Physics – Condensed Matter – Disordered Systems and Neural Networks
Scientific paper
2002-06-12
Physics
Condensed Matter
Disordered Systems and Neural Networks
4 pages, 4 figures
Scientific paper
10.1103/PhysRevE.66.066102
The security of neural cryptography is investigated. A key-exchange protocol over a public channel is studied where the parties exchanging secret messages use multilayer neural networks which are trained by their mutual output bits and synchronize to a time dependent secret key. The weights of the networks have integer values between $\pm L$. Recently an algorithm for an eavesdropper which could break the key was introduced by Shamir et al. [adi]. We show that the synchronization time increases with $L^2$ while the probability to find a successful attacker decreases exponentially with $L$. Hence for large $L$ we find a secure key-exchange protocol which depends neither on number theory nor on injective trapdoor functions used in conventional cryptography.
Kanter Ido
Kinzel Wolfgang
Mislovaty Rachel
Perchenok Y.
No associations
LandOfFree
A secure key-exchange protocol with an absence of injective functions does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with A secure key-exchange protocol with an absence of injective functions, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and A secure key-exchange protocol with an absence of injective functions will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-496535