VECTORIZED NEURAL KEY EXCHANGE USING TREE PARITY MACHINE

The communication boom in the past few decades has resulted in a large flow of data. This entails the need for having high security and privacy with regards to data confidentiality and authenticity. One method of doing so is by utilizing a synchronized key. In the domain of cryptography there exist...

Full description

Saved in:
Bibliographic Details
Published inCompusoft: an international journal of advanced computer technology Vol. 8; no. 5; pp. 3140 - 3145
Main Authors Chourasia, Smruti, Bharadwaj, Hrishikesh C, Das, Queenie, Agarwal, Krati, Lavanya, K
Format Journal Article
LanguageEnglish
Published Mumbai COMPUSOFT, An International Journal of Advanced Computer Technology 01.05.2019
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The communication boom in the past few decades has resulted in a large flow of data. This entails the need for having high security and privacy with regards to data confidentiality and authenticity. One method of doing so is by utilizing a synchronized key. In the domain of cryptography there exist several methods of key generation, one such method is the tree parity machine (TPM) involving neural cryptography. In our paper, we provide a novel vectorized TPM (vTPM) in order to develop a key. We have also provided a system to detect any unwanted listeners, as one of the weakness of the TPM algorithm is Man in the middle attacks. We have further utilized this key for authentication between a sender and a receiver. The authentication is carried out by means of H-MAC with the SHA-512 hashing mechanism. Finally, a comparison is drawn out between the serial and vector implementation of the Tree Parity Machine.
ISSN:2320-0790