高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

基于树形奇偶机的密钥交换优化方案

韩益亮 李鱼 李喆

韩益亮, 李鱼, 李喆. 基于树形奇偶机的密钥交换优化方案[J]. 电子与信息学报, 2021, 43(8): 2140-2148. doi: 10.11999/JEIT200633
引用本文: 韩益亮, 李鱼, 李喆. 基于树形奇偶机的密钥交换优化方案[J]. 电子与信息学报, 2021, 43(8): 2140-2148. doi: 10.11999/JEIT200633
Yiliang HAN, Yu LI, Zhe LI. A Key Exchange Optimization Scheme Based on Tree Parity Machine[J]. Journal of Electronics & Information Technology, 2021, 43(8): 2140-2148. doi: 10.11999/JEIT200633
Citation: Yiliang HAN, Yu LI, Zhe LI. A Key Exchange Optimization Scheme Based on Tree Parity Machine[J]. Journal of Electronics & Information Technology, 2021, 43(8): 2140-2148. doi: 10.11999/JEIT200633

基于树形奇偶机的密钥交换优化方案

doi: 10.11999/JEIT200633
基金项目: 国家自然科学基金(61572521),武警工程大学科研创新团队科学基金(KYTD201805),陕西省自然科学基础研究计划(2021-JM252)
详细信息
    作者简介:

    韩益亮:男,1977年生,博士,教授,研究方向为信息安全、神经密码学

    李鱼:男,1995年生,硕士生,研究方向为神经密码学

    李喆:男,1994年生,硕士生,研究方向为神经密码学

    通讯作者:

    韩益亮 hanyil@163.com

  • 中图分类号: TN918; TP309.7

A Key Exchange Optimization Scheme Based on Tree Parity Machine

Funds: The National Natural Science Foundation of China (61572521), The Scientific Foundation of the Scientific Research and Innovation Team of Engineering University of PAP (KYTD201805), The Natural Science Basic Research Plan in Shaanxi Province (2021JM252)
  • 摘要: 树形奇偶机(TPM)之间的相互同步学习能够用于实现密钥交换方案,方案的安全性取决于树形奇偶机的结构参数。为了得到使得密钥交换方案安全性高且计算量小的参数,该文提出基于树形奇偶机的密钥交换优化方案。首先,定义向量化的学习规则,提高树形奇偶机同步学习的时间效率。其次,改进针对树形奇偶机同步学习的合作攻击算法,使其能够自适应参数的变化。最后,通过仿真实验对方案进行了效率和安全性测试。实验结果表明,树形奇偶机的向量化能使同步时间减少约90%,但不会减少同步所需的步数,即不影响方案的安全性。在可用于生成512 bit固定长度密钥的结构参数中,(14, 14, 2)被合作攻击攻破的概率为0%,所需同步时间较少。因此,所提密钥交换优化方案是安全高效的。
  • 图  1  K=3和N=4的树形奇偶机

    图  2  KN同时变化对攻击成功率的影响

    图  3  单一参数变化对攻击成功率的影响

    图  4  向量化与非向量化的对比

    表  1  变量说明

    变量描述
    K隐藏层神经元数量
    N输入神经元数量
    L神经元权重所能取的最大值
    LBINL的二进制值的比特长度
    average_steps平均每次神经密钥交换所需的同步步数
    average_time平均每次神经密钥交换所需的同步时间
    X随机输入向量
    tauAAlice的vTPM的输出
    tauE攻击者Eve的vTPM的输出
    M合作攻击者的数量
    Steps同步的步数
    PGeometric几何攻击的成功概率
    PCooperating合作攻击的成功概率
    下载: 导出CSV

    表  2  参数组合

    KNLBINL
    46421
    44332或3
    43244或5或6或7
    55221
    53532或3
    52644
    64321
    62932或3
    62244
    73721
    72532或3
    82821
    81932或3
    92921
    91932或3
    102621
    101832或3
    112421
    111632或3
    122221
    121532或3
    132021
    131432或3
    141921
    141432或3
    下载: 导出CSV

    表  3  效率测试算法(算法1)

     输入:K, N, L
     输出:average_steps, average_time
     (1) total_steps, total_time ← 0
     (2) FOR i ←0 TO s DO
     (3)   Alice 用参数K,N,L初始化树形奇偶机
     (4)   Bob 用参数K,N,L初始化树形奇偶机
     (5)   steps ← 0
     (6)   将当前时间赋值给start_time
     (7)   WHILE 没有达到同步状态 DO
     (8)     生成随机输入向量${\boldsymbol{X}}$
     (9)     Alice 用${\boldsymbol{X}}$计算自己的输出结果
     (10)     Bob用${\boldsymbol{X}}$计算自己的输出结果
     (11)      IF tauA == tauB THEN
     (12)       Alice根据指定学习规则更新权值
     (13)       Bob 根据指定学习规则更新权值
     (14)      steps ← steps + 1
     (15)     将当前时间赋值给end_time ← current time
     (16)     计算每次同步时间each_time ← end_time –
            start_time
     (17)     更新总步数total_steps ← total_steps + steps
     (18)     更新总时间total_time ← total_time +
            each_time
     (19) 计算平均同步步数average_steps ← total_steps/s
     (20) 计算平均同步时间average_time ← total_time/s
     (21) END
    下载: 导出CSV

