Neural Synchronization Using Genetic Algorithm for Secure Key Establishment
Two neural networks that are trained on their mutual output synchronize to an identical time dependant weight vector. This novel phenomenon can be used for creation of a secure cryptographic secret-key using a public channel. Neural cryptography is a way to create shared secret key. Key generation...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Eastern Macedonia and Thrace Institute of Technology
2014-11-01
|
Series: | Journal of Engineering Science and Technology Review |
Subjects: | |
Online Access: | http://www.jestr.org/downloads/Volume8Issue2/fulltext82202015.pdf |
id |
doaj-65c2e5a40b5e480b9bd38fb16d2342af |
---|---|
record_format |
Article |
spelling |
doaj-65c2e5a40b5e480b9bd38fb16d2342af2020-11-24T21:27:14ZengEastern Macedonia and Thrace Institute of TechnologyJournal of Engineering Science and Technology Review1791-23771791-23772014-11-0182152156Neural Synchronization Using Genetic Algorithm for Secure Key EstablishmentDaxing Wang0School of Mathematics and Finance, Chuzhou University, Chuzhou, Anhui, P.R. China.Two neural networks that are trained on their mutual output synchronize to an identical time dependant weight vector. This novel phenomenon can be used for creation of a secure cryptographic secret-key using a public channel. Neural cryptography is a way to create shared secret key. Key generation in Tree Parity Machine neural network is done by mutual learning. Neural networks here receive common inputs and exchange their outputs. Adjusting discrete weights according to a suitable learning rule then leads to full synchronization in a finite number of steps and these identical weights are the secret key needed for encryption. A faster synchronization of the neural network has been achieved by generating the optimal weights for the sender and receiver from a genetic process. Here the best fit weight vector is found using a genetic algorithm. In this paper the performance of the genetic algorithm has been analysed by varying the number of hidden and input neurons.http://www.jestr.org/downloads/Volume8Issue2/fulltext82202015.pdfNeural synchronizationneural cryptographykey exchangegenetic algorithmtree parity machine. ___________________________________________________ |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Daxing Wang |
spellingShingle |
Daxing Wang Neural Synchronization Using Genetic Algorithm for Secure Key Establishment Journal of Engineering Science and Technology Review Neural synchronization neural cryptography key exchange genetic algorithm tree parity machine. ___________________________________________________ |
author_facet |
Daxing Wang |
author_sort |
Daxing Wang |
title |
Neural Synchronization Using Genetic Algorithm for Secure Key Establishment |
title_short |
Neural Synchronization Using Genetic Algorithm for Secure Key Establishment |
title_full |
Neural Synchronization Using Genetic Algorithm for Secure Key Establishment |
title_fullStr |
Neural Synchronization Using Genetic Algorithm for Secure Key Establishment |
title_full_unstemmed |
Neural Synchronization Using Genetic Algorithm for Secure Key Establishment |
title_sort |
neural synchronization using genetic algorithm for secure key establishment |
publisher |
Eastern Macedonia and Thrace Institute of Technology |
series |
Journal of Engineering Science and Technology Review |
issn |
1791-2377 1791-2377 |
publishDate |
2014-11-01 |
description |
Two neural networks that are trained on their mutual output synchronize to an identical time dependant weight vector.
This novel phenomenon can be used for creation of a secure cryptographic secret-key using a public channel. Neural
cryptography is a way to create shared secret key. Key generation in Tree Parity Machine neural network is done by
mutual learning. Neural networks here receive common inputs and exchange their outputs. Adjusting discrete weights
according to a suitable learning rule then leads to full synchronization in a finite number of steps and these identical
weights are the secret key needed for encryption. A faster synchronization of the neural network has been achieved by
generating the optimal weights for the sender and receiver from a genetic process. Here the best fit weight vector is
found using a genetic algorithm. In this paper the performance of the genetic algorithm has been analysed by varying the
number of hidden and input neurons. |
topic |
Neural synchronization neural cryptography key exchange genetic algorithm tree parity machine. ___________________________________________________ |
url |
http://www.jestr.org/downloads/Volume8Issue2/fulltext82202015.pdf |
work_keys_str_mv |
AT daxingwang neuralsynchronizationusinggeneticalgorithmforsecurekeyestablishment |
_version_ |
1725975870704713728 |