2012
DOI: 10.1103/physreve.85.025101
|View full text |Cite
|
Sign up to set email alerts
|

Successful attack on permutation-parity-machine-based neural cryptography

Abstract: An algorithm is presented which implements a probabilistic attack on the key-exchange protocol based on permutation parity machines. Instead of imitating the synchronization of the communicating partners, the strategy consists of a Monte Carlo method to sample the space of possible weights during inner rounds and an analytic approach to convey the extracted information from one outer round to the next one. The results show that the protocol under attack fails to synchronize faster than an eavesdropper using th… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 23 publications
0
9
0
Order By: Relevance
“…Hence these attacks are most suited for TPM. Recently proposed probabilistic attack on neural cryptography does not mimic the synchronization process, instead tries to guess the state vector of one of the participant by taking sample of weights in a space using Monte Carlo approach and transfer the information acquired in the preceding outer round to the next one using analytical approach [3].…”
Section: Figurementioning
confidence: 99%
See 3 more Smart Citations
“…Hence these attacks are most suited for TPM. Recently proposed probabilistic attack on neural cryptography does not mimic the synchronization process, instead tries to guess the state vector of one of the participant by taking sample of weights in a space using Monte Carlo approach and transfer the information acquired in the preceding outer round to the next one using analytical approach [3].…”
Section: Figurementioning
confidence: 99%
“…PPM E has parameters (G, K, N) equal to . Additionally, the eavesdropper has probabilistic vector which is initialized to ⁄ at the beginning of the attack since there is no prior knowledge obtained about the synchronization [3], [4]. position in the probability vector based on π.…”
Section: Probabilistic Attackmentioning
confidence: 99%
See 2 more Smart Citations
“…(Fig.2. ) Another widely used model of such end point networks is a binary variation of the TPM-the Permutation Parity Machine [15]. Another upcoming model of such networks, which is also a variation of the Tree Parity Machine, is the c, which has almost similar topology to the TPM [16].…”
Section: Parity Machinesmentioning
confidence: 99%