@article{Ruttor:2007:DNC,
Title = {Dynamics of neural cryptography},
Author = {Andreas Ruttor and Ido Kanter and Wolfgang Kinzel},
Pages = {056104},
Year = {2007},
Doi = {10.1103/PhysRevE.75.056104},
Journal = {Phys. Rev. E},
Volume = {75},
Number = {5},
Abstract = {Synchronization of neural networks has been used for public channel protocols in cryptography. In the case of tree parity machines the dynamics of both bidirectional synchronization and unidirectional learning is driven by attractive and repulsive stochastic forces. Thus it can be described well by a random walk model for the overlap between participating neural networks. For that purpose transition probabilities and scaling laws for the step sizes are derived analytically. Both these calculations as well as numerical simulations show that bidirectional interaction leads to full synchronization on average. In contrast, successful learning is only possible by means of fluctuations. Consequently, synchronization is much faster than learning, which is essential for the security of the neural key-exchange protocol. However, this qualitative difference between bidirectional and unidirectional interaction vanishes if tree parity machines with more than three hidden units are used, so that those neural networks are not suitable for neural cryptography. In addition, the effective number of keys which can be generated by the neural key-exchange protocol is calculated using the entropy of the weight distribution. As this quantity increases exponentially with the system size, brute-force attacks on neural cryptography can easily be made unfeasible.},
Url = {/fileadmin/fg135/publikationen/Ruttor_2007_DNC.pdf},
Url2 = {http://pre.aps.org/abstract/PRE/v75/i5/e056104}
}