Security analysis and improvement to permutation parity machine
Journal: ACCENTS Transactions on Information Security (TIS) (Vol.2, No. 8)Publication Date: 2017-10-29
Authors : Vidya M H Ganesan P Sathyanararyana S V; G K Patra;
Page : 87-94
Keywords : Neural cryptography; Probabilistic attack; Permutation parity machine.;
Abstract
Security is a major aspect of communication in every day to day life. Neural cryptography is a non-classical cryptographic technique which aims to derive a common key through learning mechanism between two neural networks. It makes use of lightweight permutation parity machines (PPM) to generate a common secret key over a public channel. The basic arithmetic computation on PPM leads to secret key generation between two entities through the process of synchronization. However, the process can be impersonated by an attacker using probabilistic attack on PPM. The proposed technique mitigates the probabilistic attack using feedback mechanism for the synchronization of PPM.
Other Latest Articles
- New secure and reliable polygraphic cryptosystem
- A secure key exchange protocol using link weights and dynamic tree parity machine (TPM)
- The Effects of Postharvest 1– Methylcyclopropane Treatments on Quality of "Deveci" Pear Variety Grown in Canakkale Region During Storage
- The Effects of 1–Methylcyclopropane Treatments and Different Storage Temperatures on Quality of Fuji Kiku Apple Variety
- Planting Design in the Urban Protection Area: The Example of Çanakkale (Turkey)
Last modified: 2018-02-01 23:30:26