ISSN 1000-1239 CN 11-1777/TP

• Paper • Previous Articles     Next Articles

Research on Neural Cryptographic Protocols

Chen Tieming1,2, Samuel H. Huang3, Liu Duo2, and Cai Jiamei2   

  1. 1(State Key Laboratory of Software Development Environment, Beihang University, Beijing 100191) 2(College of Computer Science and Technology, Zhejiang University of Technology, Hangzhou 310014) 3(Intelligent System Laboratory, University of Cincinnati, Cincinnati, OH 45221)
  • Online:2009-08-15

Abstract: Research on discretized-neural-network-based cryptographic protocols is a novel topic in information security domain. At the beginning of this paper, literature on such neural cryptography is surveyed, and then an interacting neural network model, named tree parity machine (TPM), is introduced with a survey of its theoretical research. Then, several important issues regarding TPM's applications for cryptography are addressed and analyzed through engineering empirical study. Two key problems, namely, the stability of weight synchronization and the security of synchronization, are investigated in detail. Two new concept methods, the threshold in neuron activation function and hash-based synchronization check, are proposed to improve the TPM-based cryptography application scheme. ANOVA and statistical experiments results show that using threshold can achieve faster and more stable weight synchronization, while using hash function can check weight synchronization precisely. Finally, attack analysis for the improved TPM-used protocol models is discussed.

Key words: neural network, tree parity machine, weight synchronization, cryptographic protocol, key agreement