Successful attack on permutation-parity-machine-based neural cryptography.

  title={Successful attack on permutation-parity-machine-based neural cryptography.},
  author={Lu{\'i}s F. Seoane and Andreas Ruttor},
  journal={Physical review. E, Statistical, nonlinear, and soft matter physics},
  volume={85 2 Pt 2},
  • L. F. Seoane, Andreas Ruttor
  • Published 24 November 2011
  • Computer Science, Mathematics
  • Physical review. E, Statistical, nonlinear, and soft matter physics
An algorithm is presented which implements a probabilistic attack on the key-exchange protocol based on permutation parity machines. Instead of imitating the synchronization of the communicating partners, the strategy consists of a Monte Carlo method to sample the space of possible weights during inner rounds and an analytic approach to convey the extracted information from one outer round to the next one. The results show that the protocol under attack fails to synchronize faster than an… 

Figures and Tables from this paper

Security analysis and improvement to permutation parity machine
The proposed technique mitigates the probabilistic attack using feedback mechanism for the synchronization of PPM to generate a common secret key over a public channel.
Neural synchronization based secret key exchange over public channels: A survey
Exchange of secret keys over public channels based on neural synchronization using a variety of learning rules offer an appealing alternative to number theory based cryptography algorithms. Though
An Approach for Designing Neural Cryptography
A generalized architecture to provide an approach to designing novel neural cryptography and by taking an in-depth investigation on the security of neural cryptography, a heuristic rule is proposed that can effectively guide us to designing secure neural cryptography.
Two-layer tree-connected feed-forward neural network model for neural cryptography
A two-layer tree-connected feed-forward neural network (TTFNN) model for a neural protocol that captures the notion that two partners are capable of exchanging a vector with multiple bits in each time step is developed.