Neural cryptography: Difference between revisions

Content deleted Content added
Citation bot (talk | contribs)
m Add: pmid, pages. | You can use this bot yourself. Report bugs here. | User-activated.
Line 115:
Other configurations of the output layer for K>2 are also possible.<ref name="Reyes" />
 
This machine has proven to be robust enough against some attacks<ref name="Reyes2">{{cite journal |last1=Reyes |first1=Oscar Mauricio |last2=Zimmermann |first2=Karl-Heinz |date=June 2010 |title=Permutation parity machines for neural cryptography |journal=Physical Review E |volume=81 |issue=6 |pages=066117 |issn=1539-3755 |doi=10.1103/PhysRevE.81.066117|bibcode=2010PhRvE..81f6117R }}</ref> so it could be used as a cryptographic mean, but it has been shown to be vulnerable to a probabilistic attack.<ref name="Seoane">{{cite journal |last1=Seoane |first1=Luís F. |last2=Ruttor |first2=Andreas |date=February 2012 |title=Successful attack on permutation-parity-machine-based neural cryptography |journal=Physical Review E |volume=85 |issue=2 |pages=025101 |issn=1539-3755 |doi=10.1103/PhysRevE.85.025101|pmid=22463268 |arxiv=1111.5792 |bibcode=2012PhRvE..85b5101S }}</ref>
 
=== Security against quantum computers ===
Line 135:
* [http://theorie.physik.uni-wuerzburg.de/~ruttor/neurocrypt.html Neural Cryptography] - Description of one kind of neural cryptography at the [[University of Würzburg]], Germany.
* {{cite conference |last1=Kinzel |first1=W. |last2=Kanter |first2=I. |date=2002 |title=Neural cryptography |book-title=Proceedings of the 9th International Conference on Neural Information Processing |conference=ICONIP '02 |pages=1351–1354 |doi=10.1109/ICONIP.2002.1202841|arxiv=cond-mat/0208453 }} - One of the leading papers that introduce the concept of using synchronized neural networks to achieve a public key authentication system.
* {{cite journal |last1=Li |first1=Li-Hua |last2=Lin |first2=Luon-Chang |last3=Hwang |first3=Min-Shiang |date=November 2001 |title=A remote password authentication scheme for multiserver architecture using neural networks |journal=IEEE Transactions on Neural Networks |volume=12 |issue=6 |pages=1498–1504 |issn=1045-9227 |doi=10.1109/72.963786|pmid=18249979 }} - Possible practical application of Neural Cryptography.
* {{cite conference |last1=Klimov |first1=Alexander |last2=Mityagin |first2=Anton |last3=Shamir |first3=Adi |date=2002 |title=Analysis of Neural Cryptography |url=https://iacr.org/archive/asiacrypt2002/25010286/25010286.pdf |book-title=Advances in Cryptology |conference=ASIACRYPT 2002 |series=[[Lecture Notes in Computer Science|LNCS]] |volume=2501 |pages=288–298 |issn=0302-9743 |doi=10.1007/3-540-36178-2_18 |accessdate=2017-11-15}} - Analysis of neural cryptography in general and focusing on the weakness and possible attacks of using synchronized neural networks.
* [http://www.opus-bayern.de/uni-wuerzburg/volltexte/2007/2361/ Neural Synchronization and Cryptography] - Andreas Ruttor. PhD thesis, Bayerische Julius-Maximilians-Universität Würzburg, 2006.
* {{cite journal |last1=Ruttor |first1=Andreas |last2=Kinzel |first2=Wolfgang |last3=Naeh |first3=Rivka |last4=Kanter |first4=Ido |date=March 2006 |title=Genetic attack on neural cryptography |journal=Physical Review E |volume=73 |issue=3 |pages=036121 |issn=1539-3755 |doi=10.1103/PhysRevE.73.036121|pmid=16605612 |arxiv=cond-mat/0512022 |bibcode=2006PhRvE..73c6121R }}
* {{cite journal | author=Khalil Shihab | year=2006 | title=A backpropagation neural network for computer network security | journal=Journal of Computer Science 2 | pages=710&ndash;715 | url=http://www.scipub.org/fulltext/jcs/jcs29710-715.pdf | deadurl=yes | archiveurl=https://web.archive.org/web/20070712012959/http://www.scipub.org/fulltext/jcs/jcs29710-715.pdf | archivedate=2007-07-12 | df= }}
{{Cryptography navbox}}