MUTUAL LEARNING IN TREE PARITY MACHINES USING CUCKOO SEARCH ALGORITHM FOR SECURE PUBLIC KEY EXCHANGE
In Neural Cryptography, Artificial Neural Networks are used for the process of key generation and encryption. Tree Parity Machine (TPM) is a single layer neural network that approaches symmetric key exchange using the process of mutual learning. This method is exploited to design a secure key exchan...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
ICT Academy of Tamil Nadu
2018-04-01
|
Series: | ICTACT Journal on Soft Computing |
Subjects: | |
Online Access: | http://ictactjournals.in/ArticleDetails.aspx?id=3427 |
id |
doaj-deb4da366c044b44a7883e69d5d25c2d |
---|---|
record_format |
Article |
spelling |
doaj-deb4da366c044b44a7883e69d5d25c2d2020-11-25T03:05:24ZengICT Academy of Tamil NaduICTACT Journal on Soft Computing0976-65612229-69562018-04-01831663166710.21917/ijsc.2018.0231MUTUAL LEARNING IN TREE PARITY MACHINES USING CUCKOO SEARCH ALGORITHM FOR SECURE PUBLIC KEY EXCHANGEShikha Gupta0Nalin Nanda1Naman Chhikara2Nishi Gupta3Satbir Jain4Netaji Subhas Institute of Technology, IndiaNetaji Subhas Institute of Technology, IndiaNetaji Subhas Institute of Technology, IndiaNetaji Subhas Institute of Technology, IndiaNetaji Subhas Institute of Technology, IndiaIn Neural Cryptography, Artificial Neural Networks are used for the process of key generation and encryption. Tree Parity Machine (TPM) is a single layer neural network that approaches symmetric key exchange using the process of mutual learning. This method is exploited to design a secure key exchange protocol, where the sender and the receiver TPMs are synchronized to obtain an identically tuned weight vectors in both the networks. The synchronized TPMs are then capable of generating a key stream. The time required for synchronization depends on the initial weight vectors which are randomly initialized. In the proposed method, the process of synchronization is expedited using Cuckoo Search (CS) Algorithm used for the generation of optimal weights.http://ictactjournals.in/ArticleDetails.aspx?id=3427Neural SynchronisationTree Parity MachineCuckoo Search AlgorithmKey ExchangeSecurity |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Shikha Gupta Nalin Nanda Naman Chhikara Nishi Gupta Satbir Jain |
spellingShingle |
Shikha Gupta Nalin Nanda Naman Chhikara Nishi Gupta Satbir Jain MUTUAL LEARNING IN TREE PARITY MACHINES USING CUCKOO SEARCH ALGORITHM FOR SECURE PUBLIC KEY EXCHANGE ICTACT Journal on Soft Computing Neural Synchronisation Tree Parity Machine Cuckoo Search Algorithm Key Exchange Security |
author_facet |
Shikha Gupta Nalin Nanda Naman Chhikara Nishi Gupta Satbir Jain |
author_sort |
Shikha Gupta |
title |
MUTUAL LEARNING IN TREE PARITY MACHINES USING CUCKOO SEARCH ALGORITHM FOR SECURE PUBLIC KEY EXCHANGE |
title_short |
MUTUAL LEARNING IN TREE PARITY MACHINES USING CUCKOO SEARCH ALGORITHM FOR SECURE PUBLIC KEY EXCHANGE |
title_full |
MUTUAL LEARNING IN TREE PARITY MACHINES USING CUCKOO SEARCH ALGORITHM FOR SECURE PUBLIC KEY EXCHANGE |
title_fullStr |
MUTUAL LEARNING IN TREE PARITY MACHINES USING CUCKOO SEARCH ALGORITHM FOR SECURE PUBLIC KEY EXCHANGE |
title_full_unstemmed |
MUTUAL LEARNING IN TREE PARITY MACHINES USING CUCKOO SEARCH ALGORITHM FOR SECURE PUBLIC KEY EXCHANGE |
title_sort |
mutual learning in tree parity machines using cuckoo search algorithm for secure public key exchange |
publisher |
ICT Academy of Tamil Nadu |
series |
ICTACT Journal on Soft Computing |
issn |
0976-6561 2229-6956 |
publishDate |
2018-04-01 |
description |
In Neural Cryptography, Artificial Neural Networks are used for the process of key generation and encryption. Tree Parity Machine (TPM) is a single layer neural network that approaches symmetric key exchange using the process of mutual learning. This method is exploited to design a secure key exchange protocol, where the sender and the receiver TPMs are synchronized to obtain an identically tuned weight vectors in both the networks. The synchronized TPMs are then capable of generating a key stream. The time required for synchronization depends on the initial weight vectors which are randomly initialized. In the proposed method, the process of synchronization is expedited using Cuckoo Search (CS) Algorithm used for the generation of optimal weights. |
topic |
Neural Synchronisation Tree Parity Machine Cuckoo Search Algorithm Key Exchange Security |
url |
http://ictactjournals.in/ArticleDetails.aspx?id=3427 |
work_keys_str_mv |
AT shikhagupta mutuallearningintreeparitymachinesusingcuckoosearchalgorithmforsecurepublickeyexchange AT nalinnanda mutuallearningintreeparitymachinesusingcuckoosearchalgorithmforsecurepublickeyexchange AT namanchhikara mutuallearningintreeparitymachinesusingcuckoosearchalgorithmforsecurepublickeyexchange AT nishigupta mutuallearningintreeparitymachinesusingcuckoosearchalgorithmforsecurepublickeyexchange AT satbirjain mutuallearningintreeparitymachinesusingcuckoosearchalgorithmforsecurepublickeyexchange |
_version_ |
1724678749666934784 |