vioft2nntf2t|tblJournal|Abstract_paper|0xf4ff15a326000000aa0d000001000b00 In Neural Cryptography, Artificial Neural Networks are used for the process of key generation and encryption. Tree Parity Machine (TPM) is a single layer neural network that approaches symmetric key exchange using the process of mutual learning. This method is exploited to design a secure key exchange protocol, where the sender and the receiver TPMs are synchronized to obtain an identically tuned weight vectors in both the networks. The synchronized TPMs are then capable of generating a key stream. The time required for synchronization depends on the initial weight vectors which are randomly initialized. In the proposed method, the process of synchronization is expedited using Cuckoo Search (CS) Algorithm used for the generation of optimal weights.
Shikha Gupta, Nalin Nanda, Naman Chhikara, Nishi Gupta, Satbir Jain Netaji Subhas Institute of Technology, India
Neural Synchronisation, Tree Parity Machine, Cuckoo Search Algorithm, Key Exchange, Security
January | February | March | April | May | June | July | August | September | October | November | December |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
| Published By : ICTACT
Published In :
ICTACT Journal on Soft Computing ( Volume: 8 , Issue: 3 , Pages: 1663-1667 )
Date of Publication :
April 2018
Page Views :
194
Full Text Views :
|