Empirical research of the distribution function of synchronization time of neural networks in the key exchange protocol

Authors

  • Олена Романівна Малік National Technical University of Ukraine "Kyiv Polytechnic Institute, 37, Prospect Peremohy, Kyiv -56, Ukraine, 03056, Ukraine https://orcid.org/0000-0002-9687-1294

DOI:

https://doi.org/10.15587/2312-8372.2014.26288

Keywords:

neural networks, mutual learning, key exchange protocol

Abstract

Neurocryptography is relatively new and little-studied area. Existing results show the prospects of this direction, but practical application requires a fairly complete analysis of existing protocols and systems. Analysis of the features of the key exchange protocol, which is built using the mutual learning of special-type neural networks - tree parity machines was conducted in the paper. Known existing protocol attack strategies were considered. A special part of the protocol is determining the synchronization moment of the neural networks of subscribers. The studies have revealed that the average number of the protocol iterations, required for synchronization significantly differs from the maximum value. To achieve the goal, the work of the protocol with a fairly large number of different neural networks was simulated. The synchronization time feature, found in the work shows the vulnerability of the studied protocol since it allows an intruder to carry out one of the known protocol attack strategies.

Author Biography

Олена Романівна Малік, National Technical University of Ukraine "Kyiv Polytechnic Institute, 37, Prospect Peremohy, Kyiv -56, Ukraine, 03056

Department of mathematical methods of information security

Physico-Technical Institute

References

  1. Kanter, I., Kinzel, W. (2003). The theory of neural networks and cryptography. The Physics of Communication - Proceedings of the XXII Solvay Conference on Physics, 631-644. doi:10.1142/9789812704634_0044.
  2. Volkmer, M., Wallner, S. (2005). Tree Parity Machine Rekeying Architectures. IEEE Trans. Comput., 54(4), 421-427. doi:10.1109/TC.2005.70.
  3. Mislovaty, R., Klein, E., Kanter, I., Kinzel, W. (2004). Security of Neural Cryptography. Proceedings of the 2004 11th IEEE International Conference on Electronics, Circuits and Systems (ICECS), 219–221. doi:10.1109/ICECS.2004.1399654.
  4. Kanter, I., Kinzel, W., Kanter, E. (2002). Secure exchange of information by synchronization of neural networks. Europhysics Letters, 57, 141-147. doi:10.1209/epl/i2002-00552-9.
  5. Dolecki, M., Kozera, R. (2013). Distribution of the Tree Parity Machine Synchronization Time. Adv. Sci. Technol. Res. J., 7(18), 20-27. doi:10.5604/20804075.1049490.
  6. Rosen-Zvi, M., Klein, E., Kinzel, W., Kanter, I. (2002). Mutual learning in a tree parity machine and its application to cryptography. Phys. Rev. E, 66:066135. doi:10.1103/PhysRevE.66.066135.
  7. Klimov, A., Mityagin, A., Shamir, A. (2002). Analysis of Neural Cryptography. Advances in Cryptology — ASIACRYPT 2002. Springer Science + Business Media, 288-298. doi:10.1007/3-540-36178-2_18.
  8. Klein, E., Mislovaty, R., Kanter, I., Ruttor, A., Kinzel, W. (2005). Synchronization of neural networks by mutual learning and its application to cryptography. Advances in Neural Information Processing Systems, 17, 689-696.
  9. Shacham, L. N., Klein, E., Mislovaty, R., Kanter, I., Kinzel, W. (2004). Cooperating Attackers in Neural Cyptography. Phys. Rev. E, 69:066137. doi:10.1103/PhysRevE.69.066137.
  10. Ruttor, A., Kinzel, W., Naeh, R., Kanter, I. (2006). Genetic Attack on Neural Cryptography. Phys. Rev. E, 73:036121. doi:10.1103/PhysRevE.73.036121.

Published

2014-07-24

How to Cite

Малік, О. Р. (2014). Empirical research of the distribution function of synchronization time of neural networks in the key exchange protocol. Technology Audit and Production Reserves, 4(1(18), 26–31. https://doi.org/10.15587/2312-8372.2014.26288

Issue

Section

Technology audit