Article metrics

  • citations in SCindeks: [1]
  • citations in CrossRef:[1]
  • citations in Google Scholar:[=>]
  • visits in previous 30 days:6
  • full-text downloads in 30 days:6
article: 4 from 34  
Back back to result list
Vojnotehnički glasnik
2016, vol. 64, iss. 2, pp. 483-495
article language: English
document type: Review Paper
published on: 27/04/2016
doi: 10.5937/vojtehg64-8877
Creative Commons License 4.0
Neural cryptography
General Staff of Serbian Army Forces, Department for Telecommunication and Informatics (J-6), Centre for Applied Mathematics and Electronics, Belgrade



Neural cryptography based on the tree parity machine (TPM) is presented in this paper. A mutual learning-based synchronization of two networks is studied. The training of the TPM based on the Hebbian, anti-Hebbian and random walk as well as on the secure key generation protocol is described. The most important attacks on the key generation process are shown.


Tree parity machine; Neural networks; Cryptography


*** (2004) Neural Cryptography. CyberTrone, Code Project websiteRR [Internet], Dostupno na:, Preuzeto: 19.08.2015.godine
Abed, S. (2012) Cryptography Using Artificial Neural Network. Al-dananeer, 14(1), pp. 378-402
Basin, D., Peterson, K. (2015) Information Security and Cryptography. Springer
Dolecki, M., Kozera, R. (2015) Distance of the initial weights of tree parity machine drawn from different distributions. Advances in Science and Technology Research Journal, 9: 137-142
El-Zoghabi, A., Yassin, A.H., Hussein, H.H. (2013) Survey Report on Cryptography Based on Neural Networks. International Journal of Emerging Technology and Advanced Engineering, 3(12), pp. 456-462
Godhavari, T., Alamelu, N.R. (2010) Cryptography Using Neural Network. Technology World Quarterly Journal, 2(4), pp. 49-54
Kanter, I., Kinzel, W., Kanter, E. (2002) Secure exchange of information by synchronization of neural networks. Europhysics Letters (EPL), 57(1): 141-147
Kinzel, W., Kanter, I. (2002) Neural Cryptography. Cornel University Library, [Internet], Dostupno na, Preuzeto: 20.08.2015.godine
Klein, E., Mislovaty, R., Kanter, R., Ruttor, A., Kinzel, W. (2004) Synchronization of neural networks by mutual learning and its application to cryptography. in: Advances in Neural Information Processing Systems, pp. 689-696
Klimov, A., Mityagin, A., Shamir, A. (2002) Analysis of Neural Cryptography. Lecture Notes in Computer Science, str. 288-298
Mislovaty, R., Perchenok, Y., Kinzel, W., Kanter, I. (2002) Phys. Rev. E, E 66, 066102
Prabakaran, N., Loganathan, P., Vivekanandan, P. (2008) Neural Cryptography with Multiple Transfer Functions and Multiple Learning Rule. International Journal of Soft Computing, 3(3), pp. 177-181
Protić, D.D. (2015) Feedforward neuronske mreže - Levenberg-Marquardt optimizacija i Optimal Brain Surgeon pruning. Vojnotehnički glasnik, vol. 63, br. 3, str. 11-28
Rosen-Zvi, M., Kanter, I., Kinzel, W. (2002) Cryptography based on neural networks analytical results. Journal of Physics A: Mathematical and General, 35(47): L707-L713
Rouse, M. (2015) Nonrepudiation. TechTarget, [Internet] Dostupno na, Preuzeto: 14.08.2015.godine
Ruttor, A. (2006) Neural Synchronization and Cryptography. Wurzburg: Fakultat fur Phyisik und Astronomie, Dissertation zur Erlangung des naturwissenschaftlichen Doktorgrades der Bayerischen Julius- Maximilians-Universitat
Ruttor, A., Kinzel, W., Shacham, L., Kanter, I. (2004) Neural cryptography with feedback. Cornel University Library, [Internet], Dostupno na:, Preuzeto: 17.08.2015.godine
Wang, D. (2015) Neural Synchronization Using Genetic Algorithm for Secure Key Establishment. Journal of Engineering Science and Technology Review, 8(2), pp. 152-156
Yu, W., Cao, J. (2006) Cryptography based on delayed chaotic neural networks. Physics Letters A, 356(4-5): 333-338
Zhou, J., Xu, Q., Pei, W., He, Z., Szu, H. (2004) Step to improve neural cryptography against flipping attacks. International Journal of Neural Systems, 14(06): 393-405