VECTORIZED NEURAL KEY EXCHANGE USING TREE PARITY MACHINE
The communication boom in the past few decades has resulted in a large flow of data. This entails the need for having high security and privacy with regards to data confidentiality and authenticity. One method of doing so is by utilizing a synchronized key. In the domain of cryptography there exist...
Saved in:
Published in | Compusoft: an international journal of advanced computer technology Vol. 8; no. 5; pp. 3140 - 3145 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
Mumbai
COMPUSOFT, An International Journal of Advanced Computer Technology
01.05.2019
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | The communication boom in the past few decades has resulted in a large flow of data. This entails the need for having high security and privacy with regards to data confidentiality and authenticity. One method of doing so is by utilizing a synchronized key. In the domain of cryptography there exist several methods of key generation, one such method is the tree parity machine (TPM) involving neural cryptography. In our paper, we provide a novel vectorized TPM (vTPM) in order to develop a key. We have also provided a system to detect any unwanted listeners, as one of the weakness of the TPM algorithm is Man in the middle attacks. We have further utilized this key for authentication between a sender and a receiver. The authentication is carried out by means of H-MAC with the SHA-512 hashing mechanism. Finally, a comparison is drawn out between the serial and vector implementation of the Tree Parity Machine. |
---|---|
ISSN: | 2320-0790 |