Usage of hypercomplex numbers in a cryptographic key agreement protocol based on neural networks

  • Pavel P. Urbanovich Belarusian State Technological University, 13a Svyardlova Street, Minsk 220006, Belarus; The John Paul II Catholic University of Lublin, 14 Racławickie Alley, Lublin 20-950, Poland
  • Nadzeya P. Shutko Belarusian State Technological University, 13a Svyardlova Street, Minsk 220006, Belarus

Abstract

We analyse the features of the structural and functional organisation of two interacting neural networks based on the known architecture in the form of a tree parity machine (TPM) using algebras of real and hypercomplex numbers. Such machines are used as an alternative to the Diffie – Hellman algorithm to generate a shared secret cryptographic key between two parties. The main elements of mathematical models of TPMs, operating on the basis of the listed algebras, are considered. The features of the software implementation of a system simulator based on interacting TРMs are described, and the results of using the developed tool for analysing the dynamics of processes in the system under consideration are presented. Mutual learning and data exchange of two TРMs are realised based on the transmission control and Internet protocols (TCP/IP). The synchronisation state of the networks is determined by the equality of the hashes that each party calculates based on the secure hash algorithm. A hash size of 512 bits are generated by transforming the string representation of the current input vector of neuron weights. The effectiveness of possible attempts by a third party to synchronise with two legitimate TPMs operating on the basis of algebras of hypercomplex numbers is assessed.

Author Biographies

Pavel P. Urbanovich, Belarusian State Technological University, 13a Svyardlova Street, Minsk 220006, Belarus; The John Paul II Catholic University of Lublin, 14 Racławickie Alley, Lublin 20-950, Poland

doctor of science (engineering), full professor; professor at the department of information systems and technologies, faculty of information technologies, Belarusian State Technological University, and visiting professor at the John Paul II Catholic University of Lublin

Nadzeya P. Shutko, Belarusian State Technological University, 13a Svyardlova Street, Minsk 220006, Belarus

PhD (engineering), docent; associate professor at the department of informatics and web-design, faculty of information technologies

