Neural Cryptography - Neural Key Exchange Protocol

Neural Key Exchange Protocol

The most used protocol for key exchange between two parties A and B in the practice is Diffie-Hellman protocol. Neural key exchange, which is based on the synchronization of two tree parity machines, should be a secure replacement for this method. Synchronizing these two machines is similar to synchronizing two chaotic oscillators in chaos communications.

Read more about this topic:  Neural Cryptography

Famous quotes containing the words key and/or exchange:

    This is not a book. This is libel, slander, defamation of character. This is not a book, in the ordinary sense of the word. No, this is a prolonged insult, a gob of spit in the face of Art, a kick in the pants to God, Man, Destiny, Time, Love, Beauty ... what you will. I am going to sing for you, a little off key perhaps, but I will sing.
    Henry Miller (1891–1980)

    My life is superficial, takes no root in the deep world; I ask, When shall I die, and be relieved of the responsibility of seeing a Universe which I do not use? I wish to exchange this flash-of-lightning faith for continuous daylight, this fever-glow for a benign climate.
    Ralph Waldo Emerson (1803–1882)