Neural cryptography: Difference between revisions

Content deleted Content added
Permutation parity machine: so it could be used as a cryptographic mean, but it has been shown to be vulnerable to a probabilistic attack (from source abstract)
Line 115:
Other configurations of the output layer for K>2 are also possible.<ref name="Reyes" />
 
This machine has proven to be robust enough against some attacks<ref name="Reyes2">{{cite journal |last1=Reyes |first1=Oscar Mauricio |last2=Zimmermann |first2=Karl-Heinz |date=June 2010 |title=Permutation parity machines for neural cryptography |journal=Physical Review E |volume=81 |issue=6 |issn=1539-3755 |doi=10.1103/PhysRevE.81.066117}}</ref> so it could workbe used as a cryptographic mean, but ait recenthas implementationbeen ofshown ato probabilisticbe attack has shownvulnerable thatto a key-exchangeprobabilistic protocol based on PPM can be violatedattack.<ref name="Seoane">{{cite journal |last1=Seoane |first1=Luís F. |last2=Ruttor |first2=Andreas |date=February 2012 |title=Successful attack on permutation-parity-machine-based neural cryptography |journal=Physical Review E |volume=85 |issue=2 |issn=1539-3755 |doi=10.1103/PhysRevE.85.025101}}</ref>
 
=== Security against quantum computers ===