Neural cryptography using optimal structure of neural networks
作者:Arindam Sarkar
摘要
The asymmetric cryptography method is typically used to transfer the key via an insecure channel while creating a key between two parties. However, since the methods using this strategy, like RSA, are now breached, new strategies must be sought to generate a key that can provide security. To solve this issue, a new group of cryptography was created known as neural cryptography. The main objective of this neural cryptography is to create a secret key using an unsafe medium. This paper suggests an overview of the optimal configuration of the neural network that enables the generation and establishment of a secret key between the two approved entities. Synchronization of two neural networks with three hidden layers is proposed for the development of the public key exchange protocol. Over 15 million simulations were carried out to measure the synchronization time, the steps taken as well as the number of times the assaulting neural network can replicate the behavior of the two authorized networks. The proposed technique has been passed through different parametric tests. Simulations of the process show effectiveness in terms of cited results in the paper.
论文关键词:Neural synchronization, Session key, Three layer tree parity machine (TLTPM), Neural network, Simulations
论文评审过程:
论文官网地址:https://doi.org/10.1007/s10489-021-02334-1