A secure key-exchange protocol with an absence of injective functions

Physics – Condensed Matter – Disordered Systems and Neural Networks

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

4 pages, 4 figures

Scientific paper

10.1103/PhysRevE.66.066102

The security of neural cryptography is investigated. A key-exchange protocol over a public channel is studied where the parties exchanging secret messages use multilayer neural networks which are trained by their mutual output bits and synchronize to a time dependent secret key. The weights of the networks have integer values between $\pm L$. Recently an algorithm for an eavesdropper which could break the key was introduced by Shamir et al. [adi]. We show that the synchronization time increases with $L^2$ while the probability to find a successful attacker decreases exponentially with $L$. Hence for large $L$ we find a secure key-exchange protocol which depends neither on number theory nor on injective trapdoor functions used in conventional cryptography.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

A secure key-exchange protocol with an absence of injective functions does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with A secure key-exchange protocol with an absence of injective functions, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and A secure key-exchange protocol with an absence of injective functions will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-496535

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.