• May 27, 2016 News!The submission for Special Issue is officially open now!   [Click]
  • May 03, 2016 News!Vol.6, No.6 has been indexed by EI (Inspec).   [Click]
  • Mar 17, 2017 News!Vol.9, No.2 has been published with online version. 13 peer reviewed articles from 4 specific areas are published in this issue.   [Click]
General Information
Editor-in-chief
Prof. Wael Badawy
Department of Computing and Information Systems Umm Al Qura University, Canada
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.
IJCTE 2010 Vol.2(4): 665-669 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2010.V2.220

Private Inputs to Tree Parity Machine

Pravin Revankar, W. Z. Gandhare and Dilip Rathod

Abstract—Neural cryptography is based on synchronization of tree parity machines by mutual learning. We extend previous key-exchange protocols by replacing random inputs with queries depending on the current state of the neural networks. The results show that queries restore the security against attackers. We further restrict amount information available to an attacker by keeping seed of pseudo randomnumber generator private.

Index Terms—Neural cryptography, query, mutual learning,tree parity machine, neural synchronization, encryption/decryption.

Pravin Revankar and W. Z. Gandhare are with the Government College of Engineering, Aurangabad, India. (email: prevankar@gmail.com, wz_gandhare@yahoo.com).
Dilip Rathod is with the Dept. of Information Technology, P. E. S. College of Engineering, Aurangabad, India (email: rathod.dt@gmail.com).

[PDF]

Cite: Pravin Revankar, W. Z. Gandhare and Dilip Rathod, "Private Inputs to Tree Parity Machine," International Journal of Computer Theory and Engineering vol. 2, no. 4, pp. 665-669, 2010.  

Copyright © 2008-2015. International Journal of Computer Theory and Engineering. All rights reserved.
E-mail: ijcte@vip.163.com