Neural Cryptography - Neural Key Exchange Protocol

Neural Key Exchange Protocol

The most used protocol for key exchange between two parties A and B in the practice is Diffie-Hellman protocol. Neural key exchange, which is based on the synchronization of two tree parity machines, should be a secure replacement for this method. Synchronizing these two machines is similar to synchronizing two chaotic oscillators in chaos communications.

Read more about this topic:  Neural Cryptography

Other articles related to "neural key exchange protocol, neural, key":

Neural Cryptography - Neural Key Exchange Protocol - Security Against Quantum Computers
... Neural key exchange protocol is not based on any number theory ... and bidirectional synchronization of neural networks ... Therefore, something like the neural key exchange protocol could give rise to potentially faster key exchange schemes ...

Famous quotes containing the words exchange and/or key:

    So long as the law considers all these human beings, with beating hearts and living affections, only as so many things belonging to the master—so long as the failure, or misfortune, or imprudence, or death of the kindest owner, may cause them any day to exchange a life of kind protection and indulgence for one of hopeless misery and toil—so long it is impossible to make anything beautiful or desirable in the best-regulated administration of slavery.
    Harriet Beecher Stowe (1811–1896)

    Woe to you lawyers! For you have taken away the key of knowledge; you did not enter yourselves, and you hindered those who were entering.
    Bible: New Testament, Luke 11:52.