scholarly journals Empirical research of the distribution function of synchronization time of neural networks in the key exchange protocol

2014 ◽  
Vol 4 (1(18)) ◽  
pp. 26
Author(s):  
Олена Романівна Малік
2020 ◽  
Vol 2020 ◽  
pp. 1-10
Author(s):  
Yi Liang Han ◽  
Yu Li ◽  
Zhe Li ◽  
Shuai Shuai Zhu

The synchronization between two neural networks by mutual learning can be used to design the neural key exchange protocol. The critical issue is how to evaluate the synchronization without a weight vector. All existing methods have a delay in evaluating the synchronization, which affects the security of the neural key exchange. To evaluate the full synchronization of neural networks more timely and accurately, an improved method for evaluating the synchronization is proposed. First, the frequency that the two networks have the same output in previous steps is used for assessing the degree of them roughly. Second, the hash function is utilized to judge whether the two networks have achieved full synchronization precisely when the degree exceeds a given threshold. The improved method can find the full synchronization between two networks with no information other than the hash value of the weight vector. Compared with other methods, the full synchronization can be detected earlier by two communication partners which adopt the method proposed in this paper. As a result, the successful probability of geometric is reduced. Therefore, the proposed method can enhance the security of the neural exchange protocol.


2004 ◽  
Vol 14 (06) ◽  
pp. 393-405 ◽  
Author(s):  
JIANTAO ZHOU ◽  
QINZHEN XU ◽  
WENJIANG PEI ◽  
ZHENYA HE ◽  
HAROLD SZU

Synchronization of neural networks by mutual learning has been demonstrated to be possible for constructing key exchange protocol over public channel. However, the neural cryptography schemes presented so far are not the securest under regular flipping attack (RFA) and are completely insecure under majority flipping attack (MFA). We propose a scheme by splitting the mutual information and the training process to improve the security of neural cryptosystem against flipping attacks. Both analytical and simulation results show that the success probability of RFA on the proposed scheme can be decreased to the level of brute force attack (BFA) and the success probability of MFA still decays exponentially with the weights' level L. The synchronization time of the parties also remains polynomial with L. Moreover, we analyze the security under an advanced flipping attack.


Author(s):  
Arindam Sarkar

AbstractNeural synchronization is a technique for establishing the cryptographic key exchange protocol over a public channel. Two neural networks receive common inputs and exchange their outputs. In some steps, it leads to full synchronization by setting the discrete weights according to the specific rule of learning. This synchronized weight is used as a common secret session key. But there are seldom research is done to investigate the synchronization of a cluster of neural networks. In this paper, a Generative Adversarial Network (GAN)-based synchronization of a cluster of neural networks with three hidden layers is proposed for the development of the public-key exchange protocol. This paper highlights a variety of interesting improvements to traditional GAN architecture. Here GAN is used for Pseudo-Random Number Generators (PRNG) for neural synchronization. Each neural network is considered as a node of a binary tree framework. When both i-th and j-th nodes of the binary tree are synchronized then one of these two nodes is elected as a leader. Now, this leader node will synchronize with the leader of the other branch. After completion of this process synchronized weight becomes the session key for the whole cluster. This proposed technique has several advantages like (1) There is no need to synchronize one neural network to every other in the cluster instead of that entire cluster can be able to share the same secret key by synchronizing between the elected leader nodes with only logarithmic synchronization steps. (2) This proposed technology provides GAN-based PRNG which is very sensitive to the initial seed value. (3) Three hidden layers leads to the complex internal architecture of the Tree Parity Machine (TPM). So, it will be difficult for the attacker to guess the internal architecture. (4) An increase in the weight range of the neural network increases the complexity of a successful attack exponentially but the effort to build the neural key decreases over the polynomial time. (5) The proposed technique also offers synchronization and authentication steps in parallel. It is difficult for the attacker to distinguish between synchronization and authentication steps. This proposed technique has been passed through different parametric tests. Simulations of the process show effectiveness in terms of cited results in the paper.


2006 ◽  
Vol 1 (2) ◽  
pp. 52-70
Author(s):  
Mohammed A. Tawfiq ◽  
◽  
Sufyan T. Faraj Al-janabi ◽  
Abdul-Karim A. R. Kadhim ◽  
◽  
...  

2010 ◽  
Vol 30 (7) ◽  
pp. 1805-1808
Author(s):  
Shao-feng DENG ◽  
Fan DENG ◽  
Yi-fa LI

2020 ◽  
Vol 9 (12) ◽  
pp. 11169-11177
Author(s):  
A. J. Meshram ◽  
C. Meshram ◽  
S. D. Bagde ◽  
R. R. Meshram

Sign in / Sign up

Export Citation Format

Share Document