3,037 research outputs found
Tree Parity Machine Rekeying Architectures
The necessity to secure the communication between hardware components in
embedded systems becomes increasingly important with regard to the secrecy of
data and particularly its commercial use. We suggest a low-cost (i.e. small
logic-area) solution for flexible security levels and short key lifetimes. The
basis is an approach for symmetric key exchange using the synchronisation of
Tree Parity Machines. Fast successive key generation enables a key exchange
within a few milliseconds, given realistic communication channels with a
limited bandwidth. For demonstration we evaluate characteristics of a
standard-cell ASIC design realisation as IP-core in 0.18-micrometer
CMOS-technology
A Review on Biological Inspired Computation in Cryptology
Cryptology is a field that concerned with cryptography and cryptanalysis. Cryptography, which is a key technology in providing a secure transmission of information, is a study of designing strong cryptographic algorithms, while cryptanalysis is a study of breaking the cipher. Recently biological approaches provide inspiration in solving problems from various fields. This paper reviews major works in the application of biological inspired computational (BIC) paradigm in cryptology. The paper focuses on three BIC approaches, namely, genetic algorithm (GA), artificial neural network (ANN) and artificial immune system (AIS). The findings show that the research on applications of biological approaches in cryptology is minimal as compared to other fields. To date only ANN and GA have been used in cryptanalysis and design of cryptographic primitives and protocols. Based on similarities that AIS has with ANN and GA, this paper provides insights for potential application of AIS in cryptology for further research
Neural Synchronization Using Genetic Algorithm for Secure Key Establishment
Two neural networks that are trained on their mutual output synchronize to an identical time dependant weight vector.
This novel phenomenon can be used for creation of a secure cryptographic secret-key using a public channel. Neural
cryptography is a way to create shared secret key. Key generation in Tree Parity Machine neural network is done by
mutual learning. Neural networks here receive common inputs and exchange their outputs. Adjusting discrete weights
according to a suitable learning rule then leads to full synchronization in a finite number of steps and these identical
weights are the secret key needed for encryption. A faster synchronization of the neural network has been achieved by
generating the optimal weights for the sender and receiver from a genetic process. Here the best fit weight vector is
found using a genetic algorithm. In this paper the performance of the genetic algorithm has been analysed by varying the
number of hidden and input neurons
Optimization and Applications of Modern Wireless Networks and Symmetry
Due to the future demands of wireless communications, this book focuses on channel coding, multi-access, network protocol, and the related techniques for IoT/5G. Channel coding is widely used to enhance reliability and spectral efficiency. In particular, low-density parity check (LDPC) codes and polar codes are optimized for next wireless standard. Moreover, advanced network protocol is developed to improve wireless throughput. This invokes a great deal of attention on modern communications
- …