Combined formаtion of a cryptographic key using synchronized artificial neural networks
https://doi.org/10.35596/1729-7648-2021-19-1-79-87
Abstract
А combined method for forming a cryptographic key is proposed in the article. The proposed combined formation consists of two stages: the formation of partially coinciding binary sequences using synchronized artificial neural networks and the elimination of mismatched bits by open comparison of the parities of bit pairs. In this paper, possible vulnerabilities of the basic method of forming a cryptographic key using synchronized artificial neural networks are considered, their danger is assessed, and a correction of the method is proposed to ensure the required confidentiality of the generated shared secret. At the first stage, a deferred brute-force attack is considered. To neutralize this attack, it is proposed to use the convolution function of the results of several independent synchronizations. As a convolution function, the bitwise addition modulo 2 of the vectors of the weights of the networks is used. Due to the correction of the first stage of the basic algorithm, the amount of deferred search exponentially increases, and frequency analysis of binary sequences also becomes ineffective. At the second stage, an attack based on the knowledge of pair parities is considered, taking into account the proposed method for correcting the first stage. The analysis of the influence of network parameters on the process of eliminating the bit mismatch at the second stage is carried out. Statistical modeling of this analysis has been performed. The results obtained showed that the cryptanalyst could not uniquely distinguish the values of the remaining bits. The proposed combined method makes it possible to increase the confidentiality of the generated shared secret and significantly reduce the number of information exchanges in comparison with the Neural key generation technology.
About the Authors
M. L. RadziukevichBelarus
Radziukevich Maryna Lvovna - M. Sci., Head of the Testing Laboratory for Information Security Requirements
220088, Minsk, Pervomayskaya str. 26, bldg. 2
tel. +375-17-294-01-71
V. F. Golikov
Belarus
D.Sci, Professor of the Information Technologies in Management Department
Minsk
References
1. Pivovarov V.L., Holikau U.F. [Method of generating common cryptographic keys for loosly coincident binary sequences]. Informatics. 2016; 3(51):31-37. (In Russ.)
2. Shannon C.E. Communication theory of secrecy systems. Bell system technical journal. 1949;28(4):656-715.
3. Kanter I., Kinzel W. The Theory of Neural Networks and Cryptography, Quantum Computers and Computing. 2005;5(1):130-140.
4. Ruttor A., Kanter I., Kinzel W. Dynamics of neural cryptography. Phys. Rev. Е. 2007;75(5):056104.
5. Golikov V.F., Radziukevich M.L. [The formation of a common secret using artificial neural networks]. Sistemnyy analiz i prikladnaya informatika. 2019;(2):49-56. (in Russ.).
6. Radziukevich M.L., Golikov V.F. [Enhancing the secrecy of a cryptographic key generated using synchronized artificial neural networks]. Informatics. 2020;17(1):102-108. (In Russ.)
7. Golikov V.F., Ksenevich A.Y. [Attack on synchronized artificial neural networks, forming a common secret by deferred search]. Doklady BGUIR = Doklady BGUIR. 2017;(8):48-53. (In Russ.)
Review
For citations:
Radziukevich M.L., Golikov V.F. Combined formаtion of a cryptographic key using synchronized artificial neural networks. Doklady BGUIR. 2021;19(1):79-87. (In Russ.) https://doi.org/10.35596/1729-7648-2021-19-1-79-87