Authenticated key exchange protocol using neural cryptography with secret boundaries

A. M. Allam, H. Abbas, M. El-Kharashi
{"title":"Authenticated key exchange protocol using neural cryptography with secret boundaries","authors":"A. M. Allam, H. Abbas, M. El-Kharashi","doi":"10.1109/IJCNN.2013.6707125","DOIUrl":null,"url":null,"abstract":"Key exchange is one of the major concerns in cryp-tology. Neural cryptography is a recent non-classical paradigm which achieves key exchange by mutual learning between two neural networks that receive the same input patterns and update their weights using specific rules. Each weight component of the network can be seen as a random walker in the weight space. The two walkers move in the weight space and reflect at two boundaries (left and right) which represent the network synaptic depth. The reflecting boundaries cause the distance between the two walkers decreases if one of them hits the boundary when a common direction is chosen at each step. Therefore, the mutual learning algorithm relies on this defined boundary condition to achieve synchronization between the two parties. In this paper, we aim to increase the security of the neural cryptography by authenticating the communication using preshared secrets. The mutual learning algorithm is modified so that the reflecting boundaries become hidden and only accessible by the two partners. New update rules are developed to exploit the secret information without adding any limitation to the initial configuration for the two parties. This is done by converting the two boundaries located at a straight line path to a one secret boundary located randomly at a circular path. Therefore, the mutual learning is impeded except this secret information is known. The proposed algorithm is called Neural Cryptography with Secret Boundaries (NCSB) and it is proved with information theory that the secret boundaries can not be revealed from the public information broadcast through the public channel.","PeriodicalId":376975,"journal":{"name":"The 2013 International Joint Conference on Neural Networks (IJCNN)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"25","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"The 2013 International Joint Conference on Neural Networks (IJCNN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IJCNN.2013.6707125","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 25

Abstract

Key exchange is one of the major concerns in cryp-tology. Neural cryptography is a recent non-classical paradigm which achieves key exchange by mutual learning between two neural networks that receive the same input patterns and update their weights using specific rules. Each weight component of the network can be seen as a random walker in the weight space. The two walkers move in the weight space and reflect at two boundaries (left and right) which represent the network synaptic depth. The reflecting boundaries cause the distance between the two walkers decreases if one of them hits the boundary when a common direction is chosen at each step. Therefore, the mutual learning algorithm relies on this defined boundary condition to achieve synchronization between the two parties. In this paper, we aim to increase the security of the neural cryptography by authenticating the communication using preshared secrets. The mutual learning algorithm is modified so that the reflecting boundaries become hidden and only accessible by the two partners. New update rules are developed to exploit the secret information without adding any limitation to the initial configuration for the two parties. This is done by converting the two boundaries located at a straight line path to a one secret boundary located randomly at a circular path. Therefore, the mutual learning is impeded except this secret information is known. The proposed algorithm is called Neural Cryptography with Secret Boundaries (NCSB) and it is proved with information theory that the secret boundaries can not be revealed from the public information broadcast through the public channel.
使用具有秘密边界的神经密码学的认证密钥交换协议
密钥交换是密码学中的主要问题之一。神经密码学是一种新兴的非经典范式,它通过接收相同输入模式的两个神经网络之间的相互学习来实现密钥交换,并使用特定的规则更新它们的权重。网络的每个权重分量都可以看作是权重空间中的一个随机漫步者。两个步行者在权重空间中移动,并在代表网络突触深度的两个边界(左和右)上反射。当每一步选择一个共同的方向时,如果其中一个步行者碰到边界,则反射边界会使两个步行者之间的距离减小。因此,互学习算法依赖于这个定义的边界条件来实现双方的同步。在本文中,我们的目标是通过使用预共享秘密来验证通信,从而提高神经密码的安全性。对互学习算法进行了改进,使反射边界变得隐藏,只有两个伙伴可以访问。在不增加双方初始配置限制的情况下,开发了新的更新规则来利用秘密信息。这是通过将位于直线路径的两个边界转换为位于圆形路径随机的一个秘密边界来实现的。因此,除非这个秘密信息是已知的,否则就会阻碍相互学习。该算法被称为带秘密边界的神经密码学(Neural Cryptography with Secret Boundaries, NCSB),并通过信息论证明了秘密边界不能从通过公共信道广播的公开信息中泄露出来。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信