Authenticated tree parity machine key exchange

Computer Science – Cryptography and Security

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

This work directly relates to cond-mat/0202112 (see also http://arxiv.org/find/cond-mat/1/au:+Kinzel/0/1/0/all/0/1)

Scientific paper

The synchronisation of Tree Parity Machines (TPMs), has proven to provide a valuable alternative concept for secure symmetric key exchange. Yet, from a cryptographer's point of view, authentication is at least as important as a secure exchange of keys. Adding an authentication via hashing e.g. is straightforward but with no relation to Neural Cryptography. We consequently formulate an authenticated key exchange within this concept. Another alternative, integrating a Zero-Knowledge protocol into the synchronisation, is also presented. A Man-In-The-Middle attack and even all currently known attacks, that are based on using identically structured TPMs and synchronisation as well, can so be averted. This in turn has practical consequences on using the trajectory in weight space. Both suggestions have the advantage of not affecting the previously observed physics of this interacting system at all.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Authenticated tree parity machine key exchange does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Authenticated tree parity machine key exchange, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Authenticated tree parity machine key exchange will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-713631

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.