1,607 research outputs found

    Dynamics of neural cryptography

    Full text link
    Synchronization of neural networks has been used for novel public channel protocols in cryptography. In the case of tree parity machines the dynamics of both bidirectional synchronization and unidirectional learning is driven by attractive and repulsive stochastic forces. Thus it can be described well by a random walk model for the overlap between participating neural networks. For that purpose transition probabilities and scaling laws for the step sizes are derived analytically. Both these calculations as well as numerical simulations show that bidirectional interaction leads to full synchronization on average. In contrast, successful learning is only possible by means of fluctuations. Consequently, synchronization is much faster than learning, which is essential for the security of the neural key-exchange protocol. However, this qualitative difference between bidirectional and unidirectional interaction vanishes if tree parity machines with more than three hidden units are used, so that those neural networks are not suitable for neural cryptography. In addition, the effective number of keys which can be generated by the neural key-exchange protocol is calculated using the entropy of the weight distribution. As this quantity increases exponentially with the system size, brute-force attacks on neural cryptography can easily be made unfeasible.Comment: 9 pages, 15 figures; typos correcte

    Public channel cryptography by synchronization of neural networks and chaotic maps

    Full text link
    Two different kinds of synchronization have been applied to cryptography: Synchronization of chaotic maps by one common external signal and synchronization of neural networks by mutual learning. By combining these two mechanisms, where the external signal to the chaotic maps is synchronized by the nets, we construct a hybrid network which allows a secure generation of secret encryption keys over a public channel. The security with respect to attacks, recently proposed by Shamir et al, is increased by chaotic synchronization.Comment: 4 page

    Quantum authentication with key recycling

    Get PDF
    We show that a family of quantum authentication protocols introduced in [Barnum et al., FOCS 2002] can be used to construct a secure quantum channel and additionally recycle all of the secret key if the message is successfully authenticated, and recycle part of the key if tampering is detected. We give a full security proof that constructs the secure channel given only insecure noisy channels and a shared secret key. We also prove that the number of recycled key bits is optimal for this family of protocols, i.e., there exists an adversarial strategy to obtain all non-recycled bits. Previous works recycled less key and only gave partial security proofs, since they did not consider all possible distinguishers (environments) that may be used to distinguish the real setting from the ideal secure quantum channel and secret key resource.Comment: 38+17 pages, 13 figures. v2: constructed ideal secure channel and secret key resource have been slightly redefined; also added a proof in the appendix for quantum authentication without key recycling that has better parameters and only requires weak purity testing code

    Plant invasion impacts on fungal community structure and function depends on soil warming and nitrogen enrichment

    Get PDF
    The impacts of invasive species on biodiversity may be mitigated or exacerbated by abiotic environmental changes. Invasive plants can restructure soil fungal communities with important implications for native biodiversity and nutrient cycling, yet fungal responses to invasion may depend on numerous anthropogenic stressors. In this study, we experimentally invaded a long-term soil warming and simulated nitrogen deposition experiment with the widespread invasive plant Alliaria petiolata (garlic mustard) and tested the responses of soil fungal communities to invasion, abiotic factors, and their interaction. We focused on the phytotoxic garlic mustard because it suppresses native mycorrhizae across forests of North America. We found that invasion in combination with warming, but not under ambient conditions or elevated nitrogen, significantly reduced soil fungal biomass and ectomycorrhizal relative abundances and increased relative abundances of general soil saprotrophs and fungal genes encoding for hydrolytic enzymes. These results suggest that warming potentially exacerbates fungal responses to plant invasion. Soils collected from uninvaded and invaded plots across eight forests spanning a 4 °C temperature gradient further demonstrated that the magnitude of fungal responses to invasion was positively correlated with mean annual temperature. Our study is one of the first empirical tests to show that the impacts of invasion on fungal communities depends on additional anthropogenic pressures and were greater in concert with warming than under elevated nitrogen or ambient conditions

    Genetic attack on neural cryptography

    Full text link
    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.Comment: 8 pages, 12 figures; section 5 amended, typos correcte

    The Chemical and Dynamical Evolution of Isolated Dwarf Galaxies

    Full text link
    Using a suite of simulations (Governato et al. 2010) which successfully produce bulgeless (dwarf) disk galaxies, we provide an analysis of their associated cold interstellar media (ISM) and stellar chemical abundance patterns. A preliminary comparison with observations is undertaken, in order to assess whether the properties of the cold gas and chemistry of the stellar components are recovered successfully. To this end, we have extracted the radial and vertical gas density profiles, neutral hydrogen velocity dispersion, and the power spectrum of structure within the ISM. We complement this analysis of the cold gas with a brief examination of the simulations' metallicity distribution functions and the distribution of alpha-elements-to-iron.Comment: To appear in the proceedings of the JENAM 2010 Symposium "Dwarf Galaxies: Keys to Galaxy Formation and Evolution" (Lisbon, 9-10 September 2010), P. Papaderos, S. Recchi, G. Hensler (eds.), Springer Verlag (2011), in pres

    Quantum Nondemolition Monitoring of Universal Quantum Computers

    Get PDF
    The halt scheme for quantum Turing machines, originally proposed by Deutsch, is reformulated precisely and is proved to work without spoiling the computation. The ``conflict'' pointed out recently by Myers in the definition of a universal quantum computer is shown to be only apparent. In the context of quantum nondemolition (QND) measurement, it is also shown that the output observable, an observable representing the output of the computation, is a QND observable and that the halt scheme is equivalent to the QND monitoring of the output observable.Comment: 5 pages, RevTeX, no figures, revised, to appear in Phys. Rev. Let
    • …
    corecore