Neural cryptography: Difference between revisions

Content deleted Content added
Applications: Improve grammar
There are k no. of hidden neurons.So,output of hidden layer (sigma) should be numbered from 1 to k.
Line 23:
The most used protocol for key exchange between two parties A and B in the practice is Diffie-Hellman protocol. Neural key exchange, which is based on the synchronization of two tree parity machines, should be a secure replacement for this method.
Synchronizing these two machines is similar to synchronizing two chaotic oscillators in [[chaos communications]].
[[ImageFile:TreeParityMachineTree Parity Machine.jpg|thumb|right|350px350x350px|Tree parity machine]]
 
[[Image:TreeParityMachine.jpg|thumb|right|350px|Tree parity machine]]
 
=== Tree parity machine ===