Security of neural cryptography

被引:0
|
作者
Mislovaty, R [1 ]
Klein, E [1 ]
Kanter, I [1 ]
Kinzel, W [1 ]
机构
[1] Bar Ilan Univ, Minerva Ctr, IL-52900 Ramat Gan, Israel
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we analyze the security of Neural Cryptography, a novel key-exchange protocol based on synchronization of Neural Networks[1]. Various attacks on this protocol were suggested by Shamir et al., and the protocol was shown to be secure against them[2]. A new attack strategy involving a large number of cooperating attackers, that succeeds to reveal the encryption key was recently found[3].
引用
收藏
页码:219 / 221
页数:3
相关论文
共 50 条
  • [1] Security Research on LTE with Neural Cryptography
    Hu, Dong
    [J]. PROCEEDINGS OF 2008 INTERNATIONAL PRE-OLYMPIC CONGRESS ON COMPUTER SCIENCE, VOL II: INFORMATION SCIENCE AND ENGINEERING, 2008, : 133 - 136
  • [2] Security Analysis of Neural Cryptography Implementation
    Allam, Ahmed M.
    Abbas, Hazem M.
    El-Kharashi, M. Watheq
    [J]. 2013 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS AND SIGNAL PROCESSING (PACRIM), 2013, : 195 - 199
  • [3] Security research on WiMAX with neural cryptography
    Hu, Dong
    Wang, YuYan
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 370 - 373
  • [4] Security Enhancement in Image Steganography Using Neural Networks and Visual Cryptography
    Seethalakshmi, K. S.
    Usha, B. A.
    Sangeetha, K. N.
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTATION SYSTEM AND INFORMATION TECHNOLOGY FOR SUSTAINABLE SOLUTIONS (CSITSS), 2016, : 396 - 402
  • [5] A new service-based computing security model with neural cryptography
    Hu, Dong
    [J]. PROCEEDINGS OF THE 2009 SECOND PACIFIC-ASIA CONFERENCE ON WEB MINING AND WEB-BASED APPLICATION, 2009, : 154 - 156
  • [6] On the security of golden cryptography
    del Rey, Ángel Martín
    Sánchez, Gerardo Rodríguez
    [J]. International Journal of Network Security, 2008, 7 (03) : 448 - 450
  • [7] Cryptography, security, and the future
    Schneier, B
    [J]. COMMUNICATIONS OF THE ACM, 1997, 40 (01) : 138 - 138
  • [8] Cryptography and Future Security
    Kim, Jongsung
    Wu, Hongjun
    Phan, Raphael C. -W.
    [J]. DISCRETE APPLIED MATHEMATICS, 2018, 241 : 1 - 1
  • [9] Cryptography for Security in IoT
    Carracedo, Jorge Martinez
    Milliken, Michael
    Chouhan, Pushpinder Kaur
    Scotney, Bryan
    Lin, Zhiwei
    Sajjad, Ali
    Shackleton, Mark
    [J]. 2018 FIFTH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY, 2018, : 23 - 30
  • [10] Unconditional security in cryptography
    Wolf, S
    [J]. LECTURES ON DATA SECURITY: MODERN CRYPTOLOGY IN THEORY AND PRACTICE, 1999, 1561 : 217 - 250