Abstract: The main options for the formation of a shared secret using synchronized artificial neural networks and possible patterns of behavior of a cryptanalyst are considered. To solve the problem of increasing the confidentiality of the generated shared secret, if it is used as a cryptographic key, it is proposed to use the mixing a certain number of results of individual synchronizations (convolution). As a mixing function, we consider the convolution of the vectors of network weights by bitwise addition modulo 2 of all the results of individual sync...
(read more)
Topics: 
Theoretical computer science