Computer Science – Cryptography and Security
Scientific paper
2011-11-24
Computer Science
Cryptography and Security
4 pages, 2 figures
Scientific paper
An algorithm is presented which implements a probabilistic attack on the key-exchange protocol based on Permutation Parity Machines. The strategy consists of a Monte Carlo method to sample the space of possible weights during inner rounds and an analytic approach to convey the extracted information from one outer round to the next one. The results show that the protocol under attack fails to synchronize faster than an eavesdropper using this algorithm.
Ruttor Andreas
Seoane Luís F.
No associations
LandOfFree
Successful attack on PPM-based neural cryptography does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Successful attack on PPM-based neural cryptography, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Successful attack on PPM-based neural cryptography will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-157531