Redirigiendo al acceso original de articulo en 20 segundos...
ARTÍCULO
TITULO

VECTORIZED NEURAL KEY EXCHANGE USING TREE PARITY MACHINE

Smruti Chourasia    
Hrishikesh Bharadwaj Chakrapani    
Queenie Das    
Krati Agarwal    
Lavanya K    

Resumen

The communication boom in the past few decades has resulted in a large flow of data. This entails the need for having high security and privacy with regards to data confidentiality and authenticity. One method of doing so is by utilizing a synchronized key. In the domain of cryptography there exist several methods of key generation, one such method is the tree parity machine (TPM) involving neural cryptography. In our paper, we provide a novel vectorized TPM (vTPM) in order to develop a key. We have also provided a system to detect any unwanted listeners, as one of the weakness of the TPM algorithm is Man in the middle attacks. We have further utilized this key for authentication between a sender and a receiver. The authentication is carried out by means of H-MAC with the SHA-512 hashing mechanism. Finally, a comparison is drawn out between the serial and vector implementation of the Tree Parity Machine.

 Artículos similares