Neural synchronization based secret key exchange over public channels: A survey

Exchange of secret keys over public channels based on neural synchronization using a variety of learning rules offer an appealing alternative to number theory based cryptography algorithms. Though several forms of attacks are possible on this neural protocol e.g. geometric, genetic and majority attacks, our survey finds that deterministic algorithms that synchronize with the end-point networks have high time complexity, while probabilistic and population-based algorithms have demonstrated ability to decode the key during its exchange over the public channels. Our survey also discusses queries, heuristics, erroneous information, group key exchange, synaptic depths, etc, that have been proposed to increase the time complexity of algorithmic interception or decoding of the key during exchange. The Tree Parity Machine and its variants, neural networks with tree topologies incorporating parity checking of state bits, appear to be one of the most secure and stable models of the end-point networks. Our survey also mentions some noteworthy studies on neural networks applied to other necessary aspects of cryptography. We conclude that discovery of neural architectures with very high synchronization speed, and designing the encoding and entropy of the information exchanged during mutual learning, and design of extremely sensitive chaotic maps for transformation of synchronized states of the networks to chaotic encryption keys, are the primary issues in this field.

[1]  Kinouchi,et al.  Equivalence between learning in noisy perceptrons and tree committee machines. , 1996, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.

[2]  Tingwen Huang,et al.  Approach to design neural cryptography: a generalized architecture and a heuristic rule. , 2013, Physical review. E, Statistical, nonlinear, and soft matter physics.

[3]  Chuandong Li,et al.  Neural Information Processing , 2012, Lecture Notes in Computer Science.

[4]  Advances in Solid State Physics , 2009 .

[5]  Andreas Ruttor,et al.  Successful attack on permutation-parity-machine-based neural cryptography. , 2012, Physical review. E, Statistical, nonlinear, and soft matter physics.

[6]  Wolfgang Kinzel,et al.  Public channel cryptography by synchronization of neural networks and chaotic maps. , 2003, Physical review letters.

[7]  Simon Haykin,et al.  Neural Networks: A Comprehensive Foundation , 1998 .

[8]  Abhinav Tiwari,et al.  An Empirical Investigation of Using ANN Based N-State Sequential Machine and Chaotic Neural Network in the Field of Cryptography , 2012 .

[9]  Tai-Wen Yue,et al.  A neural network approach for visual cryptography , 2000, Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks. IJCNN 2000. Neural Computing: New Challenges and Perspectives for the New Millennium.

[10]  Xiaofeng Liao,et al.  A Digital Image Encryption Algorithm Based on Hyper-chaotic Cellular Neural Network , 2009, Fundam. Informaticae.

[11]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[12]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[13]  N. Koblitz A Course in Number Theory and Cryptography , 1987 .

[14]  Jinde Cao,et al.  Cryptography based on delayed chaotic neural networks , 2006 .

[15]  Jinde Cao,et al.  Adaptive synchronization and lag synchronization of uncertain dynamical system with time delay based on parameter identification , 2007 .

[16]  Yong Wang,et al.  Parallel keyed hash function construction based on chaotic neural network , 2009, Neurocomputing.

[17]  Pravin Revankar,et al.  Neural Synchronization with Queries , 2010, 2010 International Conference on Signal Acquisition and Processing.

[18]  Yong Wang,et al.  Parallel hash function construction based on coupled map lattices , 2011 .

[19]  Sorin A. Huss,et al.  Side-Channel Resistance Evaluation of a Neural Network Based Lightweight Cryptography Scheme , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[20]  Wolfgang Kinzel,et al.  Cooperating attackers in neural cryptography. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.

[21]  Wolfgang Kinzel,et al.  Cryptography based on neural networks—analytical results , 2002 .

[22]  Xuerong Mao,et al.  Stability of stochastic delay neural networks , 2001, J. Frankl. Inst..

[23]  Andreas Ruttor,et al.  Genetic attack on neural cryptography. , 2006, Physical review. E, Statistical, nonlinear, and soft matter physics.

[24]  Arindam Sarkar,et al.  An adaptive neural network guided secret key based encryption through recursive positional modulo-2 substitution for online wireless communication (ANNRPMS) , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).

[25]  Hazem M. Abbas,et al.  Security analysis of neural cryptography implementation , 2013, 2013 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM).

[26]  Hazem M. Abbas,et al.  On the Improvement of Neural Cryptography Using Erroneous Transmitted Information With Error Prediction , 2010, IEEE Transactions on Neural Networks.

[27]  Wolfgang Kinzel,et al.  Neural cryptography with queries , 2005 .

[28]  Louis M Pecora,et al.  Synchronization of chaotic systems. , 2015, Chaos.

[29]  Wolfgang Kinzel,et al.  Mutual learning in a tree parity machine and its application to cryptography. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[30]  Yu Huang,et al.  Chaotic Maps: Dynamics, Fractals, and Rapid Fluctuations , 2011, Chaotic Maps: Dynamics, Fractals, and Rapid Fluctuations.

[31]  Andreas Ruttor,et al.  Neural cryptography with feedback. , 2003, Physical review. E, Statistical, nonlinear, and soft matter physics.

[32]  Emilio Del-Moral-Hernandez,et al.  Chaotic Neural Networks , 2009, Encyclopedia of Artificial Intelligence.

[33]  Karl-Heinz Zimmermann,et al.  Permutation parity machines for neural synchronization , 2009 .

[34]  Hazem M. Abbas,et al.  Group key exchange using neural cryptography with binary trees , 2011, 2011 24th Canadian Conference on Electrical and Computer Engineering(CCECE).

[35]  W. Kinzel,et al.  Secure exchange of information by synchronization of neural networks , 2002 .

[36]  Karl-Heinz Zimmermann,et al.  Permutation parity machines for neural cryptography. , 2010, Physical review. E, Statistical, nonlinear, and soft matter physics.

[37]  Wolfgang Kinzel,et al.  Interacting Neural Networks and Cryptography , 2002 .

[39]  Tingwen Huang,et al.  Two-layer tree-connected feed-forward neural network model for neural cryptography , 2013, Physical Review E.