Design of group key agreement protocol using neural key synchronization

被引:8
|
作者
Santhanalakshmi, S. [1 ]
Sangeeta, K. [1 ]
Patra, G. K. [2 ]
机构
[1] Amrita Vishwa Vidyapeetham, Amrita Sch Engn, Dept Comp Sci & Engn, Bengaluru 560035, Karnataka, India
[2] CSIR, Paradigm Inst 4, Bangalore 560037, Karnataka, India
关键词
Contributory group key; DH Group Key; Neural Cryptography; Tree Parity Machine; Rekeying;
D O I
10.1080/09720502.2020.1731956
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Security is considered as an important anxiety for applications which involve communication (more than two) over public networks. Group key management is one of the essential building blocks in securing group communication. Most of the researches in group key management are based on the general idea of the original Diffie-Hellman (DH) key agreement protocol. The major drawback of generalized DH for multi-party is the fact that there are expensive exponential operations to be carried out. The factors that influence the capability of a Group Key agreement (GKA) protocol are communication rounds and the computational cost. In this paper, the concept of neural cryptography, based on the mutual learning of Tree Parity Machine (TPM), is extended to operations to be carried out. The factors that influence the capability of a Group Key agreement (GKA) protocol are communication rounds and the computational cost. In this paper, the concept of neural cryptography, based on the mutual learning of Tree Parity Machine (TPM), is extended to obtain a group key. The group key has been generated for an interactive conference key agreement system, where the system authenticates the users and allows them to compute their own session key, and also it has been recognized that the neural network based GKA protocols achieve key freshness and key secrecy. The quantity demand and investment in research and development, while the other model focuses on a more realistic relationship between the quantity demand and the price.
引用
收藏
页码:435 / 451
页数:17
相关论文
共 5 条
  • [1] A key agreement protocol based on spiking neural P systems with anti-spikes
    Plesa, Mihail-Iulian
    Gheoghe, Marian
    Ipate, Florentin
    Zhang, Gexiang
    JOURNAL OF MEMBRANE COMPUTING, 2022, 4 (04) : 341 - 351
  • [2] A key agreement protocol based on spiking neural P systems with anti-spikes
    Mihail-Iulian Plesa
    Marian Gheoghe
    Florentin Ipate
    Gexiang Zhang
    Journal of Membrane Computing, 2022, 4 : 341 - 351
  • [3] Public Key Cryptography using Neural Networks and Genetic Algorithms
    Jhajharia, Smita
    Mishra, Swati
    Bali, Siddharth
    2013 SIXTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2013, : 137 - 142
  • [4] Symmetric Encryption with Key Distribution Based on Neural Networks
    Anikin, I., V
    Makhmutova, A. Z.
    Gadelshin, O. E.
    2016 2ND INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING, APPLICATIONS AND MANUFACTURING (ICIEAM), 2016,
  • [5] CPU-side comparison for Key Agreement between Tree Parity Machines and standard Cryptographic Primitives
    Lofu, Domenico
    Di Gennaro, Pietro
    Sorino, Paolo
    Di Noia, Tommaso
    Di Sciascio, Eugenio
    2022 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS, SERVICES AND TECHNOLOGIES (DESSERT), 2022,