Secure Key Exchange using Neural Network

Abstract

 Any cryptographic system is used to exchange confidential information securely over the public channel without any leakage of information to the unauthorized users. Neural networks can be used to generate a common secret key because the processes involve in Cryptographic system requires large computational power and very complex. Moreover Diffi hellman key exchange is suffered from man-in –the middle attack. For overcome this problem neural networks can be used.Two neural networks which are trained on their mutual output bits. The networks synchronize to a state with identical time dependent weights. .secret key exchange over a public channel and this key can be used in implementing any encryption algorithm.

Authors and Affiliations

Vineeta Soni*

Keywords

Related Articles

 REAL TIME PILGRIMS TRACKING WITH FEEDBACK

 Now a days due to the increasing crude of pilgrims at the holy areas, during pilgrimage the management authorities faces so many problems regarding the crowd control, pilgrim identification and tracking and provid...

 INFORMATION AND COMMUNICATION TECHNOLOGY RESOURCES IN TEACHING INDUSTRIAL SUBJECTS AT NAVAL STATE UNIVERSITY

 This study aimed to assess the Information and Communication Technology resources in teaching industrial subjects at Naval State University, Naval, Biliran. The descriptive research design was used in this study t...

 CHARACTERIZATION OF PEO CONDUCTING POLYMER ELECTROLYTE COMPLEXED WITH KNO3 ALKALI SALT AND NB2O5 NANO-FILLER

 Conducting solid phase polymer electrolyte (SPE) films were synthesized using solution casting technique. In the present study the polyethylene oxide [PEO] complexed with potassium nitrate [KNO3] as alkali salt gr...

 AUTOMATION SYSTEM TO CLASSIFY HUMAN VOICE USING NEURAL NETWORK

 With the development of more and more identification system to identify a person, there is a need of development of system that can provide personal identification task such as gender identification automatically...

 A REVIEW PAPER ON DENOISING MULTI-CHANNEL IMAGES IN PARALLEL MRI BY LOW RANK MATRIX DECOMPOSITION AND BACTERIAL FORAGING ALGORITHM

 Parallel magnetic resonance imaging has emerged as an effective means for high-speed imaging in various applications. The reconstruction of parallel magnetic resonance imaging (pMRI) [1] data can be a computationa...

Download PDF file
  • EP ID EP148508
  • DOI -
  • Views 57
  • Downloads 0

How To Cite

Vineeta Soni* (30).  Secure Key Exchange using Neural Network. International Journal of Engineering Sciences & Research Technology, 3(3), 1707-1709. https://europub.co.uk/articles/-A-148508