Secure exchange of information by synchronization of neural networks Authors: Ido Kanter, Wolfgang Kinzel and Eran Kanter From: Europhys. Lett. 2002 Presented.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Multilayer Perceptrons 1. Overview  Recap of neural network theory  The multi-layered perceptron  Back-propagation  Introduction to training  Uses.
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
CIS 5371 Cryptography 3b. Pseudorandomness.
Adaptive Resonance Theory (ART) networks perform completely unsupervised learning. Their competitive learning algorithm is similar to the first (unsupervised)
Real-Time Authentication Using Digital Signature Schema Marissa Hollingsworth BOISECRYPT ‘09.
Block Ciphers: Workhorses of Cryptography COMP 1721 A Winter 2004.
Network Security – Part 2 Public Key Cryptography Spring 2007 V.T. Raja, Ph.D., Oregon State University.
Radial Basis Functions
September 30, 2010Neural Networks Lecture 8: Backpropagation Learning 1 Sigmoidal Neurons In backpropagation networks, we typically choose  = 1 and 
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Presenting: Itai Avron Supervisor: Chen Koren Characterization Presentation Spring 2005 Implementation of Artificial Intelligence System on FPGA.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Neural Networks Lab 5. What Is Neural Networks? Neural networks are composed of simple elements( Neurons) operating in parallel. Neural networks are composed.
S. Mandayam/ ANN/ECE Dept./Rowan University Artificial Neural Networks ECE /ECE Fall 2006 Shreekanth Mandayam ECE Department Rowan University.
Neural Optimization of Evolutionary Algorithm Strategy Parameters Hiral Patel.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
Block and Stream Ciphers1 Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
A Cryptography Education Tool Anna Yu Department of Computer Science College of Engineering North Carolina A&T State University June 18, 2009.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Dr. Khalid A. Kaabneh Amman Arab University
Secure Steganography in Audio using Inactive Frames of VoIP Streams
Neurons, Neural Networks, and Learning 1. Human brain contains a massively interconnected net of (10 billion) neurons (cortical cells) Biological.
Information Security Principles (ESGD4222)
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Neural Key Exchange Presented by: Jessica Lowell 10 December 2009 CS 6750.
Cryptology By Greg Buss Pat Shields Barry Burke. What is Cryptology? Cryptology is the study of “secret writing.” Modern cryptology combines the studies.
One-Time Pad Or Vernam Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
Appendix B: An Example of Back-propagation algorithm
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
Midterm Review Cryptography & Network Security
Chapter 20 Symmetric Encryption and Message Confidentiality.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Public-Key Encryption
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
ISEP / Fakulta Elektrotecknika 1 Project Of Telecommunication Subject: Describe following “ MAC - Message Authentication Code " modes: Describe following.
Perceptron Networks and Vector Notation n CS/PY 231 Lab Presentation # 3 n January 31, 2005 n Mount Union College.
Copyright 1999 S.D. Personick. All Rights Reserved. Telecommunications Networking II Lecture 41b Cryptography and Its Applications.
IT 221: Introduction to Information Security Principles Lecture 4: Public-Key Cryptography For Educational Purposes Only Revised: September 15, 2002.
Perceptron Models The perceptron is a kind of binary classifier that maps its input x (a vector of type Real) to an output value f(x) (a scalar of type.
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
Neural Network Basics Anns are analytical systems that address problems whose solutions have not been explicitly formulated Structure in which multiple.
PARALLELIZATION OF ARTIFICIAL NEURAL NETWORKS Joe Bradish CS5802 Fall 2015.
ICOM 5995 (crypto) - Noack Crypto - Administrivia Prontuario - Please time-share and ask questions Info is in my homepage amadeus.uprm.edu/~noack/ Make.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
Introduction to Neural Networks Freek Stulp. 2 Overview Biological Background Artificial Neuron Classes of Neural Networks 1. Perceptrons 2. Multi-Layered.
Perceptrons Michael J. Watts
Cipher Transmission and Storage Modes Part 2: Stream Cipher Modes CSCI 5857: Encoding and Encryption.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Lecture 14 Public Key Cryptography and RSA. Summary principles of public-key cryptography principles of public-key cryptography RSA algorithm, implementation,
Encryption and Encryption and Decryption Speaker:Tsung Ray Wang Advisor:Prof.Li-Chun Wang.
CST 312 Pablo Breuer.  First published public-key algorithm  A number of commercial products employ this key exchange technique  Purpose is to enable.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Assocative Neural Networks (Hopfield) Sule Yildirim 01/11/2004.
Pattern Recognition Lecture 20: Neural Networks 3 Dr. Richard Spillman Pacific Lutheran University.
Basics of Cryptography
Adaptive Resonance Theory (ART)
CSE 473 Introduction to Artificial Intelligence Neural Networks
Announcements HW4 due today (11:59pm) HW5 out today (due 11/17 11:59pm)
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
CSE 573 Introduction to Artificial Intelligence Neural Networks
Multi-Layer Perceptron
NET 311 Information Security
Elect. Codebook, Cipher Block Chaining
Presentation transcript:

Secure exchange of information by synchronization of neural networks Authors: Ido Kanter, Wolfgang Kinzel and Eran Kanter From: Europhys. Lett Presented by: 魏聲尊

Outline Introduction Method Exam Conclusion

Introduction The ability to build a secure channel is one of the most challenging fields of research in modern communication. –In private-key system: need a hidden communication –In public-key system: number theory In this report they suggest a novel cryptosystem, which is base on a learning process of neural network

Method(1/4) X: input unit takes binary values, (public) Y : the K binary hidden unit are denoted by W: the weight from the jth input to the kth hidden unit is denoted by w kj, bounded by L (secret) O: the output bit O is the product of the state of the hidden unit (1~k) 1~N x 11 x 21

Method(2/4) First, given common input vector x kj for both sender and recipient Second, calculate the hidden unit y and output O when y S =1,y R =-1

Method(3/4) Third, if O S O R < 0 update according to Hebbian learning rule Finally, there are two ways to encrypt the message –First, use a conventional encryption algorithm – BBS –Second, use the PM itself for stream cipher by multiplying its output bit

Method(4/4) N=2, K = 2, L = 2, input x = , w s =2,-1,1,1 w R =2,1,2, Sender recipient 1

Exam

Conclusion The phenomenon describe here suggests that synchronization can be used by biological neuronal networks to exchange secure information between different parts of an organism