An Improved Method to Evaluate the Synchronization in Neural Key Exchange Protocol
The synchronization between two neural networks by mutual learning can be used to design the neural key exchange protocol. The critical issue is how to evaluate the synchronization without a weight vector. All existing methods have a delay in evaluating the synchronization, which affects the securit...
Saved in:
Published in | Security and communication networks Vol. 2020; no. 2020; pp. 1 - 10 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Cairo, Egypt
Hindawi Publishing Corporation
2020
Hindawi Hindawi Limited |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | The synchronization between two neural networks by mutual learning can be used to design the neural key exchange protocol. The critical issue is how to evaluate the synchronization without a weight vector. All existing methods have a delay in evaluating the synchronization, which affects the security of the neural key exchange. To evaluate the full synchronization of neural networks more timely and accurately, an improved method for evaluating the synchronization is proposed. First, the frequency that the two networks have the same output in previous steps is used for assessing the degree of them roughly. Second, the hash function is utilized to judge whether the two networks have achieved full synchronization precisely when the degree exceeds a given threshold. The improved method can find the full synchronization between two networks with no information other than the hash value of the weight vector. Compared with other methods, the full synchronization can be detected earlier by two communication partners which adopt the method proposed in this paper. As a result, the successful probability of geometric is reduced. Therefore, the proposed method can enhance the security of the neural exchange protocol. |
---|---|
AbstractList | The synchronization between two neural networks by mutual learning can be used to design the neural key exchange protocol. The critical issue is how to evaluate the synchronization without a weight vector. All existing methods have a delay in evaluating the synchronization, which affects the security of the neural key exchange. To evaluate the full synchronization of neural networks more timely and accurately, an improved method for evaluating the synchronization is proposed. First, the frequency that the two networks have the same output in previous steps is used for assessing the degree of them roughly. Second, the hash function is utilized to judge whether the two networks have achieved full synchronization precisely when the degree exceeds a given threshold. The improved method can find the full synchronization between two networks with no information other than the hash value of the weight vector. Compared with other methods, the full synchronization can be detected earlier by two communication partners which adopt the method proposed in this paper. As a result, the successful probability of geometric is reduced. Therefore, the proposed method can enhance the security of the neural exchange protocol. |
Author | Li, Yu Han, Yi Liang Li, Zhe Zhu, Shuai Shuai |
Author_xml | – sequence: 1 fullname: Zhu, Shuai Shuai – sequence: 2 fullname: Li, Zhe – sequence: 3 fullname: Li, Yu – sequence: 4 fullname: Han, Yi Liang |
BookMark | eNqF0DtPwzAUBWALFYm2sDEjS4wQajt-ZayqAhXlIR5z5DgOSdXaxXEK5deTKhWMTPcOn869OgPQs84aAE4xusKYsRFBBI2k5AmX8gD0cRInEcKE9H53TI_AoK4XCHFMBe2D57GFs9Xau43J4b0JpcthcHC6UctGBQNDaeDL1urSO1t9q1A5CysLH0zj1RLemS2cfulS2XcDn7wLTrvlMTgs1LI2J_s5BG_X09fJbTR_vJlNxvNIxxyFyGidCcVMTgVLEpRjzXLNMKecM0J0LONcISFZhgUuhCgKhTOU6YLknBSCsngIzrvc9vuPxtQhXbjG2_ZkSiiTVHDMaKsuO6W9q2tvinTtq5Xy2xSjdNdaumst3bfW8ouOl5XN1Wf1nz7rtGmNKdSfJkhKJOIf4Fd3WQ |
