Neural Cryptography Group A4 Chris Sun Bryan Maden Min Fang Problem of Symmetric Key Key Key distribution distribution Key and security The more we use a same key the more easily to beak the code One time pad Unbreakable Unbreakable Plain X Key Key 11 Plain 1 Key Key X X Key Key 22 Plain 2 Cipher Key Key 33 Plain 3 Problem of key distribution No secure channel Contact in person Too expensive NN to implement one time pad If If this this is is true true we we have have aa perfect perfect code code Basic NN Input sample Hidden layer Output Weight Activation function Propagation rule Training Input sample Hidden layer Modify weights compare Output Public random bit stream NN 1 Output 1 Output 2 NN 2 NN Cryptography All input and output are known to the public All weights are unknown to the public even the partner NN Cryptography 2 Each NN trains by the output from his partner After synchronization the final weights is the key Example of NN used in cryptography Question The End
View Full Document