Secure Key Exchange using Neural Network
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 3
Abstract
Any cryptographic system is used to exchange confidential information securely over the public channel without any leakage of information to the unauthorized users. Neural networks can be used to generate a common secret key because the processes involve in Cryptographic system requires large computational power and very complex. Moreover Diffi hellman key exchange is suffered from man-in –the middle attack. For overcome this problem neural networks can be used.Two neural networks which are trained on their mutual output bits. The networks synchronize to a state with identical time dependent weights. .secret key exchange over a public channel and this key can be used in implementing any encryption algorithm.
Authors and Affiliations
Vineeta Soni*
COMPARATIVE STUDY ON DESIGN AND ANALYSIS OF MULTISTOREYED BUILDING (G+10) BY STAAD.PRO AND ETABS SOFTWARE’S
Structural Analysis is a branch which involves in the determination of behaviour of structures in order to predict the responses of real structures such as buildings, bridges, trusses etc. Under the improvement of...
CHROMIUM DOPED POLYANILINE/MWCNTS NANOCOMPOSITE FOR SUPERCAPACITOR ELECTRODE MATERIALS
In this study we have prepared Cr-doped polyaniline/MWCNTs [Cr-PANI-CNT] nanocomposite by simple in-situ polymerization method where ammonium persulphate used as oxidant in HCl medium. The probable interaction be...
Trust Aware Routing Framework
The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or...
A SURVEY ON MINING UNCERTAIN FREQUENT ITEM SET EFFECTIVELY USING PATTERN GROWTH APPROACH
The Frequent Itemset Mining (FIM) is well-known problem in data mining. The FIM is very useful for business intellisense, weather forecasting etc. Many frequent pattern mining algorithms find patterns from traditional...
Hypertext Design and Working Methodology
Hypertext systems are easier to write today, computers are much faster, languages and libraries are greatly enhanced, under standing of software architecture, design and development have all improved dramatically....