An Improved Method to Evaluate the Synchronization in Neural Key Exchange Protocol

The synchronization between two neural networks by mutual learning can be used to design the neural key exchange protocol. The critical issue is how to evaluate the synchronization without a weight vector. All existing methods have a delay in evaluating the synchronization, which affects the securit...

Full description

Saved in:
Bibliographic Details
Published inSecurity and communication networks Vol. 2020; no. 2020; pp. 1 - 10
Main Authors Zhu, Shuai Shuai, Li, Zhe, Li, Yu, Han, Yi Liang
Format Journal Article
LanguageEnglish
Published Cairo, Egypt Hindawi Publishing Corporation 2020
Hindawi
Hindawi Limited
Subjects
Online AccessGet full text

Cover

Loading…
Abstract The synchronization between two neural networks by mutual learning can be used to design the neural key exchange protocol. The critical issue is how to evaluate the synchronization without a weight vector. All existing methods have a delay in evaluating the synchronization, which affects the security of the neural key exchange. To evaluate the full synchronization of neural networks more timely and accurately, an improved method for evaluating the synchronization is proposed. First, the frequency that the two networks have the same output in previous steps is used for assessing the degree of them roughly. Second, the hash function is utilized to judge whether the two networks have achieved full synchronization precisely when the degree exceeds a given threshold. The improved method can find the full synchronization between two networks with no information other than the hash value of the weight vector. Compared with other methods, the full synchronization can be detected earlier by two communication partners which adopt the method proposed in this paper. As a result, the successful probability of geometric is reduced. Therefore, the proposed method can enhance the security of the neural exchange protocol.
AbstractList The synchronization between two neural networks by mutual learning can be used to design the neural key exchange protocol. The critical issue is how to evaluate the synchronization without a weight vector. All existing methods have a delay in evaluating the synchronization, which affects the security of the neural key exchange. To evaluate the full synchronization of neural networks more timely and accurately, an improved method for evaluating the synchronization is proposed. First, the frequency that the two networks have the same output in previous steps is used for assessing the degree of them roughly. Second, the hash function is utilized to judge whether the two networks have achieved full synchronization precisely when the degree exceeds a given threshold. The improved method can find the full synchronization between two networks with no information other than the hash value of the weight vector. Compared with other methods, the full synchronization can be detected earlier by two communication partners which adopt the method proposed in this paper. As a result, the successful probability of geometric is reduced. Therefore, the proposed method can enhance the security of the neural exchange protocol.
Author Li, Yu
Han, Yi Liang
Li, Zhe
Zhu, Shuai Shuai
Author_xml – sequence: 1
  fullname: Zhu, Shuai Shuai
– sequence: 2
  fullname: Li, Zhe
– sequence: 3
  fullname: Li, Yu
– sequence: 4
  fullname: Han, Yi Liang
BookMark eNqF0DtPwzAUBWALFYm2sDEjS4wQajt-ZayqAhXlIR5z5DgOSdXaxXEK5deTKhWMTPcOn869OgPQs84aAE4xusKYsRFBBI2k5AmX8gD0cRInEcKE9H53TI_AoK4XCHFMBe2D57GFs9Xau43J4b0JpcthcHC6UctGBQNDaeDL1urSO1t9q1A5CysLH0zj1RLemS2cfulS2XcDn7wLTrvlMTgs1LI2J_s5BG_X09fJbTR_vJlNxvNIxxyFyGidCcVMTgVLEpRjzXLNMKecM0J0LONcISFZhgUuhCgKhTOU6YLknBSCsngIzrvc9vuPxtQhXbjG2_ZkSiiTVHDMaKsuO6W9q2tvinTtq5Xy2xSjdNdaumst3bfW8ouOl5XN1Wf1nz7rtGmNKdSfJkhKJOIf4Fd3WQ
CitedBy_id crossref_primary_10_1007_s00521_022_08169_2
crossref_primary_10_1007_s11277_023_10362_y
Cites_doi 10.1109/TNNLS.2019.2955165
10.32628/ijsrset196550
10.1209/epl/i2002-00552-9
10.5815/ijcnis.2019.10.06
10.5937/vojtehg64-8877
10.1088/1742-5468/2005/01/p01009
10.1007/s11128-019-2296-4
10.1103/physreve.75.056104
10.11591/ijai.v8.i1.pp44-53
10.1103/physreve.69.066137
10.1007/s11042-019-08454-8
ContentType Journal Article
Copyright Copyright © 2020 Yi Liang Han et al.
Copyright © 2020 Yi Liang Han et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0
Copyright_xml – notice: Copyright © 2020 Yi Liang Han et al.
– notice: Copyright © 2020 Yi Liang Han et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0
DBID ADJCN
RHU
RHW
RHX
AAYXX
CITATION
7SC
7SP
8FD
8FE
8FG
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
L7M
L~C
L~D
P5Z
P62
PIMPY
PQEST
PQQKQ
PQUKI
PRINS
DOI 10.1155/2020/8869688
DatabaseName الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals
Hindawi Publishing Complete
Hindawi Publishing Subscription Journals
Hindawi Publishing Open Access
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni Edition)
ProQuest Central UK/Ireland
Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Central
Technology Collection
ProQuest One Community College
ProQuest Central Korea
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
Publicly Available Content Database
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
DatabaseTitle CrossRef
Publicly Available Content Database
Computer Science Database
ProQuest Central Student
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest Central Korea
Advanced Technologies Database with Aerospace
Advanced Technologies & Aerospace Collection
ProQuest One Academic Eastern Edition
Electronics & Communications Abstracts
ProQuest Technology Collection
ProQuest SciTech Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
ProQuest One Academic
DatabaseTitleList CrossRef

