350 rub
Journal Neurocomputers №6 for 2015 г.
Article in number:
Comparative analysis of the neural network approach to classical key distribution algorithms
Authors:
V.P. Dobritsa - Dr. Sc. (Phys.-Math.). Professor, Chair of the Information Security and Communications Network, South-West State University (Kursk). E-mail: dobritsa@mail.ru P.A. Sapelchenkov - Post-Graduate Student, Chair of the Information Security and Communications Network, South-West State University (Kursk). E-mail: eveyinihiko@gmail.com
Abstract:
Many modern techniques of public key distribution based on the Diffie-Hellman. This article compares the classical methods "Diffie-Hellman" and "ElGamal encryption" with neural network approach. A brief description of the algorithms and excerpts from the previous article on the combined method. A brief analysis of each algorithm. In conclusion, the paper analyzes the complexity of the combined method. The aim of future research is to write software for the simulation of the developed method. In conclusion, it should be noted that the neural network technology is a promising direction for secure data transmission, and cryptography in general.
Pages: 18-22
References

 

  1. Protokol Diffi-KHellmana // Vikipedija - Svobodnaja ehnciklopedija // https://ru.wikipedia.org/wiki/Protokol_Diffi_-_KHellmana [EHlektronnyjj resurs.]
  2. Dobrica V.P., Sapelchenkov P.A., ZHilcov V.N. Raspredelenie kljuchejj s ispolzovaniem iskusstvennojj nejjroseti // Nejjrokompjutery. 2014. № 6. S. 19-21.
  3. Dobrica V.P., Kanonnikov D.S. Nejjrosetevojj podkhod k raspredeleniju kljuchejj // Problemy informacionnojj bezopasnosti. Kompjuternye sistemy. 2010. № 3. S. 52-54.
  4. Dobrica V.P., Lipunov A.A. SHifrator na osnove nejjroseti // Izv. JUgo-Zapadnogo gosudarstvennogo universiteta. 2011. № 5 (38). CH. 1.S. 93-97.
  5. Philip D. Wasserman Neural computing: Theory and Practice. M. 1992. 240 s.