This work deals with the design of secure communication protocol based on neural network synchronization. Protocol is built on the application-layer of the OSI upon TCP/IP. Server and each connected client must create special type of neural network called Tree Parity Machine then compute outputs of their neural networks and iteratively exchange those outputs through the public channel. After some time neural networks will become synchronized that way and will share secret information. Symmetric key which is then used for encrypting subsequent communication is derived from that shared secret by standard hash algorithm
Today the world depends on computers and information systems for processing information in various f...
Neural networks’ synchronization by mutual learning discovered and described by Kanter et al. [10] c...
Goal of this thesis is to get familiar with problematics of neural networks and commonly used securi...
A connection between the theory of neural networks and cryptography is presented. A new phenomenon, ...
Any cryptographic system is used to exchange confidential information securely over the public chann...
Neural cryptography is the application of artificial neural networks (ANNs) in the subject of crypto...
The synchronization between two neural networks by mutual learning can be used to design the neural ...
When establishing a cryptographic key between two users, the asymmetric cryptography scheme is gener...
Traditional public key exchange protocols are based on algebraic number theory. In another perspecti...
Part 5: Various Aspects of Computer SecurityInternational audienceThe phenomenon of neural networks ...
In this paper, multilayer neural network synchronized session key based encryption has been proposed...
The problem of secure data processing by means of a neural network (NN) is addressed. Secure process...
The problem of secure data processing by means of a neural network (NN) is addressed. Secure process...
While cyber-attacks have been increasing through the years, the key exchange protocols, for example,...
А combined method for forming a cryptographic key is proposed in the article. The proposed combined ...
Today the world depends on computers and information systems for processing information in various f...
Neural networks’ synchronization by mutual learning discovered and described by Kanter et al. [10] c...
Goal of this thesis is to get familiar with problematics of neural networks and commonly used securi...
A connection between the theory of neural networks and cryptography is presented. A new phenomenon, ...
Any cryptographic system is used to exchange confidential information securely over the public chann...
Neural cryptography is the application of artificial neural networks (ANNs) in the subject of crypto...
The synchronization between two neural networks by mutual learning can be used to design the neural ...
When establishing a cryptographic key between two users, the asymmetric cryptography scheme is gener...
Traditional public key exchange protocols are based on algebraic number theory. In another perspecti...
Part 5: Various Aspects of Computer SecurityInternational audienceThe phenomenon of neural networks ...
In this paper, multilayer neural network synchronized session key based encryption has been proposed...
The problem of secure data processing by means of a neural network (NN) is addressed. Secure process...
The problem of secure data processing by means of a neural network (NN) is addressed. Secure process...
While cyber-attacks have been increasing through the years, the key exchange protocols, for example,...
А combined method for forming a cryptographic key is proposed in the article. The proposed combined ...
Today the world depends on computers and information systems for processing information in various f...
Neural networks’ synchronization by mutual learning discovered and described by Kanter et al. [10] c...
Goal of this thesis is to get familiar with problematics of neural networks and commonly used securi...