Neural cryptography: Difference between revisions

Content deleted Content added
Protocol: Fixed wrong statement
Tags: Mobile edit Mobile web edit
Line 20:
== Neural key exchange protocol ==
 
The most used protocol for key exchange between two parties {{var|A}} and {{var|B}} in the practice is [[Diffie-HellmanDiffie–Hellman key exchange]] protocol. Neural key exchange, which is based on the synchronization of two tree parity machines, should be a secure replacement for this method.
Synchronizing these two machines is similar to synchronizing two chaotic oscillators in [[chaos communications]].
[[File:Tree Parity Machine.jpg|thumb|350x350px|Tree parity machine]]