CitedBy_id | crossref_primary_10_1007_s00521_022_08169_2 crossref_primary_10_1007_s11277_023_10362_y |
Cites_doi | 10.1109/TNNLS.2019.2955165 10.32628/ijsrset196550 10.1209/epl/i2002-00552-9 10.5815/ijcnis.2019.10.06 10.5937/vojtehg64-8877 10.1088/1742-5468/2005/01/p01009 10.1007/s11128-019-2296-4 10.1103/physreve.75.056104 10.11591/ijai.v8.i1.pp44-53 10.1103/physreve.69.066137 10.1007/s11042-019-08454-8 |
ContentType | Journal Article |
Copyright | Copyright © 2020 Yi Liang Han et al. Copyright © 2020 Yi Liang Han et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 |
Copyright_xml | – notice: Copyright © 2020 Yi Liang Han et al. – notice: Copyright © 2020 Yi Liang Han et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 |
DBID | ADJCN RHU RHW RHX AAYXX CITATION 7SC 7SP 8FD 8FE 8FG ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- L7M L~C L~D P5Z P62 PIMPY PQEST PQQKQ PQUKI PRINS |
DOI | 10.1155/2020/8869688 |
DatabaseName | الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals Hindawi Publishing Complete Hindawi Publishing Subscription Journals Hindawi Publishing Open Access CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni Edition) ProQuest Central UK/Ireland Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Central Technology Collection ProQuest One Community College ProQuest Central Korea ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection Publicly Available Content Database ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China |
DatabaseTitle | CrossRef Publicly Available Content Database Computer Science Database ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest Central Korea Advanced Technologies Database with Aerospace Advanced Technologies & Aerospace Collection ProQuest One Academic Eastern Edition Electronics & Communications Abstracts ProQuest Technology Collection ProQuest SciTech Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Academic |
DatabaseTitleList | CrossRef Publicly Available Content Database |
Database_xml | – sequence: 1 dbid: RHX name: Hindawi Publishing url: http://www.hindawi.com/journals/ sourceTypes: Publisher – sequence: 2 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1939-0122 |
Editor | Anees, Amir |
Editor_xml | – sequence: 1 givenname: Amir surname: Anees fullname: Anees, Amir – fullname: Amir Anees |
EndPage | 10 |
ExternalDocumentID | 10_1155_2020_8869688 1208807 |
GrantInformation_xml | – fundername: National Natural Science Foundation of China grantid: 61572521 – fundername: People's Armed Police Force grantid: KYTD201805 |
GroupedDBID | .4S .DC 05W 0R~ 123 1OC 24P 31~ 3SF 4.4 52U 5DZ 66C 8-1 8UM AAESR AAEVG AAFWJ AAJEY AAONW AAZKR ACBWZ ACGFO ACXQS ADBBV ADIZJ ADJCN AEIMD AENEX AFBPY AFKRA AJXKR ALMA_UNASSIGNED_HOLDINGS AMBMR ARAPS ARCSS ASPBG ATUGU AVWKF AZFZN AZVAB BCNDV BDRZF BENPR BGLVJ BHBCM BNHUX BOGZA BRXPI CCPQU CS3 DR2 DU5 EBS EIS EJD F1Z FEDTE G-S GODZA GROUPED_DOAJ H13 HCIFZ HVGLF HZ~ IAO ICD ITC IX1 K7- LH4 LITHE LW6 MY. MY~ NNB O9- OIG OK1 P2P PIMPY RHX ROL SUPJJ TH9 TUS W99 WBKPD XV2 RHU RHW AAYXX CITATION 7SC 7SP 8FD 8FE 8FG ABUWG AZQEC DWQXO GNUQQ JQ2 L7M L~C L~D P62 PQEST PQQKQ PQUKI PRINS |
ID | FETCH-LOGICAL-c360t-eccb7a5ed475990d1c5dc516466522c383da0785b171f77ffa1b0bcf2d62f7453 |
IEDL.DBID | BENPR |
ISSN | 1939-0114 |
IngestDate | Thu Oct 10 15:36:21 EDT 2024 Thu Sep 26 17:36:42 EDT 2024 Sun Jun 02 18:51:24 EDT 2024 Thu Sep 12 21:20:35 EDT 2024 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 2020 |
Language | English |
License | This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c360t-eccb7a5ed475990d1c5dc516466522c383da0785b171f77ffa1b0bcf2d62f7453 |
ORCID | 0000-0003-2557-6180 0000-0001-6402-9660 0000-0002-1534-5509 0000-0002-2116-5408 |
