Professional Documents
Culture Documents
Trends in Cryptography
Trends in Cryptography
Quantum Cryptography
Quantum cryptography is a science that applies quantum mechanics principles to data encryption and data
transmission so that data cannot be accessed by hackers.
If the photon is read or copied in any way by an eavesdropper, the photon’s state will change. The
change will be detected by the endpoints.
Alice and Bob want to send a secret to each other that no one else can intercept.
With QKD, Alice sends Bob a series of polarized photons over a fiber optic cable.
This cable doesn’t need to be secured because the photons have a randomized
quantum state.
Neural Cryptography
Key exchange protocols are based on Neural networks.
The neural cryptography ensures that the key cannot be inferred, even if an
attacker knows the details of the algorithm and can monitor the communication
channel.
Commonly used Tree Parity Machine (TPM) model.
Each party constructs own TPM with shared parameters and chooses initial
random weight values for the TPM. (Note: Initial value kept private , input/output
values kept public)
Then, they generate a random input vector and calculate their own output values
by feeding the generated common input into the TPM.
By exchanging the output values, they update their own weight values with a
given learning rule(Hebbian learning rule/ random walk learning rule).
These procedures are repeated until the weight vectors are fully synchronized,
and the synchronized weight vector can be used as a shared secret key
Each party (A and B) uses its own tree parity machine. Synchronization of the tree parity
machines is achieved in following steps:
After the full synchronization is achieved (the weights of both tree parity machines are same), A
and B can use their weights as keys.
This method is known as a bidirectional learning.
Attacks and security
To provide a brute force attack, an attacker has to test all possible keys making
the attack impossible with today's computer power.
Security against quantum computers: data are stored as qubits (quantum binary
digits) whereas Neural key exchange protocol is not based on any number theory.
It is based on the difference between unidirectional and bidirectional
synchronization of neural networks.
Homomorphic Encryption