DocumentCode :
1871028
Title :
Neural Synchronization with Queries
Author :
Revankar, Pravin ; Gandhare, W.Z. ; Rathod, Dilip
Author_Institution :
Gov. Coll. of Eng., Aurangabad, India
fYear :
2010
fDate :
9-10 Feb. 2010
Firstpage :
371
Lastpage :
374
Abstract :
The neural key exchange algorithm for choosing the relevant inputs is sufficient to achieve a more or less secure key-exchange protocol, however A and B could improve it by taking more information into account, including queries in the training process of the neural networks. Alternatively A and B are generating an input which is correlated with its state and A or B is asking the partner for the corresponding output bit. The overlap between input and weight vector is so low that the additional information does not reveal much about the internal states. But queries introduce a mutual influence between A and B which is not available to an attacking network E. In this work query incorporated to the case of the Hebbian training rule. The probability of a successful attack is calculated for different model parameters using numerical simulations. The results show that queries restore the security against cooperating attackers.
Keywords :
Hebbian learning; cryptography; neural nets; probability; vectors; Hebbian training rule; neural key exchange algorithm; neural network; neural synchronization; secure key-exchange protocol; Educational institutions; Government; Information security; Neural networks; Numerical models; Numerical simulation; Probability; Protocols; Public key cryptography; Signal processing; Neural cryptography; encryption/decryption; mutual learning; neural network; neural synchronization; query; tree parity machine;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Signal Acquisition and Processing, 2010. ICSAP '10. International Conference on
Conference_Location :
Bangalore
Print_ISBN :
978-1-4244-5724-3
Electronic_ISBN :
978-1-4244-5725-0
Type :
conf
DOI :
10.1109/ICSAP.2010.38
Filename :
5432938
Link To Document :
بازگشت