350 rub
Journal Neurocomputers №6 for 2014 г.
Article in number:
Key distribution using artificial neuronet
Authors:
V. P. Dobritsa - Dr.Sc. (Phys.-Math.), Professor, Chair of the information Security and Communications Network, South-West State University, Kursk, Russia. E-mail: dobritsa@mail.ru
P. A. Sapelnikov - Post-graduate Student, Chair of the Information Security and Communications Network, South-West State University, Kursk, Russia. E-mail: eveyinihiko@gmail.com
V. N. Zhiltsov - Student, Chair of the Information Security and Communications Network, South-West State University, Kursk, Russia. E-mail: eveyinihiko@gmail.com
P. A. Sapelnikov - Post-graduate Student, Chair of the Information Security and Communications Network, South-West State University, Kursk, Russia. E-mail: eveyinihiko@gmail.com
V. N. Zhiltsov - Student, Chair of the Information Security and Communications Network, South-West State University, Kursk, Russia. E-mail: eveyinihiko@gmail.com
Abstract:
This article describes the key distribution method based on the ability of neural nets training with the teacher. If two neural nets will be trained on each other, they will be sync. There is a detailed description of the algorithm and the structure of such systems.
Pages: 19,55-21,57
References
- Philip D. WassermanNeuralcomputing: TheoryandPractice. M. 1992. 240 s.
- Forouzan B.A. Kriptografija i bezopasnost setejj: Ucheb. posobie. M.: Internet-Universitet Informacionnykh Tekhnologijj: BINOM. Laboratorija znanijj. 2010. 784 s.
- Dobrica V.P., Kanonnikov D.S. Nejjrosetevojj podkhod k raspredeleniju kljuchejj//Problemy informacionnojj bezopasnosti. Kompjuternye sistemy. 2010. № 3. S. 52-54.
- Fralenko V.P. Nejjrosetevoe shifrovanie s primeneniem arkhitektury «koder/dekoder» // Nejjrokompjutery: razrabotka, primenenie. 2010. № 5. S. 11-16.