References

  1. Diffie W, Hellman M. New directions in cryptography. IEEE Transactions on Information Theory. 1976;22(6):644–654. DOI: 10.1109/TIT.1976.1055638.
  2. Kinzel W, Kanter I. Neural cryptography. In: Wang L, Rajapakse JC, Fukushima K, Lee SY, Yao X, editors. Proceedings of the 9th International conference on neural information processing, 2002. ICONIP’02; 2002 November 18–22; Singapore. Singapore: Orchid Country Club; 2002. p. 1351–1354. DOI: 10.1109/ICONIP.2002.1202841.
  3. Klimov A, Mityagin A, Shamir A. Analysis of neural cryptography. In: Zheng Y, editor. Advances in Cryptology – ASIACRYPT 2002. Berlin: Springer; 2002. p. 288–298 (Lecture notes in computer science; volume 2501). DOI: 10.1007/3-540-36178-2_18.
  4. Rosen-Zvi M, Kanter I, Kinzel W. Cryptography based on neural networks analytical results. Journal of Physics A: Mathematical and General. 2002;35(47):707–713. DOI: 10.1088/0305-4470/35/47/104.
  5. Płonkowski M, Urbanovich PP. Cryptographic transformation of information based on neural network technologies. Trudy Belorusskogo gosudarstvennogo tekhnologicheskogo universiteta. Seriya 6, Fiziko-matematicheskie nauki i informatika. 2005;13:161–164. Russian. EDN: YSCTHN.
  6. Płonkowski M, Urbanowicz Р. Liczby podwójne i ich modyfikacje w neurokryptografii. Przegląd Elektrotechniczny. 2002; 88(11b):340–341.
  7. Choi Y, Sim J, Kim L-S. CREMON: cryptography embedded on the convolutional neural network accelerator. IEEE Transactions on Circuits and Systems II: Express Briefs. 2020;67(12):3337–3341. DOI: 10.1109/TCSII.2020.2971580.
  8. Jeong S, Park C, Hong D, Seo C, Jho N. Neural cryptography based on generalized tree parity machine for real-life systems. Security and Communication Networks. 2021;11:1–12. DOI: 10.1155/2021/6680782.
  9. Sarkar A. Neural cryptography using optimal structure of neural networks. Applied Intelligence. 2021;51:8057–8066. DOI: 10.1007/ s10489-021-02334-1.
  10. Dourlens S. Neuro-cryptographie appliquée et neuro-cryptanalyse du DES. Paris: University of Paris; 1995. 218 p. DOI: 10.13140/ RG.2.2.35476.24960.
  11. Ruttor A. Neural synchronization and cryptography [dissertation]. Würzburg: Julius-Maximilians-Universität Würzburg; 2006. 120 p. DOI: 10.48550/arXiv.0711.2411.
  12. Płonkowski M, Urbanovich PP. Neural network-based cryptographic key synchronization in XML-based cryptographic transformation systems. Trudy Belorusskogo gosudarstvennogo tekhnologicheskogo universiteta. Seriya 6, Fiziko-matematicheskie nauki i informatika. 2006;14:152–155. Russian. EDN: HSLOUF.
  13. Ruttor А, Kinzel W, Kanter I. Dynamics of neural cryptography. Physical Review E. 2007;75(5):056104. DOI: 10.1103/PhysRevE.75.056104.
  14. Dolecki M, Kozera R. Distribution of the tree parity machine synchronization time. Advances in Science and Technology. 2013; 7(18):20–27. DOI: 10.5604/20804075.1049490.
  15. Urbanovich PP, Churikov KV. Comparative analysis of methods for mutual learning of neural networks when solving problems of confidential information exchange. Trudy BGTU. No. 6. Fiziko-matematicheskie nauki i informatika. 2010;6:163–166. Russian. EDN: TGUDVZ.
  16. Seoane LF, Ruttor A. Successful attack on permutation-parity-machine-based neural cryptography. Physical Review E. 2012; 85(2):025101. DOI: 10.1103/PhysRevE.85.025101.
  17. Shacham LN, Klein E, Mislovaty R, Kanter I, Kinzel W. Cooperating attackers in neural cryptography. Physical Review E. 2004; 69(6):066137. DOI: 10.1103/PhysRevE.69.066137.
  18. Kantor IL, Solodovnikov AS. Giperkompleksnye chisla [Hypercomplex numbers]. Moscow: Nauka; 1973. 144 p. Russian.
  19. Płonkowski M, Urbanowicz Р, Lisica Е. Wykorzystanie kwaternionów w protokole uzgadniania klucza kryptograficznego, opartym na architekturach sieci neuronowych TPQM. Przegląd Elektrotechniczny. 2010;86(7):90–91.
  20. Dong T, Huang T. Neural cryptography based on complex-valued neural network. IEEE Transactions on Neural Networks and Learning Systems. 2020;31(11):4999–5004. DOI: 10.1109/TNNLS.2019.2955165.
  21. Zhang Y, Wang W, Zhang H. Neural cryptography based оn quaternion-valued neural network. International Journal of Innovative Computing, Information and Control. 2022;6(22):1871–1883.
  22. Wu J, Xu L, Wu F, Kong Y, Senhadji L, Shu H. Deep octonion networks. Neurocomputing. 2019;397:179–191. DOI: 10.1016/j. neucom.2020.02.053.
  23. Takahashi K, Fujita M, Hashimoto M. Remarks on octonion-valued neural networks with application to robot manipulator control. In: 2021 IEEE International Conference on Mechatronics (ICM); 2021 March 7–9; Kashiwa, Japan. [S. l.]: IEEE; 2021. p. 1–6. DOI: 10.1109/ICM46511.2021.9385617.
  24. Cariow A, Cariowa G. Fast algorithms for deep octonion networks. IEEE Transactions on Neural Networks and Learning Systems. 2023;34(1):543–548. DOI: 10.1109/TNNLS.2021.3124131.
  25. Ricotta C, Podani J. On some properties of the Bray – Curtis dissimilarity and their ecological meaning. Ecological Complexity. 2017;31:201–205. DOI: 10.1016/j.ecocom.2017.07.003.
Published
2024-08-01
Keywords: neural cryptography, tree parity machines, hypercomplex numbers, networks mutual learning
Supporting Agencies The authors express their gratitude to the director of the Institute of Mathematics, Computer Science and Landscape Design of the John Paul II Catholic University of Lublin doctor of science M. Plonkowski for the help and information provided, which contributed to the improvement of the article content.
How to Cite
Urbanovich, P. P., & Shutko, N. P. (2024). Usage of hypercomplex numbers in a cryptographic key agreement protocol based on neural networks. Journal of the Belarusian State University. Mathematics and Informatics, 2, 81-92. Retrieved from https://journals.bsu.by/index.php/mathematics/article/view/5869
Section
Theoretical Foundations of Computer Science