial Spiking Neural Network (ASNN) which inter-connects group of artificial neurons that uses a mathematical model with the aid of block cipher. The aim of undertaken this research is to come up with a block cipher where by the keys are randomly generated by ASNN which can then have any variable block length. This will show the private key is kept and do not have to be exchange to the other side of the communication channel so it present a more secure procedure of key scheduling. The process enables for a faster change in encryption keys and a network level encryption to be implemented at a high speed without the headache of factorization. Approach: The block cipher is converted in public cryptosystem and had a low level of vulnerability to attack from brute, and moreover can able to defend against linear attacks since the Artificial Neural Networks (ANN) architecture convey non-linearity to the encryption/decryption procedures. Result: In this paper is present to use the Spiking Neural Networks (SNNs) with spiking neurons as its basic unit. The timing for the SNNs is considered and the output is encoded in 1’s and 0’s depending on the occurrence or not occurrence of spikes as well as the spiking neural networks use a sign function as activation function, and present the weights and the filter coefficients to be adjust, having more degrees of freedom than the classical neural networks. Conclusion: In conclusion therefore, encryption algorithm can be deployed in communication and security applications where data transfers are most crucial. So this paper, the neural block cipher proposed where the keys are generated by the SNN and the seed is considered the public key which generates the both keys on both sides In future therefore a new research will be conducted on the Spiking Neural Network (SNN) impacts on communication.
💡 Research Summary
The paper proposes a novel block‑cipher construction in which the secret encryption keys are generated on‑the‑fly by an Artificial Spiking Neural Network (ASNN). Instead of exchanging a secret key or relying on a traditional key‑exchange protocol, both communicating parties start from a common public seed (the “public key”) and instantiate identical spiking‑neuron networks. The ASNN produces a binary stream by mapping the occurrence of spikes to “1” and the absence of spikes to “0”. This stream is then used as the round‑key material for a conventional substitution‑permutation network (SPN) block cipher.
Key technical elements are: (1) the use of spiking neurons whose dynamics are governed by a leaky‑integrate‑and‑fire‑like model; (2) a sign‑function activation that directly yields binary outputs; (3) adjustable synaptic weights and filter coefficients that provide a high‑dimensional parameter space; and (4) the public seed that synchronises the initial state of the networks on both ends. Because the spiking pattern depends on both the continuous membrane potential evolution and the discrete firing events, the generated key stream exhibits temporal non‑linearity and a large effective entropy.
The authors argue that this construction offers several security advantages. First, the key space is not limited to a fixed bit‑length but expands with the number of weight, filter, and timing configurations, making exhaustive brute‑force attacks computationally infeasible. Second, the time‑dependent, event‑driven nature of the ASNN introduces non‑linear relationships that are claimed to resist linear and differential cryptanalysis, which typically exploit linear approximations of the round function. Third, because the key is regenerated for each session (or even for each block) without any explicit exchange, the protocol eliminates the classic key‑distribution vulnerability.
Performance claims focus on speed and energy efficiency. Spike generation is event‑driven, so computation occurs only when a neuron fires, potentially reducing the number of arithmetic operations compared with a conventional key‑schedule that updates every round. The authors also suggest that the adjustable weights and filters allow the cipher to support variable block sizes and numbers of rounds without redesigning the algorithm.
However, the paper lacks rigorous quantitative evidence for many of its assertions. No statistical tests (e.g., NIST SP 800‑22) are presented to demonstrate that the ASNN output meets cryptographic randomness standards. The security analysis is qualitative; there is no formal proof of resistance to known‑plaintext, chosen‑plaintext, or side‑channel attacks, nor any complexity estimates for an attacker attempting to reconstruct the weight/filter parameters from observed ciphertexts. The public seed, while openly shared, becomes a single point of failure if an adversary can model the ASNN’s dynamics; the paper does not discuss mitigation strategies such as seed randomisation or additional entropy sources.
Implementation considerations are also under‑explored. Realising spiking neuron models (e.g., leaky‑integrate‑and‑fire) on conventional CPUs or GPUs can incur significant overhead due to the need for fine‑grained time‑step simulation. Hardware accelerators (neuromorphic chips) could alleviate this, but the authors provide no benchmark data, power consumption figures, or latency measurements. Consequently, the claim of “high‑speed network‑level encryption” remains speculative.
In the conclusion, the authors reiterate that the ASNN‑based block cipher could be deployed in latency‑sensitive communication systems and outline future work on deeper analysis of SNN impacts on security and hardware implementation. Overall, the paper introduces an intriguing interdisciplinary concept—leveraging the temporal dynamics of spiking neural networks for cryptographic key generation—but falls short of delivering the rigorous cryptographic validation, performance evaluation, and implementation roadmap required for practical adoption. Further research must address statistical randomness validation, formal security proofs, resistance to side‑channel leakage, and concrete hardware prototypes before the approach can be considered a viable alternative to established symmetric‑key schemes.
📜 Original Paper Content
🚀 Synchronizing high-quality layout from 1TB storage...