%0 Conference Proceedings %T Threshold Method of Detecting Long-Time TPM Synchronization %+ John Paul II Catholic University of Lublin (KUL) %+ Warsaw University of Life Sciences (SGGW) %A Dolecki, Michał %A Kozera, Ryszard %Z Part 5: Various Aspects of Computer Security %< avec comité de lecture %( Lecture Notes in Computer Science %B 12th International Conference on Information Systems and Industrial Management (CISIM) %C Krakow, Poland %Y Khalid Saeed %Y Rituparna Chaki %Y Agostino Cortesi %Y Sławomir Wierzchoń %I Springer %3 Computer Information Systems and Industrial Management %V LNCS-8104 %P 241-252 %8 2013-09-25 %D 2013 %R 10.1007/978-3-642-40925-7_23 %K neural networks %K Tree Parity Machine %K key exchange protocol %Z Computer Science [cs] %Z Humanities and Social Sciences/Library and information sciencesConference papers %X The phenomenon of neural networks synchronization by mutual learning can be used to construct key exchange protocol on an open channel. For security of this protocol it is important to minimize knowledge about synchronizing networks available to the potential attacker. The method presented herein permits evaluating the level of synchronization before it terminates. Subsequently, this research enables to assess the synchronizations, which are likely to be considered as long-time synchronizations. Once that occurs, it is preferable to launch another synchronization with the new selected weights as there is a high probability (as previously shown) that a new synchronization belongs to the short one. %G English %Z TC 8 %2 https://inria.hal.science/hal-01496071/document %2 https://inria.hal.science/hal-01496071/file/978-3-642-40925-7_23_Chapter.pdf %L hal-01496071 %U https://inria.hal.science/hal-01496071 %~ SHS %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-TC8 %~ IFIP-CISIM %~ IFIP-LNCS-8104