PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Distribution of the tree parity machine synchronization time

Autorzy
Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Neural networks’ synchronization by mutual learning discovered and described by Kanter et al. [12] can be used to construct relatively secure cryptographic key exchange protocol in the open channel. This phenomenon based on simple mathematical operations, can be performed fast on a computer. The latter makes it competitive to the currently used cryptographic algorithms. An additional advantage is the easiness in system scaling by adjusting neutral network’s topology, what results in satisfactory level of security [24] despite different attack attempts [12, 15]. With the aid of previous experiments, it turns out that the above synchronization procedure is a stochastic process. Though the time needed to achieve compatible weights vectors in both partner networks depends on their topology, the histograms generated herein render similar distribution patterns. In this paper the simulations and the analysis of synchronizations’ time are performed to test whether these histograms comply with histograms of a particular well-known statistical distribution. As verified in this work, indeed they coincide with Poisson distribution. The corresponding parameters of the empirically established Poisson distribution are also estimated in this work. Evidently the calculation of such parameters permits to assess the probability of achieving both networks’ synchronization in a given time only upon resorting to the generated distribution tables. Thus, there is no necessity of redoing again time-consuming computer simulations.
Słowa kluczowe
Twórcy
autor
  • Faculty of Mathematics, IT and Landscape Architecture, The John Paul II Katholic University of Lublin, ul. Konstantynów 1H, 20-708 Lublin, Poland
autor
  • Faculty of Applied Informatics and Mathematics, Warsaw University of Life Sciences – SGGW, ul. Nowoursy-nowska 159, 02-776 Warsaw, Poland
Bibliografia
  • 1. Barker E., Barker W., Burr W., Polk W., Smid M.: Recommendation for Key Management, Part 1: General (Revision 3). National Institute of Standards and Technology Special Publication 800-57, 2012.
  • 2. Bisalapur S.: Design of an efficient neural key distribution center. International Journal of Artificial Intelligence & Applications, 2(1), 2011, 60–69.
  • 3. Charlak M., Jakubowski M.: Porównanie systemów rozmytych i sztucznych sieci neuronowych. Advances in Science and Technology – Research Journal, 4, 2010, 54–64.
  • 4. Dolecki M.: Tree Parity Machine synchronization time – statistical analysis. Труды БГТУ, Серия Математика, Физика, Информатика, 6(153), Mińsk, 2012, 149–151.
  • 5. Gardiner V., Gardiner G.: Analysis of Frequency Distributions. Geo Abstracts, University of East Anglia, 1979.
  • 6. Gil A., Karoń T.: Analiza środków i metod ochrony systemów operacyjnych. Advances in Science and Technology – Research Journal, 12, 2012, 149–168.
  • 7. Greń J.: Statystyka matematyczna modele i zadania Warszawa, 1978.
  • 8. Hassoun M.: Fundamentals of Artificial Neural Networks. MIT Press, 1995.
  • 9. Ibrachim S., Maarof M.: A review on biological inspired computation in cryptology. Jurnal Teknologi Maklumat, 17(1), 2005, 90-98.
  • 10. Imam N., Cleland T., Manohar R., Merolla P., Arthur J., Akopyan F., Modha D.: Implementation of olfactory bulb glomerular-layer computations in a digital neurosynaptic core. Frontiers in Neuroscience, 6(83), 2012
  • 11. Kanter I., Kinzel W.: The theory of neural networks and cryptography. Proceedings of the XXII Solvay Conference on Physics on the Physics of Communication, 2002, 631-644.
  • 12. Kanter I., Kinzel W., Kanter E.: Secure exchange of information by synchronization of neural networks. Europhysics Letters, 57, 2002, 141-147.
  • 13. Kinzel W., Kanter I.: Neural cryptography. Condmat 0208453, 2002.
  • 14. Klein E., Mislovaty R., Kanter I., Ruttor A., Kinzel W.: Synchronization of neural networks by mutual learning and its application to cryptography. Advances in Neural Information Processing Systems, 17, MIT Press, Cambridge, 2005, 689-696.
  • 15. Klimov A., Mityagin A., Shamir A.: Analysis of neural cryptography. In: Y. Zheng (ed.), Advances in Cryptology – ASIACRYPT 2002, Springer, 2003, 288-289.
  • 16. Lenik K., Korga S.: FEM applications to model friction processes in plastic strain conditions. Archives of Materials Science and Engineering, 41, 2010, 121–124.
  • 17. Lula P.: Sztuczne sieci neuronowe jako narzędzie analiz typu data mining. Data mining: metody i przykłady, StatSoft, 2002.
  • 18. Markram M.: The Blue Brain Project. Nature Reviews Neuroscience 7, 2006, 153-160.
  • 19. McCulloch W.: A logical calculus of the ideas immanent in nervous activity. Bulletin of Mathematical Biophysics, 5, 1943, 115-133.
  • 20. Menezes A., Vanstone S., Van Oorschot P.: Handbook of Applied Cryptography, CRC Press, 1996
  • 21. Osowski S.: Sieci neuronowe w ujęciu algorytmicznym, WNT, 1996.
  • 22. Rutkowski L.: Metody i techniki sztucznej inteligencji, PWN, Warszawa 2006.
  • 23. Ruttor A.: Neural Synchronization and Cryptography, PhD thesis, Wurzburg 2006.
  • 24. Ruttor A., Kinzel W., Naeh R., Kanter I.: Genetic attack on neural cryptography, Phys. Rev. E, 73(3):036121, 2006.
  • 25. Stokłosa J., Bilski T., Pankowski T.: Bezpieczeństwo danych w systemach informatycznych, PWN, Warszawa 2001.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-cf4f508a-3f0a-4749-8c7c-2714b6d8dadf
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.