    表  4  安全性测试算法(算法2)

     输入:tauA, tauE, Eve, m, steps, average_steps
     输出:PCooperating
     (1) IF steps % 2 == 0 and steps >= average_steps/3 THEN
     (2)   FOR i ← 0 TO m DO
     (3)    IF tauA!= tauE[i] THEN
     (4)     Eve[i] 更新隐藏层输出
     (5)   选择出现次数最多的隐藏层输出
     (6)   FOR i ← 0 TO m DO
     (7)    将出现次数最多的隐藏层输出赋值给Eve[i]
     (8)    Eve[i]根据学习规则更新权值
     (9) ELSE
     (10)    FOR i ← 0 TO m DO
     (11)     IF tauA == tauE THEN
     (12)      Eve[i]根据学习规则更新权值
     (13)     ELSE
     (14)      Eve[i] 更新隐藏层输出
     (15)      Eve[i] 根据学习规则更新权值
     (16) END
    下载: 导出CSV

    表  5  向量化方法对比

    方案向量化方法适用编程语言优化参数安全性测试
    文献[16]NumPy库Python
    本文定义向量化学习规则不限(14, 14, 2)
    下载: 导出CSV

    表  6  仿真结果(1000次)

    (K, N, L)平均步数平均时间(s)几何攻击
    成功率(%)
    合作攻击
    成功率(%)
    (K, N, L)平均步数平均时间(s)几何攻击
    成功率(%)
    合作攻击
    成功率(%)
    (4, 64, 1)51.7420.019234.499.1(9, 19, 2)333.0060.152700.1
    (4, 43, 2)179.0830.060617.451.9(9, 19, 3)1218.4680.6346
    (4, 43, 3)456.6750.69677.128.4(10, 26, 1)78.4880.06006.874.4
    (4, 32, 4)870.9720.32763.919.8(10, 18, 2)359.2980.308000.2
    (4, 32, 5)1493.5570.43591.714.8(10, 18, 3)1297.0290.6672
    (4, 32, 6)2325.5631.2867(11, 24, 1)80.7590.08494.067.4%
    (5, 52, 1)58.0710.020828.197.8(11, 16, 2)369.2920.255700
    (5, 35, 2)228.8390.09856.122.3(11, 16, 3)1296.3740.416500
    (5, 35, 3)696.4460.25770.66.4(11, 12, 4)2676.7330.7485
    (5, 26, 4)1661.6321.2144(12, 22, 1)83.8010.04154.064.6
    (6, 43, 1)65.5410.032719.594.6(12, 15, 2)382.9030.129200
    (6, 29, 2)280.3470.27332.68.1(12, 15, 3)1265.1860.384100
    (6, 29, 3)950.2470.7407(12, 12, 4)2886.0520.8301
    (7, 37, 1)68.8210.034414.093.6(13, 20, 1)84.4820.02703.760.2
    (7, 25, 2)303.1970.21870.71.9(13, 14, 2)381.4640.142900
    (7, 25, 3)1117.5171.0476(13, 14, 3)1281.1360.5002
    (8, 32, 1)72.3270.03039.985.9(14, 19, 1)86.0020.06022.658.6
    (8, 22, 2)328.4830.11810.20.6(14, 14, 2)388.8560.121900
    (8, 22, 3)1197.1730.8345(14, 14, 3)1380.6060.6708
    (9, 29, 1)76.6210.08017.782.7
    下载: 导出CSV

    表  7  效率对比

    方案密钥长度(bit)平均时间(ms)
    文献[17]51292.1294
    文献[18]25611.9198
    文献[22]512235.4931
    本文5126.0496
    下载: 导出CSV
  • [1] 蒋瀚, 刘怡然, 宋祥福, 等. 隐私保护机器学习的密码学方法[J]. 电子与信息学报, 2020, 42(5): 1068–1078. doi: 10.11999/JEIT190887

