TY - GEN
T1 - The theory of neural networks
T2 - 2005 IEEE International Workshop on VLSI Design and Video Technology, IWVDVT 2005
AU - Kanter, Ido
PY - 2005
Y1 - 2005
N2 - In the first part of my talk the main findings in the theory of neural networks during the last two decades are summarized. These include storage capacity, learning from examples, and time series generation by feedforward networks. In the second part of the talk, the new bridge between the theory of neural networks and cryptography is presented. A new phenomenon, namely synchronization of neural networks, is leading to an original method for the exchange of secret messages. Numerical simulations as well as analytical results show that two artificial networks, trained by the Hebbian learning rule on their mutual outputs, develop a parallel state of their synaptic weights. The synchronized weights (integer values between +/-L) are used to construct an ephemeral key-exchange protocol for the secure transmission of secret data. We show that the synchronization time increases with L∧2 while the probability to find a successful attacker decreases exponentially with L. Hence for large L we find a secure key-exchange protocol which depends neither on number theory nor on injective trapdoor functions used in conventional cryptography.
AB - In the first part of my talk the main findings in the theory of neural networks during the last two decades are summarized. These include storage capacity, learning from examples, and time series generation by feedforward networks. In the second part of the talk, the new bridge between the theory of neural networks and cryptography is presented. A new phenomenon, namely synchronization of neural networks, is leading to an original method for the exchange of secret messages. Numerical simulations as well as analytical results show that two artificial networks, trained by the Hebbian learning rule on their mutual outputs, develop a parallel state of their synaptic weights. The synchronized weights (integer values between +/-L) are used to construct an ephemeral key-exchange protocol for the secure transmission of secret data. We show that the synchronization time increases with L∧2 while the probability to find a successful attacker decreases exponentially with L. Hence for large L we find a secure key-exchange protocol which depends neither on number theory nor on injective trapdoor functions used in conventional cryptography.
UR - http://www.scopus.com/inward/record.url?scp=23844508892&partnerID=8YFLogxK
M3 - ???researchoutput.researchoutputtypes.contributiontobookanthology.conference???
AN - SCOPUS:23844508892
SN - 0780390067
T3 - Proceedings of the 2005 IEEE International Workshop on VLSI Design and Video Technology, IWVDVT 2005
SP - 19
BT - Proceedings of the 2005 IEEE International Workshop on VLSI Design and Video Technology, IWVDVT 2005
Y2 - 28 May 2005 through 30 May 2005
ER -