Security of neural cryptography

R. Mislovaty, E. Klein, I. Kanter, W. Kinzel

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

20 Scopus citations

Abstract

In this paper we analyze the security of Neural Cryptography, a novel key-exchange protocol based on synchronization of Neural Networks[1]. Various attacks on this protocol were suggested by Shamir et al., and the protocol was shown to be secure against them[2]. A new attack strategy involving a large number of cooperating attackers, that succeeds to reveal the encryption key was recently found[3].

Original languageEnglish
Title of host publication11th IEEE International Conference on Electronics, Circuits and Systems, ICECS 2004
Pages219-221
Number of pages3
StatePublished - 2004
Event11th IEEE International Conference on Electronics, Circuits and Systems, ICECS 2004 - Tel Aviv, Israel
Duration: 13 Dec 200415 Dec 2004

Publication series

Name11th IEEE International Conference on Electronics, Circuits and Systems, ICECS 2004

Conference

Conference11th IEEE International Conference on Electronics, Circuits and Systems, ICECS 2004
Country/TerritoryIsrael
CityTel Aviv
Period13/12/0415/12/04

Fingerprint

Dive into the research topics of 'Security of neural cryptography'. Together they form a unique fingerprint.

Cite this