Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems

Traditional public key exchange protocols are based on algebraic number theory. In another perspective, neural cryptography, which is based on neural networks, has been emerging. It has been reported that two parties can exchange secret key pairs with the synchronization phenomenon in neural network...

Full description

Bibliographic Details
Main Authors: Sooyong Jeong, Cheolhee Park, Dowon Hong, Changho Seo, Namsu Jho
Format: Article
Language:English
Published: Hindawi-Wiley 2021-01-01
Series:Security and Communication Networks
Online Access:http://dx.doi.org/10.1155/2021/6680782
id doaj-3f971c2fec1e4d7088343cec00609fea
record_format Article
spelling doaj-3f971c2fec1e4d7088343cec00609fea2021-02-15T12:52:42ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222021-01-01202110.1155/2021/66807826680782Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life SystemsSooyong Jeong0Cheolhee Park1Dowon Hong2Changho Seo3Namsu Jho4Department of Convergence Science, Kongju National University, Kongju 32588, Republic of KoreaDepartment of Mathematics, Kongju National University, Kongju 32588, Republic of KoreaDepartment of Mathematics, Kongju National University, Kongju 32588, Republic of KoreaDepartment of Convergence Science, Kongju National University, Kongju 32588, Republic of KoreaElectronics and Telecommunications Research Institute (ETRI), Daejeon 34129, Republic of KoreaTraditional public key exchange protocols are based on algebraic number theory. In another perspective, neural cryptography, which is based on neural networks, has been emerging. It has been reported that two parties can exchange secret key pairs with the synchronization phenomenon in neural networks. Although there are various models of neural cryptography, called Tree Parity Machine (TPM), many of them are not suitable for practical use, considering efficiency and security. In this paper, we propose a Vector-Valued Tree Parity Machine (VVTPM), which is a generalized architecture of TPM models and can be more efficient and secure for real-life systems. In terms of efficiency and security, we show that the synchronization time of the VVTPM has the same order as the basic TPM model, and it can be more secure than previous results with the same synaptic depth.http://dx.doi.org/10.1155/2021/6680782
collection DOAJ
language English
format Article
sources DOAJ
author Sooyong Jeong
Cheolhee Park
Dowon Hong
Changho Seo
Namsu Jho
spellingShingle Sooyong Jeong
Cheolhee Park
Dowon Hong
Changho Seo
Namsu Jho
Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems
Security and Communication Networks
author_facet Sooyong Jeong
Cheolhee Park
Dowon Hong
Changho Seo
Namsu Jho
author_sort Sooyong Jeong
title Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems
title_short Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems
title_full Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems
title_fullStr Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems
title_full_unstemmed Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems
title_sort neural cryptography based on generalized tree parity machine for real-life systems
publisher Hindawi-Wiley
series Security and Communication Networks
issn 1939-0114
1939-0122
publishDate 2021-01-01
description Traditional public key exchange protocols are based on algebraic number theory. In another perspective, neural cryptography, which is based on neural networks, has been emerging. It has been reported that two parties can exchange secret key pairs with the synchronization phenomenon in neural networks. Although there are various models of neural cryptography, called Tree Parity Machine (TPM), many of them are not suitable for practical use, considering efficiency and security. In this paper, we propose a Vector-Valued Tree Parity Machine (VVTPM), which is a generalized architecture of TPM models and can be more efficient and secure for real-life systems. In terms of efficiency and security, we show that the synchronization time of the VVTPM has the same order as the basic TPM model, and it can be more secure than previous results with the same synaptic depth.
url http://dx.doi.org/10.1155/2021/6680782
work_keys_str_mv AT sooyongjeong neuralcryptographybasedongeneralizedtreeparitymachineforreallifesystems
AT cheolheepark neuralcryptographybasedongeneralizedtreeparitymachineforreallifesystems
AT dowonhong neuralcryptographybasedongeneralizedtreeparitymachineforreallifesystems
AT changhoseo neuralcryptographybasedongeneralizedtreeparitymachineforreallifesystems
AT namsujho neuralcryptographybasedongeneralizedtreeparitymachineforreallifesystems
_version_ 1714867242659741696