Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems
Traditional public key exchange protocols are based on algebraic number theory. In another perspective, neural cryptography, which is based on neural networks, has been emerging. It has been reported that two parties can exchange secret key pairs with the synchronization phenomenon in neural network...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2021-01-01
|
Series: | Security and Communication Networks |
Online Access: | http://dx.doi.org/10.1155/2021/6680782 |
id |
doaj-3f971c2fec1e4d7088343cec00609fea |
---|---|
record_format |
Article |
spelling |
doaj-3f971c2fec1e4d7088343cec00609fea2021-02-15T12:52:42ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222021-01-01202110.1155/2021/66807826680782Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life SystemsSooyong Jeong0Cheolhee Park1Dowon Hong2Changho Seo3Namsu Jho4Department of Convergence Science, Kongju National University, Kongju 32588, Republic of KoreaDepartment of Mathematics, Kongju National University, Kongju 32588, Republic of KoreaDepartment of Mathematics, Kongju National University, Kongju 32588, Republic of KoreaDepartment of Convergence Science, Kongju National University, Kongju 32588, Republic of KoreaElectronics and Telecommunications Research Institute (ETRI), Daejeon 34129, Republic of KoreaTraditional public key exchange protocols are based on algebraic number theory. In another perspective, neural cryptography, which is based on neural networks, has been emerging. It has been reported that two parties can exchange secret key pairs with the synchronization phenomenon in neural networks. Although there are various models of neural cryptography, called Tree Parity Machine (TPM), many of them are not suitable for practical use, considering efficiency and security. In this paper, we propose a Vector-Valued Tree Parity Machine (VVTPM), which is a generalized architecture of TPM models and can be more efficient and secure for real-life systems. In terms of efficiency and security, we show that the synchronization time of the VVTPM has the same order as the basic TPM model, and it can be more secure than previous results with the same synaptic depth.http://dx.doi.org/10.1155/2021/6680782 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Sooyong Jeong Cheolhee Park Dowon Hong Changho Seo Namsu Jho |
spellingShingle |
Sooyong Jeong Cheolhee Park Dowon Hong Changho Seo Namsu Jho Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems Security and Communication Networks |
author_facet |
Sooyong Jeong Cheolhee Park Dowon Hong Changho Seo Namsu Jho |
author_sort |
Sooyong Jeong |
title |
Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems |
title_short |
Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems |
title_full |
Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems |
title_fullStr |
Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems |
title_full_unstemmed |
Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems |
title_sort |
neural cryptography based on generalized tree parity machine for real-life systems |
publisher |
Hindawi-Wiley |
series |
Security and Communication Networks |
issn |
1939-0114 1939-0122 |
publishDate |
2021-01-01 |
description |
Traditional public key exchange protocols are based on algebraic number theory. In another perspective, neural cryptography, which is based on neural networks, has been emerging. It has been reported that two parties can exchange secret key pairs with the synchronization phenomenon in neural networks. Although there are various models of neural cryptography, called Tree Parity Machine (TPM), many of them are not suitable for practical use, considering efficiency and security. In this paper, we propose a Vector-Valued Tree Parity Machine (VVTPM), which is a generalized architecture of TPM models and can be more efficient and secure for real-life systems. In terms of efficiency and security, we show that the synchronization time of the VVTPM has the same order as the basic TPM model, and it can be more secure than previous results with the same synaptic depth. |
url |
http://dx.doi.org/10.1155/2021/6680782 |
work_keys_str_mv |
AT sooyongjeong neuralcryptographybasedongeneralizedtreeparitymachineforreallifesystems AT cheolheepark neuralcryptographybasedongeneralizedtreeparitymachineforreallifesystems AT dowonhong neuralcryptographybasedongeneralizedtreeparitymachineforreallifesystems AT changhoseo neuralcryptographybasedongeneralizedtreeparitymachineforreallifesystems AT namsujho neuralcryptographybasedongeneralizedtreeparitymachineforreallifesystems |
_version_ |
1714867242659741696 |