Secure key-exchange protocol with an absence of injective functions

R. Mislovaty, Y. Perchenok, I. Kanter, W. Kinzel

Research output: Contribution to journalArticlepeer-review

48 Scopus citations


The security of neural cryptography is investigated. A key-exchange protocol over a public channel is studied where the parties exchanging secret messages use multilayer neural networks which are trained by their mutual output bits and synchronize to a time dependent secret key. The weights of the networks have integer values between [formula presented] Recently an algorithm for an eavesdropper which could break the key was introduced by [A. Shamir, A. Mityagin, and A. Klimov, Ramp Session (Eurocrypt, Amsterdam, 2002)]. We show that the synchronization time increases with [formula presented] while the probability to find a successful attacker decreases exponentially with L. Hence for large L we find a secure key-exchange protocol which depends neither on number theory nor on injective trapdoor functions used in conventional cryptography.

Original languageEnglish
Pages (from-to)5
Number of pages1
JournalPhysical Review E
Issue number6
StatePublished - 4 Dec 2002


Dive into the research topics of 'Secure key-exchange protocol with an absence of injective functions'. Together they form a unique fingerprint.

Cite this