and as a result the outputs of all the created machines
will be equal.
The efficiency of the genetic attack mostly de-
pends on the algorithm which selects the fittest ma-
chine. In the ideal case, the tree parity machine that
has the same sequence of internal representations as
A is never discarded. However, in case of permuta-
tion parity machines, it is not possible to determine
which attacking machines should be discarded and
which should be kept.
5 CONCLUSIONS
Permutation parity machines are binary variants of
tree parity machines and may be used to implement
a key-agreement mechanism based on their ability to
perform synchronization by mutual learning. More-
over, inner and outer rounds involved in the learning
rule phase make the permutation parity machines suit-
able for bit-packaging implementations accelerating
the synchronization process while keeping the secu-
rity of the protocol.
The attacks described in this paper were originally
proposed for a key exchange protocol based on tree
parity machines. In this case, the weights gradually
change by using the learning rule such that a proper
weight adaptation of the attacker’s machine during
a single iteration increases the probability of further
proper weight adaptations that eventually lead to a
successful attack.
On the other hand, in the case of permutation par-
ity machines, the output during each inner round is
produced by a different set of weights and the assign-
ment of the weights becomes a series of independent
events when G ≫ K × N. Thus a proper weight adap-
tation performed by the attacker during an inner round
barely influences the result of the following adapta-
tions and therefore the success of these kind of attacks
is unlikely.
Consequently, permutation parity machines seem
to form a viable alternative to tree parity machines in
neural cryptography.
ACKNOWLEDGEMENTS
O. M. Reyes acknowledges the support from German
Academic Exchange Service (DAAD) and Colom-
bian Institute for the Development of Science and
Technology, “Francisco Jos´e de Caldas” – Colcien-
cias.
REFERENCES
Behroozi, N. (2005). Realisierung eines Em-
bedded Systems zur Integration eines
Schl¨usselaustauschverfahrens mittels Tree Par-
ity Machines in Wireless LAN. Master’s thesis,
Hamburg University of Technology, Hamburg.
Ein-Dort, L. and Kanter, I. (1999). Confidence in prediction
by neural networks. Phys. Rev. E, 60(1):799–802.
Kanter, I., Kinzel, W., and Kanter, E. (2002). Secure ex-
change of information by synchronization of neural
networks. Europhys. Lett., 57(1):141–147.
Klimov, A., Mityaguine, A., and Shamir, A. (2003). Anal-
ysis of neural cryptography. In Zheng, Y., editor, Ad-
vances in Cryptology - ASIACRYPT 2002, pages 288–
298, Heidelberg. Springer.
Menezes, A., van Oorschot, P., and Vanstone, S. (1996).
Handbook of applied cryptography. CRC Press, Boca
Raton, FL.
Mislovaty, R., Kanter, I., and Kinzel, W. (2002). Secure
key-exchange protocol with an absence of injective
functions. Phys. Rev. E, 66:066102.
Reyes, O., Kopitzke, I., and Zimmermann, K.-H. (2009).
Permutation parity machines for neural synchroniza-
tion. J. Phys. A, 42(19):195002.
Rosen-Zvi, M., Kanter, I., and Kinzel, W. (2002a). Cryp-
tography based on neural networks - analytical results.
J. Phys. A, 35(47):L707–L713.
Rosen-Zvi, M., Klein, E., Kanter, I., and Kinzel, W.
(2002b). Mutual learning in a tree parity machine
and its application to cryptography. Phys. Rev. E,
66(6):066135.
Ruttor, A. (2006). Neural Synchronization and Cryptog-
raphy. PhD thesis, Julius-Maximilians-Universit¨at
W¨urzburg, W¨urzburg.
Ruttor, A., Kinzel, W., Kanter, I., and Nach, R. (2006).
Genetic attack on neural cryptography. Phys. Rev. E,
73(3):036121.
Schneier, B. (1996). Applied Cryptography: protocols, al-
gorithms and source code in C. Wiley, New York.
Shacham, L., Klein, E., Mislovaty, R., Kanter, I., and
Kinzel, W. (2004). Cooperating attackers in neural
cryptography. Phys. Rev. E, 69(6):066137.
Volkmer, M. and Schaumburg, A. (2004). Authenti-
cated tree parity machine key exchange. CoRR,
cs.CR/0408046.
Volkmer, M. and Wallmer, S. (2005a). Lightweight key ex-
change and stream cipher based solely on tree par-
ity machines. In ECRYPT Workshop on RFID and
Lightweight Crypto, volume July 14-15th, pages 102–
113, Graz, Austria.
Volkmer, M. and Wallmer, S. (2005b). Tree parity machine
rekeying architectures for embedded security. Cryp-
tology ePrint Archive, Report 2005(235).
Volkmer, M. and Wallner, S. (2005). Tree parity ma-
chine rekeying architectures. IEEE Trans. Comput.,
54(4):421–427.
KEY EXCHANGE PROTOCOL USING PERMUTATION PARITY MACHINES
501