Publicly Available Content Database

Database_xml – sequence: 1
  dbid: RHX
  name: Hindawi Publishing
  url: http://www.hindawi.com/journals/
  sourceTypes: Publisher
– sequence: 2
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1939-0122
Editor Anees, Amir
Editor_xml – sequence: 1
  givenname: Amir
  surname: Anees
  fullname: Anees, Amir
– fullname: Amir Anees
EndPage 10
ExternalDocumentID 10_1155_2020_8869688
1208807
GrantInformation_xml – fundername: National Natural Science Foundation of China
  grantid: 61572521
– fundername: People's Armed Police Force
  grantid: KYTD201805
GroupedDBID .4S
.DC
05W
0R~
123
1OC
24P
31~
3SF
4.4
52U
5DZ
66C
8-1
8UM
AAESR
AAEVG
AAFWJ
AAJEY
AAONW
AAZKR
ACBWZ
ACGFO
ACXQS
ADBBV
ADIZJ
ADJCN
AEIMD
AENEX
AFBPY
AFKRA
AJXKR
ALMA_UNASSIGNED_HOLDINGS
AMBMR
ARAPS
ARCSS
ASPBG
ATUGU
AVWKF
AZFZN
AZVAB
BCNDV
BDRZF
BENPR
BGLVJ
BHBCM
BNHUX
BOGZA
BRXPI
CCPQU
CS3
DR2
DU5
EBS
EIS
EJD
F1Z
FEDTE
G-S
GODZA
GROUPED_DOAJ
H13
HCIFZ
HVGLF
HZ~
IAO
ICD
ITC
IX1
K7-
LH4
LITHE
LW6
MY.
MY~
NNB
O9-
OIG
OK1
P2P
PIMPY
RHX
ROL
SUPJJ
TH9
TUS
W99
WBKPD
XV2
RHU
RHW
AAYXX
CITATION
7SC
7SP
8FD
8FE
8FG
ABUWG
AZQEC
DWQXO
GNUQQ
JQ2
L7M
L~C
L~D
P62
PQEST
PQQKQ
PQUKI
PRINS
ID FETCH-LOGICAL-c360t-eccb7a5ed475990d1c5dc516466522c383da0785b171f77ffa1b0bcf2d62f7453
IEDL.DBID BENPR
ISSN 1939-0114
IngestDate Thu Oct 10 15:36:21 EDT 2024
Thu Sep 26 17:36:42 EDT 2024
Sun Jun 02 18:51:24 EDT 2024
Thu Sep 12 21:20:35 EDT 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 2020
Language English
License This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c360t-eccb7a5ed475990d1c5dc516466522c383da0785b171f77ffa1b0bcf2d62f7453
ORCID 0000-0003-2557-6180
0000-0001-6402-9660
0000-0002-1534-5509
0000-0002-2116-5408
OpenAccessLink https://www.proquest.com/docview/2458476154?pq-origsite=%requestingapplication%
PQID 2458476154
PQPubID 1046363
PageCount 10
ParticipantIDs proquest_journals_2458476154
crossref_primary_10_1155_2020_8869688
hindawi_primary_10_1155_2020_8869688
emarefa_primary_1208807
PublicationCentury 2000
PublicationDate 2020-00-00
PublicationDateYYYYMMDD 2020-01-01
PublicationDate_xml – year: 2020
  text: 2020-00-00
PublicationDecade 2020
PublicationPlace Cairo, Egypt
PublicationPlace_xml – name: Cairo, Egypt
– name: London
PublicationTitle Security and communication networks
PublicationYear 2020
Publisher Hindawi Publishing Corporation
Hindawi
Hindawi Limited
Publisher_xml – name: Hindawi Publishing Corporation
– name: Hindawi
– name: Hindawi Limited
References 24
26
M. Mehic (23)
A. M. Allam (14)
B. ÖzÇakmak (3)
S. Santhanalakshmi (12)
A. Klimov (9)
S. D. Édgar (18) 2019; 2019
P. P. Hadke (7)
M. M. Alani (4)
E. Shishniashvili (22) 2020; 21
10
11
M. Niemiec (25)
S. Chourasia (15) 2019; 8
16
17
19
M. Dolecki (1) 2013; 57
2
S. Santhanalakshmi (13)
5
6
8
20
21
References_xml – ident: 2
– start-page: 207
  ident: 13
  article-title: Analysis of neural synchronization using genetic approach for secure key generation
  contributor:
    fullname: S. Santhanalakshmi
– ident: 17
  doi: 10.1109/TNNLS.2019.2955165
– ident: 5
  doi: 10.32628/ijsrset196550
