Attack on synchronized artificial neural networks, forming a common secret by deferred search
Abstract
The application of synchronized artificial neural networks for generation of a common cryptographic key and an attack by deferred search on these networks with the purpose of obtaining this key are considered.
About the Authors
V. F. Golikov
Belarusian national technical university
Belarus
A. Y. Ksenevich
Belarusian national technical university
Belarus
References
1. Kanter I., Kinzel W. The Theory of Neural Networks and Cryptography, Quantum Computers and Computing. 2005. Vol. 5, № 1. P. 130-140.
2. Kinzel W., Kanter I. Neural Cryptography // 9th International Conference on Neural Information Processing. Singapore, 2002.
3. Kanter I., Kinzel W., Kanter E. Secure exchange of information by synchronization of neural networks //arxiv: cond/0202112v1 [cond-mat.stat-mech]. 2002.
4. Ruttor A., Kanter I., Kinzel W. Dynamics of neural cryptography // Phys. Rev. E. 2007. 75(5):056104.
5. Golikov, V.F., Brich N.V. Mekhanizm sinkhronizatsii vesovykh koeffitsientov v iskusstvennykh neironnykh setyakh Kintselya i problemy bezopasnosti // Elektronika INFO. № 6 (96). S. 185-188.
6. Golikov V.F., Brich N.V. Veroyatnostnye svoistva nachal'nykh znachenii vesovykh koeffitsientov v sinkhroniziruemykh iskusstvennykh neironnykh setyakh Kintselya // Sistemnyi analiz i prikladnaya informatika. 2013. № 1-2. S. 33-37.
7. Golikov V.F., Brich N.V., Pivovarov V.L. O nekotorykh problemakh v zadachakh raspredeleniya kriptograficheskikh klyuchei s pomoshch'yu iskusstvennykh neironnykh setei // Sistemnyi analiz i prikladnaya informatika. 2014. № 1-3. S. 42-46.
For citations:
Golikov V.F.,
Ksenevich A.Y.
Attack on synchronized artificial neural networks, forming a common secret by deferred search. Doklady BGUIR. 2017;(8):48-53.
(In Russ.)
Views:
6939