    JIANG Han, LIU Yiran, SONG Xiangfu, et al. Cryptographic approaches for privacy-preserving machine learning[J]. Journal of Electronics &Information Technology, 2020, 42(5): 1068–1078. doi: 10.11999/JEIT190887
    [2] ALANI M M. Applications of machine learning in cryptography: A survey[C]. The 3rd International Conference on Cryptography, Security and Privacy, Kuala Lumpur, Malaysia, 2019: 23–27.
    [3] KANTER I, KINZEL W, and KANTER E. Secure exchange of information by synchronization of neural networks[J]. Europhysics Letters, 2002, 57(1): 141–147. doi: 10.1209/epl/i2002-00552-9
    [4] KINZEL W and KANTER I. Interacting Neural Networks and Cryptography[M]. KRAMER B. Advances in Solid State Physics. Berlin: Springer, 2002: 383–391.
    [5] KLIMOV A, MITYAGIN A, and SHAMIR A. Analysis of neural cryptography[C]. The 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, 2002: 288–298.
    [6] SHACHAM L N, KLEIN E, MISLOVATY R, et al. Cooperating attackers in neural cryptography[J]. Physical Review E, 2004, 69(6): 066137. doi: 10.1103/PhysRevE.69.066137
    [7] RUTTOR A, KINZEL W, and KANTER I. Neural cryptography with queries[J]. Journal of Statistical Mechanics: Theory and Experiment, 2005, 2005: P01009. doi: 10.1088/1742-5468/2005/01/P01009
    [8] ALLAM A M, ABBAS H M, and EL-KHARASHI M W. Authenticated key exchange protocol using neural cryptography with secret boundaries[C]. 2013 International Joint Conference on Neural Networks, Dallas, USA, 2013: 1–8.
    [9] PAL S K and MISHRA S. An TPM based approach for generation of secret key[J]. International Journal of Computer Network and Information Security, 2019, 11(10): 45–50. doi: 10.5815/ijcnis.2019.10.06
    [10] DONG Tao and HUANG Tingwen. Neural cryptography based on complex-valued neural network[J]. IEEE Transactions on Neural Networks and Learning Systems, 2020, 31(11): 4999–5004. doi: 10.1109/TNNLS.2019.2955165
    [11] SARKAR A. Multilayer neural network synchronized secured session key based encryption in wireless communication[J]. IAES International Journal of Artificial Intelligence, 2019, 8(1): 44–53. doi: 10.11591/ijai.v8.i1.pp44-53
    [12] SARKAR A, DEY J, KARFORMA S, et al. Notice of retraction coupled tree parity machines: Synchronized secured session key based encryption in online transaction[J]. Aptikom Journal on Computer Science and Information Technologies, 2019, 4(1): 27–36. doi: 10.11591/APTIKOM.J.CSIT.133
    [13] 肖成龙, 孙颖, 林邦姜, 等. 基于神经网络与复合离散混沌系统的双重加密方法[J]. 电子与信息学报, 2020, 42(3): 687–694. doi: 10.11999/JEIT190213

    XIAO Chenglong, SUN Ying, LIN Bangjiang, et al. Double encryption method based on neural network and composite discrete chaotic system[J]. Journal of Electronics &Information Technology, 2020, 42(3): 687–694. doi: 10.11999/JEIT190213
    [14] SABALLUS B, VOLKMER M, and WALLNER S. Secure group communication in Ad-Hoc networks using tree parity machines[C]. Communication in Distributed Systems-15. ITG/GI Symposium, Bern, Switzerland, 2007: 1–12.
    [15] SANTHANALAKSHMI S, SANGEETA K, and PATRA G K. Design of group key agreement protocol using neural key synchronization[J]. Journal of Interdisciplinary Mathematics, 2020, 23(2): 435–451. doi: 10.1080/09720502.2020.1731956
    [16] CHOURASIA S, CHAKRAPANI H B, DAS Q, et al. Vectorized neural key exchange using tree parity machine[J]. Compusoft: An International Journal of Advanced Computer Technology, 2019, 8(5): 3140–3145.
    [17] WALTER É S, FUERTES W, and LASCANO E. On the development of an optimal structure of tree parity machine for the establishment of a cryptographic key[J]. Security and Communication Networks, 2019, 2019: 8214681. doi: 10.1155/2019/8214681
    [18] BOS J, COSTELLO C J, DUCAS L, et al. Frodo: Take off the ring! Practical, quantum-secure key exchange from LWE[C]. The 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 2016: 1006–1018.
    [19] RUTTOR A. Neural synchronization and cryptography[D]. [Ph.D. dissertation], Universität Würzburg, 2006.
    [20] MISLOVATY R, PERCHENOK Y, KANTER I, et al. Secure key-exchange protocol with an absence of injective functions[J]. Physical Review E, 2002, 66(6): 066102. doi: 10.1103/PhysRevE.66.066102
    [21] KINZEL W. Theory of Interacting Neural Networks[M]. BORNHOLDT S and SCHUSTER H G. Handbook of Graphs and Networks: From the Genome to the Internet. Weinheim, Germany, Wiley, 2003: 199–220.
    [22] DANIEL R M, RAJSINGH E B, and SILAS S. An efficient eCK secure identity based Two Party Authenticated Key Agreement scheme with security against active adversaries[J]. Information and Computation, 2020, 275: 104630. doi: 10.1016/j.ic.2020.104630
  • 加载中
图(4) / 表(7)
计量
  • 文章访问数:  1012
  • HTML全文浏览量:  556
  • PDF下载量:  118
  • 被引次数: 0
出版历程
  • 收稿日期:  2020-07-29
  • 修回日期:  2020-12-25
  • 网络出版日期:  2020-12-31
  • 刊出日期:  2021-08-10

目录

    /

    返回文章
    返回