Neural Synchronization with Queries

The neural key exchange algorithm for choosing the relevant inputs is sufficient to achieve a more or less secure key-exchange protocol, however A and B could improve it by taking more information into account, including queries in the training process of the neural networks. Alternatively A and B are generating an input which is correlated with its state and A or B is asking the partner for the corresponding output bit[7]. The overlap between input and weight vector is so low that the additional information does not reveal much about the internal states. But queries introduce a mutual influence between A and B which is not available to an attacking network E. In this work query incorporated to the case of the Hebbian training rule. The probability of a successful attack is calculated for different model parameters using numerical simulations. The results show that queries restore the security against cooperating attackers.

[1]  Adi Shamir,et al.  Analysis of Neural Cryptography , 2002, ASIACRYPT.

[2]  Wolfgang Kinzel,et al.  Interacting Neural Networks and Cryptography , 2002 .

[3]  Markus Volkmer,et al.  Tree parity machine rekeying architectures , 2005, IEEE Transactions on Computers.

[4]  Frederic P. Miller,et al.  Advanced Encryption Standard , 2009 .

[5]  Ueli Maurer,et al.  Secret key agreement by public discussion , 1993 .

[6]  Tomi Salo Security in Pervasive Computing , 2001 .

[7]  W. Kinzel,et al.  Secure exchange of information by synchronization of neural networks , 2002 .

[8]  Ueli Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[9]  Wolfgang Kinzel,et al.  Mutual learning in a tree parity machine and its application to cryptography. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[10]  Wolfgang Kinzel,et al.  Neural cryptography with queries , 2005 .

[11]  Samuel H. Huang,et al.  Tree parity machine-based One-Time Password authentication schemes , 2008, 2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence).

[12]  T. Godhavari,et al.  Cryptography Using Neural Network , 2005, 2005 Annual IEEE India Conference - Indicon.

[13]  Ueli Maurer,et al.  Protocols for Secret Key Agreement by Public Discussion Based on Common Information , 1992, CRYPTO.