Neural Key Exchange Protocol
The most used protocol for key exchange between two parties A and B in the practice is Diffie-Hellman protocol. Neural key exchange, which is based on the synchronization of two tree parity machines, should be a secure replacement for this method. Synchronizing these two machines is similar to synchronizing two chaotic oscillators in chaos communications.
Read more about this topic: Neural Cryptography
Other articles related to "neural key exchange protocol, neural, key":
... Neural key exchange protocol is not based on any number theory ... and bidirectional synchronization of neural networks ... Therefore, something like the neural key exchange protocol could give rise to potentially faster key exchange schemes ...
Famous quotes containing the words exchange and/or key:
“So long as the law considers all these human beings, with beating hearts and living affections, only as so many things belonging to the masterso long as the failure, or misfortune, or imprudence, or death of the kindest owner, may cause them any day to exchange a life of kind protection and indulgence for one of hopeless misery and toilso long it is impossible to make anything beautiful or desirable in the best-regulated administration of slavery.”
—Harriet Beecher Stowe (18111896)
“Woe to you lawyers! For you have taken away the key of knowledge; you did not enter yourselves, and you hindered those who were entering.”
—Bible: New Testament, Luke 11:52.