A combined method of formation of a cryptographic key with secret modification of the results of synchronization of artificial neural networks
This article discusses one of the ways to generate a common cryptographic key using synchronized artificial neural networks. This option is based on a combined method of forming a cryptographic key [1]. The proposed combined formation consists of two stages: the formation of partially coinciding bin...
Saved in:
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Belarusian National Technical University
2021-10-01
|
Series: | Системный анализ и прикладная информатика |
Subjects: | |
Online Access: | https://sapi.bntu.by/jour/article/view/523 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832557404171010048 |
---|---|
author | M. L. Radziukevich |
author_facet | M. L. Radziukevich |
author_sort | M. L. Radziukevich |
collection | DOAJ |
description | This article discusses one of the ways to generate a common cryptographic key using synchronized artificial neural networks. This option is based on a combined method of forming a cryptographic key [1]. The proposed combined formation consists of two stages: the formation of partially coinciding binary sequences using synchronized artificial neural networks and the elimination of mismatched bits by open comparison of the parities of bit pairs. The purpose of this article is to increase the cryptographic strength of this method in relation to a cryptanalyst. In this regard, it is proposed to prematurely interrupt the synchronization process at the first stage of the combined method and make changes to the resulting binary sequence by randomly inverting a certain number of bits. To confirm the quality of this method, possible attacks are considered and the scale of enumeration of possible values is illustrated. The results obtained showed that the combined method of forming a cryptographic key with a secret modification of the synchronization results of artificial neural networks, proposed in this article, provides its high cryptographic strength, commensurate with the cryptographic strength of modern symmetric encryption algorithms, with a relatively simple implementation. |
format | Article |
id | doaj-art-cf1866c65c3e4499931c42b8f5514872 |
institution | Kabale University |
issn | 2309-4923 2414-0481 |
language | English |
publishDate | 2021-10-01 |
publisher | Belarusian National Technical University |
record_format | Article |
series | Системный анализ и прикладная информатика |
spelling | doaj-art-cf1866c65c3e4499931c42b8f55148722025-02-03T05:16:54ZengBelarusian National Technical UniversityСистемный анализ и прикладная информатика2309-49232414-04812021-10-0103515810.21122/2309-4923-2021-3-51-58396A combined method of formation of a cryptographic key with secret modification of the results of synchronization of artificial neural networksM. L. Radziukevich0Research Institute for the Technical Protection of InformationThis article discusses one of the ways to generate a common cryptographic key using synchronized artificial neural networks. This option is based on a combined method of forming a cryptographic key [1]. The proposed combined formation consists of two stages: the formation of partially coinciding binary sequences using synchronized artificial neural networks and the elimination of mismatched bits by open comparison of the parities of bit pairs. The purpose of this article is to increase the cryptographic strength of this method in relation to a cryptanalyst. In this regard, it is proposed to prematurely interrupt the synchronization process at the first stage of the combined method and make changes to the resulting binary sequence by randomly inverting a certain number of bits. To confirm the quality of this method, possible attacks are considered and the scale of enumeration of possible values is illustrated. The results obtained showed that the combined method of forming a cryptographic key with a secret modification of the synchronization results of artificial neural networks, proposed in this article, provides its high cryptographic strength, commensurate with the cryptographic strength of modern symmetric encryption algorithms, with a relatively simple implementation.https://sapi.bntu.by/jour/article/view/523synchronized artificial neural networkscryptographic strengthcommon cryptographic keysecret modificationcombined method |
spellingShingle | M. L. Radziukevich A combined method of formation of a cryptographic key with secret modification of the results of synchronization of artificial neural networks Системный анализ и прикладная информатика synchronized artificial neural networks cryptographic strength common cryptographic key secret modification combined method |
title | A combined method of formation of a cryptographic key with secret modification of the results of synchronization of artificial neural networks |
title_full | A combined method of formation of a cryptographic key with secret modification of the results of synchronization of artificial neural networks |
title_fullStr | A combined method of formation of a cryptographic key with secret modification of the results of synchronization of artificial neural networks |
title_full_unstemmed | A combined method of formation of a cryptographic key with secret modification of the results of synchronization of artificial neural networks |
title_short | A combined method of formation of a cryptographic key with secret modification of the results of synchronization of artificial neural networks |
title_sort | combined method of formation of a cryptographic key with secret modification of the results of synchronization of artificial neural networks |
topic | synchronized artificial neural networks cryptographic strength common cryptographic key secret modification combined method |
url | https://sapi.bntu.by/jour/article/view/523 |
work_keys_str_mv | AT mlradziukevich acombinedmethodofformationofacryptographickeywithsecretmodificationoftheresultsofsynchronizationofartificialneuralnetworks AT mlradziukevich combinedmethodofformationofacryptographickeywithsecretmodificationoftheresultsofsynchronizationofartificialneuralnetworks |