2015
DOI: 10.1007/978-3-319-22915-7_20
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Neural Synchronization Using Genetic Approach for Secure Key Generation

Abstract: Abstract. Cryptography depends on two components, an algorithm and a key. Keys are used for encryption of information as well as in other cryptographic schemes such as digital signature and message authentication codes. Neural cryptography is a way to create shared secret key. Key generation in Tree Parity Machine neural network is done by mutual learning. Neural networks receive common inputs to synchronize using a suitable learning rule. Because of this effect neural synchronization can be used to construct … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
12
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(12 citation statements)
references
References 11 publications
0
12
0
Order By: Relevance
“…A frequency analysis technique was proposed by Dolecki and Kozera [25] that enables two TPM networks to be evaluated with a defined value that is not related to their differences in synaptic weights before the synchronization steps are completed. Santhanalakshmi et al [26]; Dolecki and Kozera [27] evaluated the efficiency of coordinated usage of genetic algorithm and the Gaussian distribution respectively. As a consequence, the substitution of random weights with optimum weights reduces the synchronization period.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A frequency analysis technique was proposed by Dolecki and Kozera [25] that enables two TPM networks to be evaluated with a defined value that is not related to their differences in synaptic weights before the synchronization steps are completed. Santhanalakshmi et al [26]; Dolecki and Kozera [27] evaluated the efficiency of coordinated usage of genetic algorithm and the Gaussian distribution respectively. As a consequence, the substitution of random weights with optimum weights reduces the synchronization period.…”
Section: Related Workmentioning
confidence: 99%
“…The likelihood to observe γ u α u,v = +1 or γ u α u,v = −1 are not equal, but depend on the related weight β u,v (in equation 26).…”
Section: )mentioning
confidence: 99%
“…In connection with performance measurements of TPM network performance measurements, Dolecki and Kozera [12] proposed a frequency analysis technique that permits the assessment before completion of the synchronization rate of two TPM networks with a determined value that is not related to their differences in synaptic weights. Santhanalakshmi et al [43] and Dolecki and Kozera [13] evaluate the efficiency of coordinated usage of genetic algorithm and the Gaussian distribution respectively. As a result, the random weight's replacement with optimum weights decreases the time of synchronization.…”
Section: Related Workmentioning
confidence: 99%
“…Later, the authors analyzed the performance of the protocol proposed in [12]. ey analyzed the parameters of the genetic algorithm and tree parity machine [13]. eir results show that security can be improved by increasing the number of the hidden layer of the tree parity machine.…”
Section: Related Workmentioning
confidence: 99%