Neural cryptography with queries
نویسندگان
چکیده
منابع مشابه
Neural cryptography with queries
Neural cryptography is based on synchronization of tree parity machines by mutual learning. We extend previous key-exchange protocols by replacing random inputs with queries depending on the current state of the neural networks. The probability of a successful attack is calculated for different model parameters using numerical simulations. The results show that queries restore the security agai...
متن کاملNeural Cryptography
Two neural networks which are trained on their mutual output bits show a novel phenomenon: The networks synchronize to a state with identical time dependent weights. It is shown how synchronization by mutual learning can be applied to cryptography: secret key exchange over a public channel.
متن کامل6.845 Project: Classical Cryptography, Quantum Queries
. In Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO ’95, pages 424–437, London, UK, UK, 1995. Springer-Verlag. [4] Dan Boneh, Ozgu r Dagdelen, Marc Fischlin, Anja Lehmann, Christian Schaffner, and Mark Zhandry. Random oracles in a quantum world. In Proceedings of Asiacrypt, 2011. Full version available at the Cryptology ePrint Archives: http...
متن کاملAnalysis of Neural Cryptography
In this paper we analyse the security of a new key exchange protocol proposed in [3], which is based on mutually learning neural networks. This is a new potential source for public key cryptographic schemes which are not based on number theoretic functions, and have small time and memory complexities. In the first part of the paper we analyse the scheme, explain why the two parties converge to ...
متن کاملNeural Network Based Cryptography
In this paper, neural network based cryptology is performed. The system consists of two stages. In the first stage, neural network-based pseudo-random numbers (NPRNGs) are generated and the results are tested for randomness using National Institute of Standard Technology (NIST) randomness tests. In the second stage, a neural network-based cryptosystem is designed using NPRNGs. In this cryptosys...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Statistical Mechanics: Theory and Experiment
سال: 2005
ISSN: 1742-5468
DOI: 10.1088/1742-5468/2005/01/p01009