Successful attack on permutation-parity-machine-based neural cryptography.

نویسندگان

  • Luís F Seoane
  • Andreas Ruttor
چکیده

An algorithm is presented which implements a probabilistic attack on the key-exchange protocol based on permutation parity machines. Instead of imitating the synchronization of the communicating partners, the strategy consists of a Monte Carlo method to sample the space of possible weights during inner rounds and an analytic approach to convey the extracted information from one outer round to the next one. The results show that the protocol under attack fails to synchronize faster than an eavesdropper using this algorithm.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Successful attack on PPM-based neural cryptography

An algorithm is presented which implements a probabilistic attack on the key-exchange protocol based on Permutation Parity Machines. The strategy consists of a Monte Carlo method to sample the space of possible weights during inner rounds and an analytic approach to convey the extracted information from one outer round to the next one. The results show that the protocol under attack fails to sy...

متن کامل

Neural cryptography with queries

Neural cryptography is based on synchronization of tree parity machines by mutual learning. We extend previous key-exchange protocols by replacing random inputs with queries depending on the current state of the neural networks. The probability of a successful attack is calculated for different model parameters using numerical simulations. The results show that queries restore the security agai...

متن کامل

An Analysis of Email Encryption using Neural Cryptography

Encrypted Email using Neural Cryptography is a way of sending and receiving encrypted email through public channel. Neural key exchange, which is based on the synchronization of two tree parity machines, can be a secure replacement for this method. This paper present an implementation of neural cryptography for encrypted E-mail where Tree Parity Machines are initialized with random inputs vecto...

متن کامل

Authenticated tree parity machine key exchange

The synchronisation of Tree Parity Machines (TPMs), has proven to provide a valuable alternative concept for secure key exchange. Yet, from a cryptographer’s point of view, authentication is at least as important as a secure exchange of keys. Adding an authentication via hashing e.g. is straightforward but with no relation to Neural Cryptography. We consequently formulate an authenticated key e...

متن کامل

Cipher text only attack on speech time scrambling systems using correction of audio spectrogram

Recently permutation multimedia ciphers were broken in a chosen-plaintext scenario. That attack models a very resourceful adversary which may not always be the case. To show insecurity of these ciphers, we present a cipher-text only attack on speech permutation ciphers. We show inherent redundancies of speech can pave the path for a successful cipher-text only attack. To that end, regularities ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Physical review. E, Statistical, nonlinear, and soft matter physics

دوره 85 2 Pt 2  شماره 

صفحات  -

تاریخ انتشار 2012