Threshold Method of Detecting Long-Time TPM Synchronization

The phenomenon of neural networks synchronization by mutual learning can be used to construct key exchange protocol on an open channel. For security of this protocol it is important to minimize knowledge about synchronizing networks available to the potential attacker. The method presented herein permits evaluating the level of synchronization before it terminates. Subsequently, this research enables to assess the synchronizations, which are likely to be considered as long-time synchronizations. Once that occurs, it is preferable to launch another synchronization with the new selected weights as there is a high probability (as previously shown) that a new synchronization belongs to the short one.

[1]  Neural synchronization and cryptography , 2006 .

[2]  Ryszard Kozera,et al.  The evaluation of the TPM synchronization on the basis of their outputs , 2013 .

[3]  Wolfgang Kinzel,et al.  Mutual learning in a tree parity machine and its application to cryptography. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[4]  Janusz Kacprzyk,et al.  Advances in Web Intelligence , 2003, Lecture Notes in Computer Science.

[5]  Andreas Ruttor,et al.  Synchronization of neural networks by mutual learning and its application to cryptography , 2004, NIPS.

[6]  W. Kinzel,et al.  Secure exchange of information by synchronization of neural networks , 2002 .

[7]  Adi Shamir,et al.  Analysis of Neural Cryptography , 2002, ASIACRYPT.

[8]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[9]  Wolfgang Kinzel,et al.  Neural cryptography , 2002, Proceedings of the 9th International Conference on Neural Information Processing, 2002. ICONIP '02..

[10]  Zbigniew Kotulski,et al.  On Application of Neural Networks for S-Boxes Design , 2005, AWIC.

[11]  David V. Huntsberger,et al.  Elements of statistical inference , 1961 .

[12]  Wolfgang Kinzel,et al.  The Theory of Neural Networks and Cryptography , 2003 .

[13]  Yuliang Zheng,et al.  Advances in Cryptology — ASIACRYPT 2002 , 2002, Lecture Notes in Computer Science.

[14]  M.H. Hassoun,et al.  Fundamentals of Artificial Neural Networks , 1996, Proceedings of the IEEE.

[15]  Andreas Ruttor,et al.  Genetic attack on neural cryptography. , 2006, Physical review. E, Statistical, nonlinear, and soft matter physics.

[16]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .