Abstract

In this paper, a neural synchronization of the optimal structure-based group of neural networks is proposed. Asymmetric cryptography is widely used to generate a key amongst two parties and to exchange the key through an insecure channel. However, since the methods that used this strategy, like RSA, have been compromised, new methods for producing a key that can offer security must be discovered. A new group of cryptography known as neural cryptography was created to solve this issue. The primary aim of neural cryptography is to produce a secret key over an unreliable medium. The optimal neural network architecture for creating and defining a secret key between the two authorized individuals is examined in this article. Furthermore, studies into the coordination of a group of neural networks are uncommon. For the design of the public key exchange protocol, synchronization of a cluster of neural networks with Three Layer Tree Parity Machine (TLTPM) is proposed. To calculate the synchronization time, steps taken, and the number of times the attacking neural network could replicate the actions of the two accepted networks, more than 15 million simulations were run. Various parametric experiments have been conducted on the proposed methodology. Simulations of the approach show that it is correct, according to the results of the paper.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call