Private Inputs to Tree Parity Machine

Neural cryptography is based on synchronization of tree parity machines by mutual learning. We extend previous key-exchange protocols by replacing random inputs with queries depending on the current state of the neural networks. The results show that queries restore the security against attackers. W...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International Journal of Computer Theory and Engineering 2010-08, Vol.2 (4), p.665-669
Hauptverfasser: Revankar, Pravin, Gandhare, W Z, Rathod, Dilip
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Neural cryptography is based on synchronization of tree parity machines by mutual learning. We extend previous key-exchange protocols by replacing random inputs with queries depending on the current state of the neural networks. The results show that queries restore the security against attackers. We further restrict amount information available to an attacker by keeping seed of pseudo randomnumber generator private.
ISSN:1793-8201
DOI:10.7763/IJCTE.2010.V2.220