Content deleted Content added
Jpchansondev (talk | contribs) |
|||
Line 21:
== Neural key exchange protocol ==
The most used protocol for key exchange between two parties A and B in the practice is [[Diffie-Hellman]] protocol. Neural key exchange, which is based on the synchronization of two tree parity machines, should be a secure replacement for this method.
Synchronizing these two machines is similar to synchronizing two chaotic oscillators in [[chaos communications]].
[[File:Tree Parity Machine.jpg|thumb|350x350px|Tree parity machine]]
|