Tytuł artykułu
Autorzy
Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
Purpose: Tree Parity Machines are specific artificial neural networks used to construct relatively secure key exchange protocol [12,15,24]. The level of networks’ compatibility is measured by weight vectors mutual overlap. However, to calculate such mutual overlap, one needs to be familiar with both weights’ vectors, which is impossible in practical key exchange. This paper discusses other schemes to evaluate compatibility of weights’ vectors. The first one uses Euclidean distance of both weights’ vectors. The second one is based on frequencies of common TPM’s outputs and as such does not rely on the weights’ vectors. Both approaches to handle secure key exchange protocol facilitate more extended analysis of many technical processes in which a vital role plays an incorporation of a non-standard high-quality method securing any sensitive data. Design/methodology/approach: Computer simulations of TPM synchronization are conducted using authors’ program and the obtained results are statistically analyzed herein. Findings: We found experimentally that mutual overlap of the weights’ vectors is highly correlated with Euclidean distance. Additionally, frequencies of common outputs in given numbers of learning cycles stay in high correlation with this mutual overlap and Euclidean distance. The latter can subsequently be used to draw pertinent conclusions about TPM’s weights compatibility. Practical implications: Proposed methods, especially frequencies analysis, can be applied to key exchange protocol to improve its security. Determining the vectors compatibility level before synchronization completion allows qualifying this synchronization to one of the possible time classes. Originality/value: New ideas presented in this work involve application of Euclidean distance and common output frequencies to calculate the networks compatibility given by weights mutual overlap.
Wydawca
Rocznik
Tom
Strony
91--98
Opis fizyczny
Bibliogr. 26 poz., rys., tab.
Twórcy
autor
- Faculty of Mathematics, IT and Landscape Architecture, John Paul II Catholic University of Lublin, ul. Konstantynów 1h, 20-708 Lublin, Poland
autor
- Faculty of Applied Informatics and Mathematics, Warsaw University of Life Sciences - SGGW, ul. Nowoursynowska 159, 02-776 Warszawa, Poland
autor
- Department of Fundamental Technics, Lublin University of Technology, ul. Nadbystrzycka 38, 20-618 Lublin, Poland
Bibliografia
- [1] L.A. Dobrzański, R. Honysz, Informative technologies in the material products designing, Archives of Materials Science and Engineering 55/1 (2012) 37-44.
- [2] L.A. Dobrzański, R. Honysz, Application of artificial neural networks in modelling of quenched and tempered structural steels mechanical properties, Journal of Achievements in Materials and Manufacturing Engineering 40/1 (2010) 50-57.
- [3] L.A. Dobrzański, R. Maniara, J.H. Sokolowski, W. Kasprzak, M. Krupiński, Z. Brytan, Applications of the artifcial intelligence methods for modeling of the ACAlSi7Cu alloy crystallization process, Journal of Materials Processing Technology 192-193 (2007) 582-587.
- [4] L.A. Dobrzański, M. Staszuk, R. Honysz, Application of artificial intelligence methods in PVD and CVD coatings properties modelling, Archives of Materials Science and Engineering 58/2 (2012) 152-157.
- [5] L.A. Dobrzański, M. Staszuk, R. Honysz, Application of artificial neural networks in properties modelling of PVD and CVD coatings, Archives of Computational Materials Science and Surface Engineering 2/3 (2010) 141-148.
- [6] A. Dobrzańska-Danikiewicz, E-foresight of materials surface engineering, Archives of Materials Science and Engineering 44/1 (2010) 43-50.
- [7] A. Dobrzańska-Danikiewicz, L.A. Dobrzański, J. Mazurkiewicz, B. Tomiczek, Ł. Reimann, E-transfer of materials surface engineering e-foresight results, Archives of Materials Science and Engineering 52/2 (2011) 87-100.
- [8] M. Dolecki, Tree Parity Machine synchronization time - statistical analysis, Mathematics, Physics and Informatics Series 6-153 (2012) 149-151.
- [9] A. Gil, T. Karoń, Analysis of means and methods of protection the operating systems, Advances in Science and Technology 12 (2012) 149-168 (in Polish).
- [10] M. Hassoun, Fundamentals of artificial neural networks, MIT Press, 1995.
- [11] I. Kanter, W. Kinzel, The theory of neural networks and cryptography, Proceeding of the XXII Solvay Conference on Physics, The Physics of Communication, 2003, 631-644.
- [12] I. Kanter, W. Kinzel, E. Kanter, Secure exchange of information by synchronization of neural networks, Europhys Letters 57 (2002) 141-147.
- [13] I. Kanter, W. Kinzel, Neural cryptography, Proceedings of the 9th International Conference on Neural Information Processing 3 (2002) 1351-1354.
- [14] E. Klein, R. Mislovaty, I. Kanter, A. Ruttor, W. Kinzel, Synchronization of neural networks by mutual learning and its application to cryptography, Advances in Neural Information Processing Systems, MIT Press Cambridge 17 (2005) 689-696.
- [15] A. Klimov, A. Mityagin, A. Shamir, Analysis of neural cryptography, Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security ASIACRYPT’2002, Queenstown, 2003, 287-298.
- [16] J. Konieczny, Application of the artificial neural networks for prediction of hardness of alloyed copper, Journal of Achievements in Materials and Manufacturing Engineering 55/2 (2012) 529-535.
- [17] W. Kwaśny, W. Sitek, L.A. Dobrzański, Modelling of properties of the PVD coatings using neural networks, Journal of Achievements in Materials and Manufacturing, Engineering 24/2 (2007) 163-166.
- [18] K. Lenik, Coat wear-resistant materials on the basis of Fe-Mn-C-B, National Academy of Ukrainian Science, Institute of Material Sciences, Lviv, 2004, 1-285.
- [19] A. Menezes, S. Vanstone, P. Van Oorschot, Handbook of applied cryptography, CRC Press, 1996.
- [20] S. Osowski, Neural networks in algorithmic approach, Publishing House WNT, 1996 (in Polish).
- [21] A. Popko, K. Lenik, Integrated information systems, Information Technology in Teaching, Lublin Scientific Society LTN (2006) 127-133 (in Polish).
- [22] L. Rutkowski, Methods and Technics of Artificial Intelligence, Publishing House PWN, Warsaw, 2006 (in Polish).
- [23] A. Ruttor, Neural synchronization and cryptography, Ph.D. thesis, Wurzburg, 2006.
- [24] A. Ruttor, W. Kinzel, R. Naeh, I. Kanter, Genetic attack on neural cryptography, Physical Review E 73-3 (2006) 036121-1-8.
- [25] R. Rząsiński, Databases and computer programs selection of technological features, Journal of Achievements in Materials and Manufacturing Engineering 49/2 (2011) 350-359.
- [26] J. Stokłosa, T. Bilski, T. Pankowski, Data Security in Informatical Systems, Publishing House PWN, 2001 (in Polish).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-c26c5b9b-068a-4cb3-9686-772d1f1831ee