• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

神经密码学的动力学

Dynamics of neural cryptography.

作者信息

Ruttor Andreas, Kinzel Wolfgang, Kanter Ido

机构信息

Institut für Theoretische Physik, Universität Würzburg, Am Hubland, 97074 Würzburg, Germany.

出版信息

Phys Rev E Stat Nonlin Soft Matter Phys. 2007 May;75(5 Pt 2):056104. doi: 10.1103/PhysRevE.75.056104. Epub 2007 May 9.

DOI:10.1103/PhysRevE.75.056104
PMID:17677130
Abstract

Synchronization of neural networks has been used for public channel protocols in cryptography. In the case of tree parity machines the dynamics of both bidirectional synchronization and unidirectional learning is driven by attractive and repulsive stochastic forces. Thus it can be described well by a random walk model for the overlap between participating neural networks. For that purpose transition probabilities and scaling laws for the step sizes are derived analytically. Both these calculations as well as numerical simulations show that bidirectional interaction leads to full synchronization on average. In contrast, successful learning is only possible by means of fluctuations. Consequently, synchronization is much faster than learning, which is essential for the security of the neural key-exchange protocol. However, this qualitative difference between bidirectional and unidirectional interaction vanishes if tree parity machines with more than three hidden units are used, so that those neural networks are not suitable for neural cryptography. In addition, the effective number of keys which can be generated by the neural key-exchange protocol is calculated using the entropy of the weight distribution. As this quantity increases exponentially with the system size, brute-force attacks on neural cryptography can easily be made unfeasible.

摘要

神经网络同步已被用于密码学中的公共信道协议。对于树奇偶校验机,双向同步和单向学习的动态过程都由吸引和排斥随机力驱动。因此,它可以通过参与神经网络之间重叠的随机游走模型很好地描述。为此,通过解析推导了步长的转移概率和缩放定律。这些计算以及数值模拟都表明,双向交互平均会导致完全同步。相比之下,只有通过波动才能成功学习。因此,同步比学习快得多,这对于神经密钥交换协议的安全性至关重要。然而,如果使用具有三个以上隐藏单元的树奇偶校验机,双向和单向交互之间的这种定性差异就会消失,因此这些神经网络不适用于神经密码学。此外,使用权重分布的熵来计算神经密钥交换协议可以生成的有效密钥数量。由于这个量随系统大小呈指数增长,对神经密码学的暴力攻击很容易变得不可行。

相似文献

1
Dynamics of neural cryptography.神经密码学的动力学
Phys Rev E Stat Nonlin Soft Matter Phys. 2007 May;75(5 Pt 2):056104. doi: 10.1103/PhysRevE.75.056104. Epub 2007 May 9.
2
Genetic attack on neural cryptography.
Phys Rev E Stat Nonlin Soft Matter Phys. 2006 Mar;73(3 Pt 2):036121. doi: 10.1103/PhysRevE.73.036121. Epub 2006 Mar 17.
3
Neural cryptography with feedback.
Phys Rev E Stat Nonlin Soft Matter Phys. 2004 Apr;69(4 Pt 2):046110. doi: 10.1103/PhysRevE.69.046110. Epub 2004 Apr 27.
4
Step to improve neural cryptography against flipping attacks.提高神经密码学抵御翻转攻击能力的步骤。
Int J Neural Syst. 2004 Dec;14(6):393-405. doi: 10.1142/S0129065704002145.
5
Mutual learning in a tree parity machine and its application to cryptography.
Phys Rev E Stat Nonlin Soft Matter Phys. 2002 Dec;66(6 Pt 2):066135. doi: 10.1103/PhysRevE.66.066135. Epub 2002 Dec 30.
6
Permutation parity machines for neural cryptography.
Phys Rev E Stat Nonlin Soft Matter Phys. 2010 Jun;81(6 Pt 2):066117. doi: 10.1103/PhysRevE.81.066117. Epub 2010 Jun 22.
7
Neural Cryptography Based on Complex-Valued Neural Network.基于复值神经网络的神经密码学。
IEEE Trans Neural Netw Learn Syst. 2020 Nov;31(11):4999-5004. doi: 10.1109/TNNLS.2019.2955165. Epub 2020 Oct 29.
8
Approach to design neural cryptography: a generalized architecture and a heuristic rule.神经密码学的设计方法:一种通用架构和启发式规则。
Phys Rev E Stat Nonlin Soft Matter Phys. 2013 Jun;87(6):062804. doi: 10.1103/PhysRevE.87.062804. Epub 2013 Jun 12.
9
Public channel cryptography by synchronization of neural networks and chaotic maps.
Phys Rev Lett. 2003 Sep 12;91(11):118701. doi: 10.1103/PhysRevLett.91.118701.
10
Secure key-exchange protocol with an absence of injective functions.
Phys Rev E Stat Nonlin Soft Matter Phys. 2002 Dec;66(6 Pt 2):066102. doi: 10.1103/PhysRevE.66.066102. Epub 2002 Dec 4.

引用本文的文献

1
State-of-the-art session key generation on priority-based adaptive neural machine (PANM) in telemedicine.远程医疗中基于优先级的自适应神经网络(PANM)上的先进会话密钥生成
Neural Comput Appl. 2023;35(13):9517-9533. doi: 10.1007/s00521-022-08169-2. Epub 2023 Mar 22.