2021
DOI: 10.1155/2021/6680782
|View full text |Cite
|
Sign up to set email alerts
|

Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems

Abstract: Traditional public key exchange protocols are based on algebraic number theory. In another perspective, neural cryptography, which is based on neural networks, has been emerging. It has been reported that two parties can exchange secret key pairs with the synchronization phenomenon in neural networks. Although there are various models of neural cryptography, called Tree Parity Machine (TPM), many of them are not suitable for practical use, considering efficiency and security. In this paper, we propose a Vector… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
23
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 35 publications
(23 citation statements)
references
References 24 publications
0
23
0
Order By: Relevance
“…Table 3 presents the results of the NIST test suite [16] on the synchronized neural session In the synchronized neural key, the outcome of the frequency test denotes a proportion of 1 and 0. The frequency test outcome of the TLVVNN technique is 0.711478, that is better than the outcome 0.538632 in Jeong et al [6], 0.512374 in n Dong and Huang [3], 0.1329 in Karakaya et al [8], 0.632558 in Patidar et al [19], and 0.629806 in Liu et al [9]. The frequency test's P Value comparison is presented in Table 4.…”
Section: Results and Analysismentioning
confidence: 92%
See 2 more Smart Citations
“…Table 3 presents the results of the NIST test suite [16] on the synchronized neural session In the synchronized neural key, the outcome of the frequency test denotes a proportion of 1 and 0. The frequency test outcome of the TLVVNN technique is 0.711478, that is better than the outcome 0.538632 in Jeong et al [6], 0.512374 in n Dong and Huang [3], 0.1329 in Karakaya et al [8], 0.632558 in Patidar et al [19], and 0.629806 in Liu et al [9]. The frequency test's P Value comparison is presented in Table 4.…”
Section: Results and Analysismentioning
confidence: 92%
“…Huang [3], Jeong et al [6], and Teodoro et al [30] were first looked at in this study. Their shortcomings were also mentioned in this study.…”
Section: The Key Exchange Mechanisms Proposed By Dong Andmentioning
confidence: 96%
See 1 more Smart Citation
“…It is observed that, for the large size of the network, Random Walk's rule outweigh the other two learning rules. The TLTPM and VVTPM [25] approaches for synchronization time using the Hebbian learning are compared in table 8. The synchronization time of the TLTPM using the Hebbian learning rule is much faster than the existing VVTPM, as seen in this table.…”
Section: F Majority Attackmentioning
confidence: 99%
“…Likelihood of Success of Attacker UsingGeometric Attack α1 − α2 − α3 − β − γ =[25, 30], γ = 3, and Hebbian learning algorithm was discussed. The value of the α1 − α2 − α3 parameter significantly affects the number of iterations in the synchronization process (the figures show three values: α1 = α2 = α3 = 6, 8, 12).…”
mentioning
confidence: 99%