MUTUAL LEARNING IN TREE PARITY MACHINES USING CUCKOO SEARCH ALGORITHM FOR SECURE PUBLIC KEY EXCHANGE

In Neural Cryptography, Artificial Neural Networks are used for the process of key generation and encryption. Tree Parity Machine (TPM) is a single layer neural network that approaches symmetric key exchange using the process of mutual learning. This method is exploited to design a secure key exchan...

Full description

Bibliographic Details
Main Authors: Shikha Gupta, Nalin Nanda, Naman Chhikara, Nishi Gupta, Satbir Jain
Format: Article
Language:English
Published: ICT Academy of Tamil Nadu 2018-04-01
Series:ICTACT Journal on Soft Computing
Subjects:
Online Access:http://ictactjournals.in/ArticleDetails.aspx?id=3427
id doaj-deb4da366c044b44a7883e69d5d25c2d
record_format Article
spelling doaj-deb4da366c044b44a7883e69d5d25c2d2020-11-25T03:05:24ZengICT Academy of Tamil NaduICTACT Journal on Soft Computing0976-65612229-69562018-04-01831663166710.21917/ijsc.2018.0231MUTUAL LEARNING IN TREE PARITY MACHINES USING CUCKOO SEARCH ALGORITHM FOR SECURE PUBLIC KEY EXCHANGEShikha Gupta0Nalin Nanda1Naman Chhikara2Nishi Gupta3Satbir Jain4Netaji Subhas Institute of Technology, IndiaNetaji Subhas Institute of Technology, IndiaNetaji Subhas Institute of Technology, IndiaNetaji Subhas Institute of Technology, IndiaNetaji Subhas Institute of Technology, IndiaIn Neural Cryptography, Artificial Neural Networks are used for the process of key generation and encryption. Tree Parity Machine (TPM) is a single layer neural network that approaches symmetric key exchange using the process of mutual learning. This method is exploited to design a secure key exchange protocol, where the sender and the receiver TPMs are synchronized to obtain an identically tuned weight vectors in both the networks. The synchronized TPMs are then capable of generating a key stream. The time required for synchronization depends on the initial weight vectors which are randomly initialized. In the proposed method, the process of synchronization is expedited using Cuckoo Search (CS) Algorithm used for the generation of optimal weights.http://ictactjournals.in/ArticleDetails.aspx?id=3427Neural SynchronisationTree Parity MachineCuckoo Search AlgorithmKey ExchangeSecurity
collection DOAJ
language English
format Article
sources DOAJ
author Shikha Gupta
Nalin Nanda
Naman Chhikara
Nishi Gupta
Satbir Jain
spellingShingle Shikha Gupta
Nalin Nanda
Naman Chhikara
Nishi Gupta
Satbir Jain
MUTUAL LEARNING IN TREE PARITY MACHINES USING CUCKOO SEARCH ALGORITHM FOR SECURE PUBLIC KEY EXCHANGE
ICTACT Journal on Soft Computing
Neural Synchronisation
Tree Parity Machine
Cuckoo Search Algorithm
Key Exchange
Security
author_facet Shikha Gupta
Nalin Nanda
Naman Chhikara
Nishi Gupta
Satbir Jain
author_sort Shikha Gupta
title MUTUAL LEARNING IN TREE PARITY MACHINES USING CUCKOO SEARCH ALGORITHM FOR SECURE PUBLIC KEY EXCHANGE
title_short MUTUAL LEARNING IN TREE PARITY MACHINES USING CUCKOO SEARCH ALGORITHM FOR SECURE PUBLIC KEY EXCHANGE
title_full MUTUAL LEARNING IN TREE PARITY MACHINES USING CUCKOO SEARCH ALGORITHM FOR SECURE PUBLIC KEY EXCHANGE
title_fullStr MUTUAL LEARNING IN TREE PARITY MACHINES USING CUCKOO SEARCH ALGORITHM FOR SECURE PUBLIC KEY EXCHANGE
title_full_unstemmed MUTUAL LEARNING IN TREE PARITY MACHINES USING CUCKOO SEARCH ALGORITHM FOR SECURE PUBLIC KEY EXCHANGE
title_sort mutual learning in tree parity machines using cuckoo search algorithm for secure public key exchange
publisher ICT Academy of Tamil Nadu
series ICTACT Journal on Soft Computing
issn 0976-6561
2229-6956
publishDate 2018-04-01
description In Neural Cryptography, Artificial Neural Networks are used for the process of key generation and encryption. Tree Parity Machine (TPM) is a single layer neural network that approaches symmetric key exchange using the process of mutual learning. This method is exploited to design a secure key exchange protocol, where the sender and the receiver TPMs are synchronized to obtain an identically tuned weight vectors in both the networks. The synchronized TPMs are then capable of generating a key stream. The time required for synchronization depends on the initial weight vectors which are randomly initialized. In the proposed method, the process of synchronization is expedited using Cuckoo Search (CS) Algorithm used for the generation of optimal weights.
topic Neural Synchronisation
Tree Parity Machine
Cuckoo Search Algorithm
Key Exchange
Security
url http://ictactjournals.in/ArticleDetails.aspx?id=3427
work_keys_str_mv AT shikhagupta mutuallearningintreeparitymachinesusingcuckoosearchalgorithmforsecurepublickeyexchange
AT nalinnanda mutuallearningintreeparitymachinesusingcuckoosearchalgorithmforsecurepublickeyexchange
AT namanchhikara mutuallearningintreeparitymachinesusingcuckoosearchalgorithmforsecurepublickeyexchange
AT nishigupta mutuallearningintreeparitymachinesusingcuckoosearchalgorithmforsecurepublickeyexchange
AT satbirjain mutuallearningintreeparitymachinesusingcuckoosearchalgorithmforsecurepublickeyexchange
_version_ 1724678749666934784