– start-page: 1
  ident: 14
  article-title: Authenticated key exchange protocol using neural cryptography with secret boundaries
  contributor:
    fullname: A. M. Allam
– start-page: 1
  ident: 25
  article-title: Security verification of artificial neural networks used to error correction in quantum cryptography
  contributor:
    fullname: M. Niemiec
– volume: 2019
  start-page: 1
  issue: 3
  year: 2019
  ident: 18
  article-title: On the development of an optimal structure of tree parity machine for the establishment of a cryptographic key
  publication-title: Security and Communication Networks
  contributor:
    fullname: S. D. Édgar
– ident: 8
  doi: 10.1209/epl/i2002-00552-9
– start-page: 288
  ident: 9
  article-title: Analysis of neural cryptography
  contributor:
    fullname: A. Klimov
– start-page: 23
  ident: 4
  article-title: Applications of machine learning in cryptography: a survey
  contributor:
    fullname: M. M. Alani
– start-page: 222
  ident: 23
  article-title: Error reconciliation in quantum key distribution protocols
  contributor:
    fullname: M. Mehic
– ident: 16
  doi: 10.5815/ijcnis.2019.10.06
– ident: 6
  doi: 10.5937/vojtehg64-8877
– start-page: 2413
  ident: 3
  article-title: Neural and quantum cryptography in big data: a review
  contributor:
    fullname: B. ÖzÇakmak
– start-page: 1
  ident: 7
  article-title: Use of neural networks in cryptography: a review
  contributor:
    fullname: P. P. Hadke
– ident: 11
  doi: 10.1088/1742-5468/2005/01/p01009
– volume: 57
  start-page: 91
  issue: 2
  year: 2013
  ident: 1
  article-title: The evaluation of the TPM synchronization on the basis of their outputs
  publication-title: Journal of Achievements in Materials and Manufacturing Engineering
  contributor:
    fullname: M. Dolecki
– ident: 26
– ident: 24
  doi: 10.1007/s11128-019-2296-4
– start-page: 422
  ident: 12
  article-title: Neural synchronization by mutual learning using genetic approach for secure key generation
  contributor:
    fullname: S. Santhanalakshmi
– ident: 19
  doi: 10.1103/physreve.75.056104
– ident: 21
  doi: 10.11591/ijai.v8.i1.pp44-53
– ident: 10
  doi: 10.1103/physreve.69.066137
– volume: 21
  start-page: 371
  issue: 2
  year: 2020
  ident: 22
  article-title: Enhancing IoT security using multi-layer feedforward neural network with tree parity machine elements
  publication-title: International Journal of Simulation Systems, Science & Technology
  contributor:
    fullname: E. Shishniashvili
– ident: 20
  doi: 10.1007/s11042-019-08454-8
– volume: 8
  start-page: 3140
  issue: 5
  year: 2019
  ident: 15
  article-title: Vectorized neural key exchange using tree parity machine
  publication-title: Compusoft
  contributor:
    fullname: S. Chourasia
SSID ssj0061474
Score 2.209478
Snippet The synchronization between two neural networks by mutual learning can be used to design the neural key exchange protocol. The critical issue is how to...
SourceID proquest
crossref
hindawi
emarefa
SourceType Aggregation Database
Publisher
StartPage 1
SubjectTerms Communication
Cooperation
Cryptography
Efficiency
