Learn More
Two neural networks that are trained on their mutual output synchronize to an identical time dependant weight vector. This novel phenomenon can be used for creation of a secure cryptographic secret-key using a public channel. Several models for this cryptographic system have been suggested, and have been tested for their security under different(More)
The disinfection of drinking water by chlorination has in recent years come under closer scrutiny because of the potential hazards associated with the production of stable chlorinated organic chemicals. Organic chemical contaminants are common to all water supplies and it is now well-established that chlorinated by-products are obtained under conditions of(More)
Mutual learning of a pair of tree parity machines with continuous and discrete weight vectors is studied analytically. The analysis is based on a mapping procedure that maps the mutual learning in tree parity machines onto mutual learning in noisy perceptrons. The stationary solution of the mutual learning in the case of continuous tree parity machines(More)
Measurement of Enhanced Dynamic Wedge parameters requires that the dose at a measurement point be integrated during the entire exposure as the moving jaw closes to form the dose distribution. This major difference from static fields, where dose rate measurements can be made using a single moving probe, requires major modification in measurement techniques(More)
Two different kinds of synchronization have been applied to cryptography: synchronization of chaotic maps by one common external signal and synchronization of neural networks by mutual learning. By combining these two mechanisms, where the external signal to the chaotic maps is synchronized by the nets, we construct a hybrid network which allows a secure(More)
A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of(More)
We present a key-exchange protocol that comprises two parties with chaotic dynamics that are mutually coupled and undergo a synchronization process, at the end of which they can use their identical dynamical state as an encryption key. The transferred coupling- signals are based nonlinearly on time-delayed states of the parties, and therefore they conceal(More)
The dynamics of two mutually coupled chaotic diode lasers are investigated experimentally and numerically. By adding self-feedback to each laser, stable isochronal synchronization is established. This stability, which can be achieved for symmetric operation, is essential for constructing an optical public-channel cryptographic system. The experimental(More)
We study the mutual coupling of chaotic lasers and observe both experimentally and in numeric simulations that there exists a regime of parameters for which two mutually coupled chaotic lasers establish isochronal synchronization, while a third laser coupled unidirectionally to one of the pair does not synchronize. We then propose a cryptographic scheme,(More)