Secure Key Exchange using Neural Network

Abstract

 Any cryptographic system is used to exchange confidential information securely over the public channel without any leakage of information to the unauthorized users. Neural networks can be used to generate a common secret key because the processes involve in Cryptographic system requires large computational power and very complex. Moreover Diffi hellman key exchange is suffered from man-in –the middle attack. For overcome this problem neural networks can be used.Two neural networks which are trained on their mutual output bits. The networks synchronize to a state with identical time dependent weights. .secret key exchange over a public channel and this key can be used in implementing any encryption algorithm.

Authors and Affiliations

Vineeta Soni*

Keywords

Related Articles

 A PSEUDO RELEVANCE BASED IMAGE RETRIEVAL MODEL

 Image retrieval is the basic requirement, task now a day. Content based image retrieval is the popular image retrieval system by which the target image to be retrieved based on the useful features of the given ima...

 DESIGN AND DEVELOPMENT OF INTELLIGENT LIGHTING SYSTEM FOR SMART HOUSES

 Energy conservation is the most important factor in recent human life, more wastage of energy is caused by the inefficient use of the consumer electronics. Energy saving in buildings not only saves money and a...

 STUDYING THE DIELECTRIC PROPERTIES, MICROSTRUCTURE AND MORPHOLOGY OF DOPED NANOFERRITE COMPOSITE

 Mixed ferrite having the general formula ( Li0.5 Fe0.5 O4) 0.9 ( Co4 Fe2O4)0.1 doped with different percentage of Y2O3 were prepared using autocombustion method. X-ray diffraction (XRD) reveals the polycrystalline...

 ANALYTICAL ELASTOHYDRODYNAMIC LUBRICANT FILM THICKNESS FORBALL BEARINGS 6007, 6207, 6307 & 6407 USING HERTZ CONTACT THEORY

 Elastohydrodynamic lubrication is the phenomenon that occurs when a lubricant is introduced between surfacesthat are in rolling contact such as rolling bearing. Elastohydrodynamic lubrication (EHL) is an important...

 Performance Analysis: Tree and Graph Based Topology Control Algorithms in Wireless Sensor Networks

 A wireless sensor network is a wireless network consisting of spatially distributed autonomous devices that use sensor for monitoring and recording the physical conditions of the environment and organizing the col...

Download PDF file
  • EP ID EP148508
  • DOI -
  • Views 64
  • Downloads 0

How To Cite

Vineeta Soni* (30).  Secure Key Exchange using Neural Network. International Journal of Engineering Sciences & Research Technology, 3(3), 1707-1709. https://www.europub.co.uk/articles/-A-148508