We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

cond-mat

References & Citations

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo

Condensed Matter > Disordered Systems and Neural Networks

Title: A secure key-exchange protocol with an absence of injective functions

Abstract: The security of neural cryptography is investigated. A key-exchange protocol over a public channel is studied where the parties exchanging secret messages use multilayer neural networks which are trained by their mutual output bits and synchronize to a time dependent secret key. The weights of the networks have integer values between $\pm L$. Recently an algorithm for an eavesdropper which could break the key was introduced by Shamir et al. [adi]. We show that the synchronization time increases with $L^2$ while the probability to find a successful attacker decreases exponentially with $L$. Hence for large $L$ we find a secure key-exchange protocol which depends neither on number theory nor on injective trapdoor functions used in conventional cryptography.
Comments: 4 pages, 4 figures
Subjects: Disordered Systems and Neural Networks (cond-mat.dis-nn)
DOI: 10.1103/PhysRevE.66.066102
Cite as: arXiv:cond-mat/0206213 [cond-mat.dis-nn]
  (or arXiv:cond-mat/0206213v1 [cond-mat.dis-nn] for this version)

Submission history

From: Ido Kanter [view email]
[v1] Wed, 12 Jun 2002 17:47:28 GMT (16kb)

Link back to: arXiv, form interface, contact.