OpenAccessLink | https://www.proquest.com/docview/2458476154?pq-origsite=%requestingapplication% |
PQID | 2458476154 |
PQPubID | 1046363 |
PageCount | 10 |
ParticipantIDs | proquest_journals_2458476154 crossref_primary_10_1155_2020_8869688 hindawi_primary_10_1155_2020_8869688 emarefa_primary_1208807 |
PublicationCentury | 2000 |
PublicationDate | 2020-00-00 |
PublicationDateYYYYMMDD | 2020-01-01 |
PublicationDate_xml | – year: 2020 text: 2020-00-00 |
PublicationDecade | 2020 |
PublicationPlace | Cairo, Egypt |
PublicationPlace_xml | – name: Cairo, Egypt – name: London |
PublicationTitle | Security and communication networks |
PublicationYear | 2020 |
Publisher | Hindawi Publishing Corporation Hindawi Hindawi Limited |
Publisher_xml | – name: Hindawi Publishing Corporation – name: Hindawi – name: Hindawi Limited |
References | 24 26 M. Mehic (23) A. M. Allam (14) B. ÖzÇakmak (3) S. Santhanalakshmi (12) A. Klimov (9) S. D. Édgar (18) 2019; 2019 P. P. Hadke (7) M. M. Alani (4) E. Shishniashvili (22) 2020; 21 10 11 M. Niemiec (25) S. Chourasia (15) 2019; 8 16 17 19 M. Dolecki (1) 2013; 57 2 S. Santhanalakshmi (13) 5 6 8 20 21 |
References_xml | – ident: 2 – start-page: 207 ident: 13 article-title: Analysis of neural synchronization using genetic approach for secure key generation contributor: fullname: S. Santhanalakshmi – ident: 17 doi: 10.1109/TNNLS.2019.2955165 – ident: 5 doi: 10.32628/ijsrset196550 – start-page: 1 ident: 14 article-title: Authenticated key exchange protocol using neural cryptography with secret boundaries contributor: fullname: A. M. Allam – start-page: 1 ident: 25 article-title: Security verification of artificial neural networks used to error correction in quantum cryptography contributor: fullname: M. Niemiec – volume: 2019 start-page: 1 issue: 3 year: 2019 ident: 18 article-title: On the development of an optimal structure of tree parity machine for the establishment of a cryptographic key publication-title: Security and Communication Networks contributor: fullname: S. D. Édgar – ident: 8 doi: 10.1209/epl/i2002-00552-9 – start-page: 288 ident: 9 article-title: Analysis of neural cryptography contributor: fullname: A. Klimov – start-page: 23 ident: 4 article-title: Applications of machine learning in cryptography: a survey contributor: fullname: M. M. Alani – start-page: 222 ident: 23 article-title: Error reconciliation in quantum key distribution protocols contributor: fullname: M. Mehic – ident: 16 doi: 10.5815/ijcnis.2019.10.06 – ident: 6 doi: 10.5937/vojtehg64-8877 – start-page: 2413 ident: 3 article-title: Neural and quantum cryptography in big data: a review contributor: fullname: B. ÖzÇakmak – start-page: 1 ident: 7 article-title: Use of neural networks in cryptography: a review contributor: fullname: P. P. Hadke – ident: 11 doi: 10.1088/1742-5468/2005/01/p01009 – volume: 57 start-page: 91 issue: 2 year: 2013 ident: 1 article-title: The evaluation of the TPM synchronization on the basis of their outputs publication-title: Journal of Achievements in Materials and Manufacturing Engineering contributor: fullname: M. Dolecki – ident: 26 – ident: 24 doi: 10.1007/s11128-019-2296-4 – start-page: 422 ident: 12 article-title: Neural synchronization by mutual learning using genetic approach for secure key generation contributor: fullname: S. Santhanalakshmi – ident: 19 doi: 10.1103/physreve.75.056104 – ident: 21 doi: 10.11591/ijai.v8.i1.pp44-53 – ident: 10 doi: 10.1103/physreve.69.066137 – volume: 21 start-page: 371 issue: 2 year: 2020 ident: 22 article-title: Enhancing IoT security using multi-layer feedforward neural network with tree parity machine elements publication-title: International Journal of Simulation Systems, Science & Technology contributor: fullname: E. Shishniashvili – ident: 20 doi: 10.1007/s11042-019-08454-8 – volume: 8 start-page: 3140 issue: 5 year: 2019 ident: 15 article-title: Vectorized neural key exchange using tree parity machine publication-title: Compusoft contributor: fullname: S. Chourasia |
