Journal of the Belarusian State University. Mathematics and Informatics
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive
Guidelines for authors

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Journal of the Belarusian State University. Mathematics and Informatics:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Journal of the Belarusian State University. Mathematics and Informatics, 2024, Volume 2, Pages 81–92 (Mi bgumi688)  

Theoretical foundations of computer science

Usage of hypercomplex numbers in a cryptographic key agreement protocol based on neural networks

P. P. Urbanovichab, N. P. Shutkob

a The John Paul II Catholic University of Lublin, 14 Racławickie Alley, Lublin 20-950, Poland
b Belarusian State Technological University, 13a Svyardlova Street, Minsk 220006, Belarus
References:
Abstract: We analyse the features of the structural and functional organisation of two interacting neural networks based on the known architecture in the form of a tree parity machine (TPM) using algebras of real and hypercomplex numbers. Such machines are used as an alternative to the Diffie – Hellman algorithm to generate a shared secret cryptographic key between two parties. The main elements of mathematical models of TPMs, operating on the basis of the listed algebras, are considered. The features of the software implementation of a system simulator based on interacting TРMs are described, and the results of using the developed tool for analysing the dynamics of processes in the system under consideration are presented. Mutual learning and data exchange of two TРMs are realised based on the transmission control and Internet protocols (TCP/IP). The synchronisation state of the networks is determined by the equality of the hashes that each party calculates based on the secure hash algorithm. A hash size of 512 bits are generated by transforming the string representation of the current input vector of neuron weights. The effectiveness of possible attempts by a third party to synchronise with two legitimate TPMs operating on the basis of algebras of hypercomplex numbers is assessed.
Keywords: neural cryptography; tree parity machines; hypercomplex numbers; networks mutual learning
Received: 03.11.2023
Revised: 27.06.2024
Accepted: 27.06.2024
Document Type: Article
UDC: 004.032.26:004.056.55
Language: English
Citation: P. P. Urbanovich, N. P. Shutko, “Usage of hypercomplex numbers in a cryptographic key agreement protocol based on neural networks”, Journal of the Belarusian State University. Mathematics and Informatics, 2 (2024), 81–92
Citation in format AMSBIB
\Bibitem{UrbShu24}
\by P.~P.~Urbanovich, N.~P.~Shutko
\paper Usage of hypercomplex numbers in a cryptographic key agreement protocol based on neural networks
\jour Journal of the Belarusian State University. Mathematics and Informatics
\yr 2024
\vol 2
\pages 81--92
\mathnet{http://mi.mathnet.ru/bgumi688}
Linking options:
  • https://www.mathnet.ru/eng/bgumi688
  • https://www.mathnet.ru/eng/bgumi/v2/p81
  • Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Journal of the Belarusian State University. Mathematics and Informatics
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2025