Genetic attack on neural cryptography

Andreas Ruttor, Wolfgang Kinzel, Rivka Naeh, and Ido Kanter
Phys. Rev. E 73, 036121 – Published 17 March 2006

Abstract

Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  • Figure
  • Figure
  • Figure
  • Figure
  • Figure
  • Figure
  • Figure
5 More
  • Received 1 December 2005

DOI:https://doi.org/10.1103/PhysRevE.73.036121

©2006 American Physical Society

Authors & Affiliations

Andreas Ruttor and Wolfgang Kinzel

  • Institut für Theoretische Physik, Universität Würzburg, Am Hubland, 97074 Würzburg, Germany

Rivka Naeh and Ido Kanter

  • Minerva Center and Department of Physics, Bar Ilan University, Ramat Gan 52900, Israel

Article Text (Subscription Required)

Click to Expand

References (Subscription Required)

Click to Expand
Issue

Vol. 73, Iss. 3 — March 2006

Reuse & Permissions
Access Options
Author publication services for translation and copyediting assistance advertisement

Authorization Required


×
×

Images

×

Sign up to receive regular email alerts from Physical Review E

Log In

Cancel
×

Search


Article Lookup

Paste a citation or DOI

Enter a citation
×