On the Improvement of Neural Cryptography Using Erroneous Transmitted Information With Error Prediction

被引:13
|
作者
Allam, Ahmed M. [1 ]
Abbas, Hazem M. [2 ]
机构
[1] Ain Shams Univ, Dept Comp & Syst Engn, Cairo 11361, Egypt
[2] Mentor Graph Egypt, Cairo 11361, Egypt
来源
IEEE TRANSACTIONS ON NEURAL NETWORKS | 2010年 / 21卷 / 12期
关键词
Cryptography; mutual learning; neural cryptography; neural synchronization; tree parity machine;
D O I
10.1109/TNN.2010.2079948
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Neural cryptography deals with the problem of "key exchange" between two neural networks using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between the two communicating parties is eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process. Therefore, diminishing the probability of such a threat improves the reliability of exchanging the output bits through a public channel. The synchronization with feedback algorithm is one of the existing algorithms that enhances the security of neural cryptography. This paper proposes three new algorithms to enhance the mutual learning process. They mainly depend on disrupting the attacker confidence in the exchanged outputs and input patterns during training. The first algorithm is called "Do not Trust My Partner" (DTMP), which relies on one party sending erroneous output bits, with the other party being capable of predicting and correcting this error. The second algorithm is called "Synchronization with Common Secret Feedback" (SCSFB), where inputs are kept partially secret and the attacker has to train its network on input patterns that are different from the training sets used by the communicating parties. The third algorithm is a hybrid technique combining the features of the DTMP and SCSFB. The proposed approaches are shown to outperform the synchronization with feedback algorithm in the time needed for the parties to synchronize.
引用
收藏
页码:1915 / 1924
页数:10
相关论文
共 50 条
  • [31] Preliminary Analysis of Human Error Prediction Model by Using Biological Information
    Saito, Yuto
    Anuardi, Muhammad Nur Adilin Mohd
    Matsubara, Ryota
    Sugaya, Midori
    [J]. ENGINEERING PSYCHOLOGY AND COGNITIVE ERGONOMICS, EPCE 2021, 2021, 12767 : 324 - 335
  • [32] Color Extended Visual Cryptography Using Error Diffusion
    Kang, InKoo
    Arce, Gonzalo R.
    Lee, Heung-Kyu
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2011, 20 (01) : 132 - 145
  • [33] COLOR EXTENDED VISUAL CRYPTOGRAPHY USING ERROR DIFFUSION
    Kang, Inkoo
    Arce, Gonzalo R.
    Lee, Heung-Kyu
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1- 8, PROCEEDINGS, 2009, : 1473 - +
  • [34] Error prediction for neural networks by fuzzification
    Feuring, T
    Lippe, WM
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 1998, 13 (06) : 495 - 502
  • [35] Neural Circuitry of Reward Prediction Error
    Watabe-Uchida, Mitsuko
    Eshel, Neir
    Uchida, Naoshige
    [J]. ANNUAL REVIEW OF NEUROSCIENCE, VOL 40, 2017, 40 : 373 - 394
  • [36] Prediction of Sexually Transmitted Diseases Using Deep Convolutional Neural Networks for Image Data
    Mahameed, Ans Ibrahim
    Mahmood, Rafah Kareem
    [J]. FORTHCOMING NETWORKS AND SUSTAINABILITY IN THE AIOT ERA, VOL 1, FONES-AIOT 2024, 2024, 1035 : 401 - 411
  • [37] Prediction accuracy improvement for Bitcoin market prices based on symmetric volatility information using artificial neural network approach
    Othman, Anwar Hasan Abdullah
    Kassim, Salina
    Bin Rosman, Romzie
    Redzuan, Nur Harena Binti
    [J]. JOURNAL OF REVENUE AND PRICING MANAGEMENT, 2020, 19 (05) : 314 - 330
  • [38] Bit Error Rate Improvement Scheme for Transmitted Reference UWB Systems
    Kim, Jaewoon
    Shin, Yoan
    [J]. TENCON 2009 - 2009 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2009, : 827 - 831
  • [39] The Measurement of Information Transmitted by a Neural Population: Promises and Challenges
    Crumiller, Marshall
    Knight, Bruce
    Kaplan, Ehud
    [J]. ENTROPY, 2013, 15 (09) : 3507 - 3527
  • [40] AN INFORMATION SECURITY SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
    Hossain, Md. Emran
    Grout, Vic
    Bhuiyan, Monir
    Miraz, Mandi H.
    [J]. PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON INTERNET TECHNOLOGIES AND APPLICATIONS (ITA 11), 2011, : 607 - 608