Any cryptographic system is used to exchange confidential information securely over the public channel without any leakage of information to the unauthorized users. Neural networks can be used to generate a common secret key because the processes involve in Cryptographic system requires large computational power and very complex. Moreover Diffi hellman key exchange is suffered from man-in –the middle attack. For overcome this problem neural networks can be used.Two neural networks which are trained on their mutual output bits. The networks synchronize to a state with identical time dependent weights..secret key exchange over a public channel and this key can be used in implementing any encryption algorithm
Researches in Artificial Intelligence (AI) have achieved many important breakthroughs, especially in...
The problem of secure data processing by means of a neural network (NN) is addressed. Secure process...
Secret sharing is a fundamental notion for secure cryptographic design. In a secret sharing scheme, ...
While cyber-attacks have been increasing through the years, the key exchange protocols, for example,...
Today the world depends on computers and information systems for processing information in various f...
A connection between the theory of neural networks and cryptography is presented. A new phenomenon, ...
Cryptography is a process of protecting information and data from unauthorized access. The goal of a...
In the Kanter’s and Kinsella’s works is proposes the use of two synchronized artificial neural netwo...
Abstract-Several key exchange methods for wireless channels have been proposed in the literature. Th...
А combined method for forming a cryptographic key is proposed in the article. The proposed combined ...
Neural Network uses a technique that mimics human brain to try to find hidden connections in a colle...
This work deals with the design of secure communication protocol based on neural network synchroniza...
The project is aimed to implement artificial neural network method in cryptography. Cryptography is ...
When establishing a cryptographic key between two users, the asymmetric cryptography scheme is gener...
The use of neural networks for cryptography is demonstrated in this paper. There are two stages to t...
Researches in Artificial Intelligence (AI) have achieved many important breakthroughs, especially in...
The problem of secure data processing by means of a neural network (NN) is addressed. Secure process...
Secret sharing is a fundamental notion for secure cryptographic design. In a secret sharing scheme, ...
While cyber-attacks have been increasing through the years, the key exchange protocols, for example,...
Today the world depends on computers and information systems for processing information in various f...
A connection between the theory of neural networks and cryptography is presented. A new phenomenon, ...
Cryptography is a process of protecting information and data from unauthorized access. The goal of a...
In the Kanter’s and Kinsella’s works is proposes the use of two synchronized artificial neural netwo...
Abstract-Several key exchange methods for wireless channels have been proposed in the literature. Th...
А combined method for forming a cryptographic key is proposed in the article. The proposed combined ...
Neural Network uses a technique that mimics human brain to try to find hidden connections in a colle...
This work deals with the design of secure communication protocol based on neural network synchroniza...
The project is aimed to implement artificial neural network method in cryptography. Cryptography is ...
When establishing a cryptographic key between two users, the asymmetric cryptography scheme is gener...
The use of neural networks for cryptography is demonstrated in this paper. There are two stages to t...
Researches in Artificial Intelligence (AI) have achieved many important breakthroughs, especially in...
The problem of secure data processing by means of a neural network (NN) is addressed. Secure process...
Secret sharing is a fundamental notion for secure cryptographic design. In a secret sharing scheme, ...