CRYPTANALYSIS OF KEY EXCHANGE METHOD USING
COMPUTATIONAL INTELLIGENCE GUIDED MULTILAYER
PERCEPTRON IN WIRELESS COMMUNICATION
(CKEMLP)
A. Sarkar, and J. Mandal. Advanced Computational Intelligence: An International Journal (ACII), 1 (1):
01-09(July 2014)
Abstract
In this paper, a cryptanalysis of key exchange method using multilayer perceptron (CKEMLP) has been
proposed in wireless communication of data/information. In this proposed CKEMLP technique both sender
and receiver uses an identical multilayer perceptrons for synchronization between them. After achieving
the full synchronization weights vectors of both the parties’ becomes identical and this identical weight
vector is used as a secret session key for encryption/decryption. Different types of possible attacks during
synchronization phase are introduced in this paper. Among different types of attacks some of them can be
easily prevented by increasing the synaptic depth L. But few attacks are also there which has a great
success rate.
%0 Journal Article
%1 sarkar2014cryptanalysis
%A Sarkar, Arindam
%A Mandal, J. K.
%D 2014
%J Advanced Computational Intelligence: An International Journal (ACII)
%K Communication Cryptanalysis Encryption Wireless
%N 1
%P 01-09
%T CRYPTANALYSIS OF KEY EXCHANGE METHOD USING
COMPUTATIONAL INTELLIGENCE GUIDED MULTILAYER
PERCEPTRON IN WIRELESS COMMUNICATION
(CKEMLP)
%U http://airccse.org/journal/acii/papers/1114acii01.pdf
%V 1
%X In this paper, a cryptanalysis of key exchange method using multilayer perceptron (CKEMLP) has been
proposed in wireless communication of data/information. In this proposed CKEMLP technique both sender
and receiver uses an identical multilayer perceptrons for synchronization between them. After achieving
the full synchronization weights vectors of both the parties’ becomes identical and this identical weight
vector is used as a secret session key for encryption/decryption. Different types of possible attacks during
synchronization phase are introduced in this paper. Among different types of attacks some of them can be
easily prevented by increasing the synaptic depth L. But few attacks are also there which has a great
success rate.
@article{sarkar2014cryptanalysis,
abstract = {In this paper, a cryptanalysis of key exchange method using multilayer perceptron (CKEMLP) has been
proposed in wireless communication of data/information. In this proposed CKEMLP technique both sender
and receiver uses an identical multilayer perceptrons for synchronization between them. After achieving
the full synchronization weights vectors of both the parties’ becomes identical and this identical weight
vector is used as a secret session key for encryption/decryption. Different types of possible attacks during
synchronization phase are introduced in this paper. Among different types of attacks some of them can be
easily prevented by increasing the synaptic depth L. But few attacks are also there which has a great
success rate.},
added-at = {2018-06-04T09:07:13.000+0200},
author = {Sarkar, Arindam and Mandal, J. K.},
biburl = {https://www.bibsonomy.org/bibtex/251db285881e4dc77f0bf6cc46b3b55cc/janakirob},
interhash = {91d632c7c3711a8d4d3901637f0a8db3},
intrahash = {51db285881e4dc77f0bf6cc46b3b55cc},
journal = {Advanced Computational Intelligence: An International Journal (ACII)},
keywords = {Communication Cryptanalysis Encryption Wireless},
month = {July},
number = 1,
pages = {01-09},
timestamp = {2018-06-04T09:07:13.000+0200},
title = {CRYPTANALYSIS OF KEY EXCHANGE METHOD USING
COMPUTATIONAL INTELLIGENCE GUIDED MULTILAYER
PERCEPTRON IN WIRELESS COMMUNICATION
(CKEMLP)
},
url = {http://airccse.org/journal/acii/papers/1114acii01.pdf},
volume = 1,
year = 2014
}