z-logo
open-access-imgOpen Access
Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems
Author(s) -
Sooyong Jeong,
Cheol-Hee Park,
Dowon Hong,
Changho Seo,
Nam-Su Jho
Publication year - 2021
Publication title -
security and communication networks
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.446
H-Index - 43
eISSN - 1939-0114
pISSN - 1939-0122
DOI - 10.1155/2021/6680782
Subject(s) - computer science , neural cryptography , cryptography , key exchange , synchronization (alternating current) , theoretical computer science , artificial neural network , parity (physics) , public key cryptography , computer security , artificial intelligence , computer network , encryption , channel (broadcasting) , physics , particle physics
Traditional public key exchange protocols are based on algebraic number theory. In another perspective, neural cryptography, which is based on neural networks, has been emerging. It has been reported that two parties can exchange secret key pairs with the synchronization phenomenon in neural networks. Although there are various models of neural cryptography, called Tree Parity Machine (TPM), many of them are not suitable for practical use, considering efficiency and security. In this paper, we propose a Vector-Valued Tree Parity Machine (VVTPM), which is a generalized architecture of TPM models and can be more efficient and secure for real-life systems. In terms of efficiency and security, we show that the synchronization time of the VVTPM has the same order as the basic TPM model, and it can be more secure than previous results with the same synaptic depth.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom