Security of neural cryptography

R. Mislovaty, E. Klein, I. Kanter, W. Kinzel

Research output: Contribution to journalArticlepeer-review

21 Scopus citations

Abstract

In this paper we analyze the security of Neural Cryptography, a novel key-exchange protocol based on synchronization of Neural Networks[1]. Various attacks on this protocol were suggested by Shamir et al., and the protocol was shown to be secure against them[2]. A new attack strategy involving a large number of cooperating attackers, that succeeds to reveal the encryption key was recently found[3]. ©2004 IEEE.
Original languageEnglish
Journal11th IEEE International Conference on Electronics, Circuits and Systems, ICECS 2004
StatePublished - 1 Dec 2004

Fingerprint

Dive into the research topics of 'Security of neural cryptography'. Together they form a unique fingerprint.

Cite this