Secure Key Exchange using Neural Network
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 3
Abstract
Any cryptographic system is used to exchange confidential information securely over the public channel without any leakage of information to the unauthorized users. Neural networks can be used to generate a common secret key because the processes involve in Cryptographic system requires large computational power and very complex. Moreover Diffi hellman key exchange is suffered from man-in –the middle attack. For overcome this problem neural networks can be used.Two neural networks which are trained on their mutual output bits. The networks synchronize to a state with identical time dependent weights. .secret key exchange over a public channel and this key can be used in implementing any encryption algorithm.
Authors and Affiliations
Vineeta Soni*
REAL TIME PILGRIMS TRACKING WITH FEEDBACK
Now a days due to the increasing crude of pilgrims at the holy areas, during pilgrimage the management authorities faces so many problems regarding the crowd control, pilgrim identification and tracking and provid...
INFORMATION AND COMMUNICATION TECHNOLOGY RESOURCES IN TEACHING INDUSTRIAL SUBJECTS AT NAVAL STATE UNIVERSITY
This study aimed to assess the Information and Communication Technology resources in teaching industrial subjects at Naval State University, Naval, Biliran. The descriptive research design was used in this study t...
CHARACTERIZATION OF PEO CONDUCTING POLYMER ELECTROLYTE COMPLEXED WITH KNO3 ALKALI SALT AND NB2O5 NANO-FILLER
Conducting solid phase polymer electrolyte (SPE) films were synthesized using solution casting technique. In the present study the polyethylene oxide [PEO] complexed with potassium nitrate [KNO3] as alkali salt gr...
AUTOMATION SYSTEM TO CLASSIFY HUMAN VOICE USING NEURAL NETWORK
With the development of more and more identification system to identify a person, there is a need of development of system that can provide personal identification task such as gender identification automatically...
A REVIEW PAPER ON DENOISING MULTI-CHANNEL IMAGES IN PARALLEL MRI BY LOW RANK MATRIX DECOMPOSITION AND BACTERIAL FORAGING ALGORITHM
Parallel magnetic resonance imaging has emerged as an effective means for high-speed imaging in various applications. The reconstruction of parallel magnetic resonance imaging (pMRI) [1] data can be a computationa...