http://scholars.ntou.edu.tw/handle/123456789/17024
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Chun-Shun Tseng | en_US |
dc.contributor.author | Ya-Yun Jheng | en_US |
dc.contributor.author | Sih-Yin Shen | en_US |
dc.contributor.author | Jung-Hua Wang | en_US |
dc.date.accessioned | 2021-06-04T06:55:05Z | - |
dc.date.available | 2021-06-04T06:55:05Z | - |
dc.date.issued | 2008-06-01 | - |
dc.identifier.isbn | 978-1-4244-1822-0 | - |
dc.identifier.issn | 1089-778X | - |
dc.identifier.uri | https://ieeexplore.ieee.org/document/4631226 | - |
dc.identifier.uri | http://scholars.ntou.edu.tw/handle/123456789/17024 | - |
dc.description.abstract | This paper presents an eavesdropper-proof algorithm that is capable of fast generating symmetric (secret) keys. Instead of literally exchanging secret keys, both the sender and receiver adopt a mirroring process based on an improved Hebbian rule that uses identical random inputs to separately train on their reciprocal outputs to generate a pair of exactly identical secret key strings. Important parameters are elaborately characterized to implement a fast information transmission for ephemeral key exchanging. We show that performance optimization can be achieved by coordinating the parameters. One essential feature of the proposed algorithm is that even an eavesdropper who acquires entire structure of the algorithm and the transmission data still has no chance to decrypt the encrypted message, thus ensuring security in the subsequent encryption task. Moreover, computation load is well bounded in an acceptable range despite the increasing key length. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.subject | Cryptography | en_US |
dc.subject | Strontium | en_US |
dc.subject | Security | en_US |
dc.subject | Algorithm design and analysis | en_US |
dc.subject | Computational efficiency | en_US |
dc.subject | Receivers | en_US |
dc.subject | Elliptic curve cryptography | en_US |
dc.title | Fast Symmetric Keys Generation via Mutual Mirroring Process | en_US |
dc.type | conference paper | en_US |
dc.relation.conference | 2008 IEEE Congress on Evolutionary Computation (IEEE World Congress on Computational Intelligence) | en_US |
dc.relation.conference | Hong Kong, China | en_US |
dc.identifier.doi | 10.1109/CEC.2008.4631226 | - |
item.cerifentitytype | Publications | - |
item.openairetype | conference paper | - |
item.openairecristype | http://purl.org/coar/resource_type/c_5794 | - |
item.fulltext | no fulltext | - |
item.grantfulltext | none | - |
item.languageiso639-1 | en | - |
crisitem.author.dept | College of Electrical Engineering and Computer Science | - |
crisitem.author.dept | Department of Electrical Engineering | - |
crisitem.author.dept | National Taiwan Ocean University,NTOU | - |
crisitem.author.parentorg | National Taiwan Ocean University,NTOU | - |
crisitem.author.parentorg | College of Electrical Engineering and Computer Science | - |
顯示於: | 電機工程學系 |
在 IR 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。