References & Citations
Computer Science > Cryptography and Security
Title: Authenticated tree parity machine key exchange
(Submitted on 20 Aug 2004 (v1), last revised 11 Nov 2004 (this version, v2))
Abstract: The synchronisation of Tree Parity Machines (TPMs), has proven to provide a valuable alternative concept for secure symmetric key exchange. Yet, from a cryptographer's point of view, authentication is at least as important as a secure exchange of keys. Adding an authentication via hashing e.g. is straightforward but with no relation to Neural Cryptography. We consequently formulate an authenticated key exchange within this concept. Another alternative, integrating a Zero-Knowledge protocol into the synchronisation, is also presented. A Man-In-The-Middle attack and even all currently known attacks, that are based on using identically structured TPMs and synchronisation as well, can so be averted. This in turn has practical consequences on using the trajectory in weight space. Both suggestions have the advantage of not affecting the previously observed physics of this interacting system at all.
Submission history
From: Markus Volkmer [view email][v1] Fri, 20 Aug 2004 07:01:13 GMT (37kb)
[v2] Thu, 11 Nov 2004 17:06:20 GMT (34kb)
Link back to: arXiv, form interface, contact.