Evaluation
Exchanging
Genetic algorithms
Neural networks
Protocol
Security
Synchronism
Weight
SummonAdditionalLinks – databaseName: Hindawi Publishing Open Access
  dbid: RHX
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEF5soaAH8W21yh7qMZhkd7PJsUhLUSpSLfQWsi_swUTaiPbfO5ts8NGD3hJI5vDt7Hwz-_gGoT4PYx36UnmJAQ-2re49YWyVIohJEiGYrprBTO6j8YzeztnciSStNrfwge1see5fx7FVcYlbqBXHdv5Nx_Mm4ALBcLd5bI_-BLQ53_7r3x_M09EvGTwAHXWebfH7vtgIxhXDjPbQrksN8aAey320pfMDtPNNMPAQTQc5rpcBtMKTqvkzLgs8rCW7NYZsDj-uc1kp3tYXLPEix1aBAyzf6TUeftRXffHDsigL8IIjNBsNn27GnuuK4EkS-aUHmAueMa2sUl_iq0AyJZmVCYsgl5JQcaoMeJ-JgAeGc2OyQPhCmlBFoeGUkWPUzotcnyLMqAaCzzIYLUMJpYk0kEAwRQgRKhFRF101iKWvtfhFWhUNjKUW2dQh20UnDs6vz0IIXz7vor6D9w8DvQb71M2hVRpWW7iQcdGz_1k5R9v2tV4g6aF2uXzTF5AylOKycphPAS223Q
  priority: 102
  providerName: Hindawi Publishing
Title An Improved Method to Evaluate the Synchronization in Neural Key Exchange Protocol
URI https://search.emarefa.net/detail/BIM-1208807
https://dx.doi.org/10.1155/2020/8869688
https://www.proquest.com/docview/2458476154
Volume 2020
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwhV1LS8NAEB60paAH8W21yh7qMZjX5nESldSitJRqobeQfaEHE20j6r93NtmgIugtIWEOM7Pz3m8A-qEbSdfmwooVarBedW8xpbMU5qk4ZozKahnMaBwMZ_7NnM5NwW1pxiobm1gZalFwXSM_c6uGHvpf__z5xdJbo3R31azQWIW2i5mC24L2ZTKeTBtbjL4nNH1lPRXk-M3oO6U667fPokiDw0Q_nFJHPmX4gJ6q86Dz4rfHX3a6cj6DTdgwUSO5qMW8BSsy34b1b1iCOzC9yEldIZCCjKq90KQsSFKjeUuCgR65-8h5BYZb370kjznR4BxI-VZ-kOS9vgVMJouiLFBBdmE2SO6vhpZZmGBxL7BLC8XBwoxKoUH8Yls4nApONYJYgGEWx2RUZBgSUOaEjgpDpTKH2YwrVwSuCn3q7UErL3J5AIT6En1_lqEgle_5fswVxhZUeJ7HRMyCLpw2HEufa1yMtMonKE01Z1PD2S7sG3Z-_eaiZbPDLvQNe_8h0Gt4n5rjtUy_lOHw789HsKaJ1TWTHrTKxas8xiiiZCewGg2uT4zC4Nt0OP8EBr_EUw
link.rule.ids 315,783,787,866,881,4033,12779,21402,27937,27938,27939,33387,33758,43614,43819
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwhV1LS8NAEF60UtSD-LZadQ_1GMxjN2lOUqS12geiLfQWsi_swaS2Ee2_dzbZUEXQW0jCHGZn5z3fINQI3KZ0bS6sUIEE61X3FlM6SmGeCkPGqMyXwQyGfndMHiZ0YhJuC9NWWerEXFGLlOsc-bWbF_TA_pKb2Zult0bp6qpZobGONogHhkZPinfuSk0MLwJTVdY9QQ4pG98p1TG_fd1samiY5g-TVJWvMTyAnaq-6Kj4Y_pLS-emp7OLdozPiFvFIe-hNZnso-1vSIIH6KmV4CI_IAUe5FuhcZbidoHlLTG4efh5mfAcCreYvMTTBGtoDqDck0vc_ixmgPHjPM1SEI9DNO60R7ddy6xLsLjn25kFh8GCmEqhIfxCWzicCk41fpgPThaHUFTE4BBQ5gSOCgKlYofZjCtX-K4KCPWOUCVJE3mCMCUSLH8cwzEq4hEScgWeBRWe5zERMr-GrkqORbMCFSPKowlKI83ZyHC2ho4NO1e_uaDX7KCGGoa9_xCol7yPzOVaRCtROP378yXa7I4G_ah_P-ydoS1NuMie1FElm7_Lc_AnMnaRC80X0JvD5Q
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+Improved+Method+to+Evaluate+the+Synchronization+in+Neural+Key+Exchange+Protocol&rft.jtitle=Security+and+communication+networks&rft.au=Zhu%2C+Shuai+Shuai&rft.au=Li%2C+Zhe&rft.au=Li%2C+Yu&rft.au=Han%2C+Yi+Liang&rft.date=2020&rft.pub=Hindawi+Publishing+Corporation&rft.issn=1939-0114&rft.eissn=1939-0122&rft.volume=2020&rft.issue=2020&rft.spage=1&rft.epage=10&rft_id=info:doi/10.1155%2F2020%2F8869688&rft.externalDBID=ADJCN&rft.externalDocID=1208807
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1939-0114&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1939-0114&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1939-0114&client=summon