Title :
Neural Synchronization with Queries
Author :
Revankar, Pravin ; Gandhare, W.Z. ; Rathod, Dilip
Author_Institution :
Gov. Coll. of Eng., Aurangabad, India
Abstract :
The neural key exchange algorithm for choosing the relevant inputs is sufficient to achieve a more or less secure key-exchange protocol, however A and B could improve it by taking more information into account, including queries in the training process of the neural networks. Alternatively A and B are generating an input which is correlated with its state and A or B is asking the partner for the corresponding output bit. The overlap between input and weight vector is so low that the additional information does not reveal much about the internal states. But queries introduce a mutual influence between A and B which is not available to an attacking network E. In this work query incorporated to the case of the Hebbian training rule. The probability of a successful attack is calculated for different model parameters using numerical simulations. The results show that queries restore the security against cooperating attackers.
Keywords :
Hebbian learning; cryptography; neural nets; probability; vectors; Hebbian training rule; neural key exchange algorithm; neural network; neural synchronization; secure key-exchange protocol; Educational institutions; Government; Information security; Neural networks; Numerical models; Numerical simulation; Probability; Protocols; Public key cryptography; Signal processing; Neural cryptography; encryption/decryption; mutual learning; neural network; neural synchronization; query; tree parity machine;
Conference_Titel :
Signal Acquisition and Processing, 2010. ICSAP '10. International Conference on
Conference_Location :
Bangalore
Print_ISBN :
978-1-4244-5724-3
Electronic_ISBN :
978-1-4244-5725-0
DOI :
10.1109/ICSAP.2010.38