| | |
| | |
Stat |
Members: 3645 Articles: 2'506'133 Articles rated: 2609
26 April 2024 |
|
| | | |
|
Article overview
| |
|
Secure key-exchange protocol with an absence of injective functions | R Mislovaty
; Y Perchenok
; I Kanter
; W Kinzel
; | Date: |
30 Nov 2002 | Journal: | Phys Rev E, 66 (6 Pt 2), 066102 | Abstract: | The security of neural cryptography is investigated. A key-exchange protocol over a public channel is studied where the parties exchanging secret messages use multilayer neural networks which are trained by their mutual output bits and synchronize to a time dependent secret key. The weights of the networks have integer values between +/-L. Recently an algorithm for an eavesdropper which could break the key was introduced by [A. Shamir, A. Mityagin, and A. Klimov, Ramp Session (Eurocrypt, Amsterdam, 2002)]. We show that the synchronization time increases with L2 while the probability to find a successful attacker decreases exponentially with L. Hence for large L we find a secure key-exchange protocol which depends neither on number theory nor on injective trapdoor functions used in conventional cryptography. | Source: | PubMed, pmid12513342 | Services: | Forum | Review | Favorites |
|
|
No review found.
Did you like this article?
Note: answers to reviews or questions about the article must be posted in the forum section.
Authors are not allowed to review their own article. They can use the forum section.
browser Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebot@anthropic.com)
|
| |
|
|
|
| News, job offers and information for researchers and scientists:
| |