SSID | ssj0061474 |
Score | 2.209478 |
Snippet | The synchronization between two neural networks by mutual learning can be used to design the neural key exchange protocol. The critical issue is how to... |
SourceID | proquest crossref hindawi emarefa |
SourceType | Aggregation Database Publisher |
StartPage | 1 |
SubjectTerms | Communication Cooperation Cryptography Efficiency Evaluation Exchanging Genetic algorithms Neural networks Protocol Security Synchronism Weight |
SummonAdditionalLinks | – databaseName: Hindawi Publishing Open Access dbid: RHX link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEF5soaAH8W21yh7qMZhkd7PJsUhLUSpSLfQWsi_swUTaiPbfO5ts8NGD3hJI5vDt7Hwz-_gGoT4PYx36UnmJAQ-2re49YWyVIohJEiGYrprBTO6j8YzeztnciSStNrfwge1see5fx7FVcYlbqBXHdv5Nx_Mm4ALBcLd5bI_-BLQ53_7r3x_M09EvGTwAHXWebfH7vtgIxhXDjPbQrksN8aAey320pfMDtPNNMPAQTQc5rpcBtMKTqvkzLgs8rCW7NYZsDj-uc1kp3tYXLPEix1aBAyzf6TUeftRXffHDsigL8IIjNBsNn27GnuuK4EkS-aUHmAueMa2sUl_iq0AyJZmVCYsgl5JQcaoMeJ-JgAeGc2OyQPhCmlBFoeGUkWPUzotcnyLMqAaCzzIYLUMJpYk0kEAwRQgRKhFRF101iKWvtfhFWhUNjKUW2dQh20UnDs6vz0IIXz7vor6D9w8DvQb71M2hVRpWW7iQcdGz_1k5R9v2tV4g6aF2uXzTF5AylOKycphPAS223Q priority: 102 providerName: Hindawi Publishing |
Title | An Improved Method to Evaluate the Synchronization in Neural Key Exchange Protocol |
URI | https://search.emarefa.net/detail/BIM-1208807 https://dx.doi.org/10.1155/2020/8869688 https://www.proquest.com/docview/2458476154 |
Volume | 2020 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwhV1LS8NAEB60paAH8W21yh7qMZjX5nESldSitJRqobeQfaEHE20j6r93NtmgIugtIWEOM7Pz3m8A-qEbSdfmwooVarBedW8xpbMU5qk4ZozKahnMaBwMZ_7NnM5NwW1pxiobm1gZalFwXSM_c6uGHvpf__z5xdJbo3R31azQWIW2i5mC24L2ZTKeTBtbjL4nNH1lPRXk-M3oO6U667fPokiDw0Q_nFJHPmX4gJ6q86Dz4rfHX3a6cj6DTdgwUSO5qMW8BSsy34b1b1iCOzC9yEldIZCCjKq90KQsSFKjeUuCgR65-8h5BYZb370kjznR4BxI-VZ-kOS9vgVMJouiLFBBdmE2SO6vhpZZmGBxL7BLC8XBwoxKoUH8Yls4nApONYJYgGEWx2RUZBgSUOaEjgpDpTKH2YwrVwSuCn3q7UErL3J5AIT6En1_lqEgle_5fswVxhZUeJ7HRMyCLpw2HEufa1yMtMonKE01Z1PD2S7sG3Z-_eaiZbPDLvQNe_8h0Gt4n5rjtUy_lOHw789HsKaJ1TWTHrTKxas8xiiiZCewGg2uT4zC4Nt0OP8EBr_EUw |
link.rule.ids | 315,783,787,866,881,4033,12779,21402,27937,27938,27939,33387,33758,43614,43819 |
linkProvider | ProQuest |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwhV1LS8NAEF60UtSD-LZadQ_1GMxjN2lOUqS12geiLfQWsi_swaS2Ee2_dzbZUEXQW0jCHGZn5z3fINQI3KZ0bS6sUIEE61X3FlM6SmGeCkPGqMyXwQyGfndMHiZ0YhJuC9NWWerEXFGLlOsc-bWbF_TA_pKb2Zult0bp6qpZobGONogHhkZPinfuSk0MLwJTVdY9QQ4pG98p1TG_fd1samiY5g-TVJWvMTyAnaq-6Kj4Y_pLS-emp7OLdozPiFvFIe-hNZnso-1vSIIH6KmV4CI_IAUe5FuhcZbidoHlLTG4efh5mfAcCreYvMTTBGtoDqDck0vc_ixmgPHjPM1SEI9DNO60R7ddy6xLsLjn25kFh8GCmEqhIfxCWzicCk41fpgPThaHUFTE4BBQ5gSOCgKlYofZjCtX-K4KCPWOUCVJE3mCMCUSLH8cwzEq4hEScgWeBRWe5zERMr-GrkqORbMCFSPKowlKI83ZyHC2ho4NO1e_uaDX7KCGGoa9_xCol7yPzOVaRCtROP378yXa7I4G_ah_P-ydoS1NuMie1FElm7_Lc_AnMnaRC80X0JvD5Q |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+Improved+Method+to+Evaluate+the+Synchronization+in+Neural+Key+Exchange+Protocol&rft.jtitle=Security+and+communication+networks&rft.au=Zhu%2C+Shuai+Shuai&rft.au=Li%2C+Zhe&rft.au=Li%2C+Yu&rft.au=Han%2C+Yi+Liang&rft.date=2020&rft.pub=Hindawi+Publishing+Corporation&rft.issn=1939-0114&rft.eissn=1939-0122&rft.volume=2020&rft.issue=2020&rft.spage=1&rft.epage=10&rft_id=info:doi/10.1155%2F2020%2F8869688&rft.externalDBID=ADJCN&rft.externalDocID=1208807 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1939-0114&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1939-0114&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1939-0114&client=summon |