Traditional public key exchange protocols are based on algebraic number theory. In another perspective, neural cryptography, which is based on neural networks, has been emerging. It has been reported that two parties can exchange secret key pairs with the synchronization phenomenon in neural networks. Although there are various models of neural cryptography, called Tree Parity Machine (TPM), many of them are not suitable for practical use, considering efficiency and security. In this paper, we propose a Vector-Valued Tree Parity Machine (VVTPM), which is a generalized architecture of TPM models and can be more efficient and secure for real-life systems. In terms of efficiency and security, we show that the synchronization time of the VVTPM has the same order as the basic TPM model, and it can be more secure than previous results with the same synaptic depth.
CITATION STYLE
Jeong, S., Park, C., Hong, D., Seo, C., & Jho, N. (2021). Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems. Security and Communication Networks, 2021. https://doi.org/10.1155/2021/6680782
Mendeley helps you to discover research relevant for your work.