Unformatted text preview:

Neural Cryptography Group A4 Chris Sun Bryan Maden Min Fang Problem of Symmetric Key Key Key distribution distribution Key and security The more we use a same key the more easily to beak the code One time pad Unbreakable Unbreakable Plain X Key Key 11 Plain 1 Key Key X X Key Key 22 Plain 2 Cipher Key Key 33 Plain 3 Problem of key distribution No secure channel Contact in person Too expensive NN to implement one time pad If If this this is is true true we we have have aa perfect perfect code code Basic NN Input sample Hidden layer Output Weight Activation function Propagation rule Training Input sample Hidden layer Modify weights compare Output Public random bit stream NN 1 Output 1 Output 2 NN 2 NN Cryptography All input and output are known to the public All weights are unknown to the public even the partner NN Cryptography 2 Each NN trains by the output from his partner After synchronization the final weights is the key Example of NN used in cryptography Question The End


View Full Document
Download Neural Cryptography
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Neural Cryptography and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Neural Cryptography and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?