Empirical research of the distribution function of synchronization time of neural networks in the key exchange protocol
DOI:
https://doi.org/10.15587/2312-8372.2014.26288Keywords:
neural networks, mutual learning, key exchange protocolAbstract
Neurocryptography is relatively new and little-studied area. Existing results show the prospects of this direction, but practical application requires a fairly complete analysis of existing protocols and systems. Analysis of the features of the key exchange protocol, which is built using the mutual learning of special-type neural networks - tree parity machines was conducted in the paper. Known existing protocol attack strategies were considered. A special part of the protocol is determining the synchronization moment of the neural networks of subscribers. The studies have revealed that the average number of the protocol iterations, required for synchronization significantly differs from the maximum value. To achieve the goal, the work of the protocol with a fairly large number of different neural networks was simulated. The synchronization time feature, found in the work shows the vulnerability of the studied protocol since it allows an intruder to carry out one of the known protocol attack strategies.References
- Kanter, I., Kinzel, W. (2003). The theory of neural networks and cryptography. The Physics of Communication - Proceedings of the XXII Solvay Conference on Physics, 631-644. doi:10.1142/9789812704634_0044.
- Volkmer, M., Wallner, S. (2005). Tree Parity Machine Rekeying Architectures. IEEE Trans. Comput., 54(4), 421-427. doi:10.1109/TC.2005.70.
- Mislovaty, R., Klein, E., Kanter, I., Kinzel, W. (2004). Security of Neural Cryptography. Proceedings of the 2004 11th IEEE International Conference on Electronics, Circuits and Systems (ICECS), 219–221. doi:10.1109/ICECS.2004.1399654.
- Kanter, I., Kinzel, W., Kanter, E. (2002). Secure exchange of information by synchronization of neural networks. Europhysics Letters, 57, 141-147. doi:10.1209/epl/i2002-00552-9.
- Dolecki, M., Kozera, R. (2013). Distribution of the Tree Parity Machine Synchronization Time. Adv. Sci. Technol. Res. J., 7(18), 20-27. doi:10.5604/20804075.1049490.
- Rosen-Zvi, M., Klein, E., Kinzel, W., Kanter, I. (2002). Mutual learning in a tree parity machine and its application to cryptography. Phys. Rev. E, 66:066135. doi:10.1103/PhysRevE.66.066135.
- Klimov, A., Mityagin, A., Shamir, A. (2002). Analysis of Neural Cryptography. Advances in Cryptology — ASIACRYPT 2002. Springer Science + Business Media, 288-298. doi:10.1007/3-540-36178-2_18.
- Klein, E., Mislovaty, R., Kanter, I., Ruttor, A., Kinzel, W. (2005). Synchronization of neural networks by mutual learning and its application to cryptography. Advances in Neural Information Processing Systems, 17, 689-696.
- Shacham, L. N., Klein, E., Mislovaty, R., Kanter, I., Kinzel, W. (2004). Cooperating Attackers in Neural Cyptography. Phys. Rev. E, 69:066137. doi:10.1103/PhysRevE.69.066137.
- Ruttor, A., Kinzel, W., Naeh, R., Kanter, I. (2006). Genetic Attack on Neural Cryptography. Phys. Rev. E, 73:036121. doi:10.1103/PhysRevE.73.036121.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2016 Олена Романівна Малік
This work is licensed under a Creative Commons Attribution 4.0 International License.
The consolidation and conditions for the transfer of copyright (identification of authorship) is carried out in the License Agreement. In particular, the authors reserve the right to the authorship of their manuscript and transfer the first publication of this work to the journal under the terms of the Creative Commons CC BY license. At the same time, they have the right to conclude on their own additional agreements concerning the non-exclusive distribution of the work in the form in which it was published by this journal, but provided that the link to the first publication of the article in this journal is preserved.