Neural Cryptography - Applications


There currently no practical applications due to the recent development of the field, but it could be used specially where the keys are continually generated and the system (both pairs and the insecure media) is in a continuously evolving mode.
In 1995, Sebastien Dourlens applied neural networks cryptanalyze DES by allowing the networks to learn how to invert the S-tables of the DES. The bias in DES studied through Differential Cryptanalysis by Adi Shamir is highlighted. The experiment shows about 50% of the key bits can be found, allowing the complete key to be found in a short time. Hardware application with multi micro-controllers have been proposed due to the easy implementation of multilayer neural networks in hardware.
One example of public-key protocol is given by Khalil Shihab. He describes the decryption scheme and the public key creation that are based on a backpropagation neural network. The encryption scheme and the private key creation process are based on Boolean algebra. This technique has the advantage of small time and memory complexities. A disadvantage is the property of backpropagation algorithm: By huge training sets lasts the learning of neural network very long. Therefore the use of this protocol is only theoretical so far.

Read more about this topic:  Neural Cryptography

Other articles related to "applications, application":

Building On OpenStep
... The idea was to use OpenStep code as a basis for network-wide applications running across different platforms, as opposed to using CORBA or some other system ... which defined an operating system that applications would run in, under PDO the libraries were compiled into the application itself, creating a stand-alone "native" application for a particular platform ... code (Objective-C and the libraries), PDO applications were nevertheless considerably smaller than similar CORBA solutions, typically about one-half to one-third the size ...
Biotechnology - Applications - Agriculture - Improved Taste, Texture or Appearance of Food
... The first genetically modified food product was a tomato which was transformed to delay its ripening ... Researchers in Indonesia, Malaysia, Thailand, Philippines and Vietnam are currently working on delayed-ripening papaya in collaboration with the University of Nottingham and Zeneca ...
X Servers - Limitations and Criticism - Network
... Screen in relation to terminals), and other applications and toolkits provide related facilities ... This ability allows the user interface (mouse, keyboard, monitor) of a running application to be switched from one location to another without stopping and restarting the ... This can be important in some applications, such as process monitoring and control ...
Photoresist Categories - Applications
... Microelectronics This application, mainly applied to silicon wafers/silicon integrated circuits is the most developed of the technologies and the most specialized in the field ...
Transistor - Comparison With Vacuum Tubes - Advantages
... to replace their vacuum tube predecessors in most applications are Small size and minimal weight, allowing the development of miniaturized electronic devices ... voltages, making transistors suitable for small, battery-powered applications ... No warm-up period for cathode heaters required after power application ...