Skip to main content

Showing 51–100 of 117 results for author: Kanter, I

.
  1. arXiv:0806.4291   

    nlin.CD

    Chaos Pass Filter: Linear Response of Synchronized Chaotic Systems

    Authors: Wolfgang Kinzel, Johannes Kestler, Ido Kanter

    Abstract: The linear response of synchronized chaotic units with delayed couplings and feedback to small external perturbations is investigated in the context of communication with chaos synchronization. For iterated chaotic maps, the distribution of distances is calculated numerically and, for some special cases, analytically as well. Depending on model parameters, this distribution has power law tails l… ▽ More

    Submitted 4 February, 2013; v1 submitted 26 June, 2008; originally announced June 2008.

    Comments: Outdated by https://arxiv.boxedpaper.com/abs/1301.6929

  2. arXiv:0806.3763  [pdf, ps, other

    cond-mat.stat-mech

    Shannon Meets Carnot: Generalized Second Thermodynamic Law

    Authors: Ori Shental, Ido Kanter

    Abstract: The classical thermodynamic laws fail to capture the behavior of systems with energy Hamiltonian which is an explicit function of the temperature. Such Hamiltonian arises, for example, in modeling information processing systems, like communication channels, as thermal systems. Here we generalize the second thermodynamic law to encompass systems with temperature-dependent energy levels,… ▽ More

    Submitted 23 June, 2008; originally announced June 2008.

  3. arXiv:0806.3133  [pdf, ps, other

    cs.IT

    Shannon Meets Carnot: Mutual Information Via Thermodynamics

    Authors: Ori Shental, Ido Kanter

    Abstract: In this contribution, the Gaussian channel is represented as an equivalent thermal system allowing to express its input-output mutual information in terms of thermodynamic quantities. This thermodynamic description of the mutual information is based upon a generalization of the $2^{nd}$ thermodynamic law and provides an alternative proof to the Guo-Shamai-Verdú theorem, giving an intriguing conn… ▽ More

    Submitted 19 June, 2008; originally announced June 2008.

  4. Public Channel Cryptography: Chaos Synchronization and Hilbert's Tenth Problem

    Authors: Ido Kanter, Evi Kopelowitz, Wolfgang Kinzel

    Abstract: The synchronization process of two mutually delayed coupled deterministic chaotic maps is demonstrated both analytically and numerically. The synchronization is preserved when the mutually transmitted signal is concealed by two commutative private filters that are placed on each end of the communication channel. We demonstrate that when the transmitted signal is a convolution of the truncated ti… ▽ More

    Submitted 5 June, 2008; originally announced June 2008.

  5. Patterns of Chaos Synchronization

    Authors: Johannes Kestler, Evi Kopelowitz, Ido Kanter, Wolfgang Kinzel

    Abstract: Small networks of chaotic units which are coupled by their time-delayed variables, are investigated. In spite of the time delay, the units can synchronize isochronally, i.e. without time shift. Moreover, networks can not only synchronize completely, but can also split into different synchronized sublattices. These synchronization patterns are stable attractors of the network dynamics. Different… ▽ More

    Submitted 3 January, 2008; originally announced January 2008.

  6. Chaos Synchronization with Dynamic Filters: Two Way is Better Than One Way

    Authors: Ido Kanter, Evi Kopelowitz, Johannes Kestler, Wolfgang Kinzel

    Abstract: Two chaotic systems which interact by mutually exchanging a signal built from their delayed internal variables, can synchronize. A third unit may be able to record and to manipulate the exchanged signal. Can the third unit synchronize to the common chaotic trajectory, as well? If all parameters of the system are public, a proof is given that the recording system can synchronize as well. However,… ▽ More

    Submitted 17 December, 2007; originally announced December 2007.

  7. arXiv:0706.1437  [pdf, ps, other

    physics.optics physics.bio-ph

    Spiking Optical Patterns and Synchronization

    Authors: Michael Rosenbluh, Yaara Aviad, Elad Cohen, Lev Khaykovich, Wolfgang Kinzel, Evi Kopelowitz, Pinhas Yoskovits, Ido Kanter

    Abstract: We analyze the time resolved spike statistics of a solitary and two mutually interacting chaotic semiconductor lasers whose chaos is characterized by apparently random, short intensity spikes. Repulsion between two successive spikes is observed, resulting in a refractory period which is largest at laser threshold. For time intervals between spikes greater than the refractory period, the distribu… ▽ More

    Submitted 11 June, 2007; originally announced June 2007.

  8. Sublattice synchronization of chaotic networks with delayed couplings

    Authors: Johannes Kestler, Wolfgang Kinzel, Ido Kanter

    Abstract: Synchronization of chaotic units coupled by their time delayed variables are investigated analytically. A new type of cooperative behavior is found: sublattice synchronization. Although the units of one sublattice are not directly coupled to each other, they completely synchronize without time delay. The chaotic trajectories of different sublattices are only weakly correlated but not related by… ▽ More

    Submitted 7 March, 2007; originally announced March 2007.

  9. Dynamics of neural cryptography

    Authors: Andreas Ruttor, Wolfgang Kinzel, Ido Kanter

    Abstract: Synchronization of neural networks has been used for novel public channel protocols in cryptography. In the case of tree parity machines the dynamics of both bidirectional synchronization and unidirectional learning is driven by attractive and repulsive stochastic forces. Thus it can be described well by a random walk model for the overlap between participating neural networks. For that purpose… ▽ More

    Submitted 1 November, 2007; v1 submitted 21 December, 2006; originally announced December 2006.

    Comments: 9 pages, 15 figures; typos corrected

    Journal ref: Phys. Rev. E 75, 056104 (2007)

  10. Synchronization of mutually coupled chaotic lasers in the presence of a shutter

    Authors: Ido Kanter, Noam Gross, Einat Klein, Evi Kopelowitz, Pinhas Yoskovits, Lev Khaykovich, Wolfgang Kinzel, Michael Rosenbluh

    Abstract: Two mutually coupled chaotic diode lasers exhibit stable isochronal synchronization in the presence of self feedback. When the mutual communication between the lasers is discontinued by a shutter and the two uncoupled lasers are subject to self-feedback only, the desynchronization time is found to scale as $A_dτ$ where $A_d>1$ and $τ$ corresponds to the optical distance between the lasers. Prior… ▽ More

    Submitted 15 October, 2006; originally announced October 2006.

  11. Parallel vs. Sequential Belief Propagation Decoding of LDPC Codes over GF(q) and Markov Sources

    Authors: Nadav Yacov, Hadar Efraim, Haggai Kfir, Ido Kanter, Ori Shental

    Abstract: A sequential updating scheme (SUS) for belief propagation (BP) decoding of LDPC codes over Galois fields, $GF(q)$, and correlated Markov sources is proposed, and compared with the standard parallel updating scheme (PUS). A thorough experimental study of various transmission settings indicates that the convergence rate, in iterations, of the BP algorithm (and subsequently its complexity) for the… ▽ More

    Submitted 16 May, 2006; originally announced May 2006.

  12. Synchronization of Mutually Versus Unidirectionally Coupled Chaotic Semiconductor Lasers

    Authors: Noam Gross, Wolfgang Kinzel, Ido Kanter, Michael Rosenbluh, Lev Khaykovich

    Abstract: Synchronization dynamics of mutually coupled chaotic semiconductor lasers are investigated experimentally and compared to identical synchronization of unidirectionally coupled lasers. Mutual coupling shows high quality synchronization in a broad range of self-feedback and coupling strengths. It is found to be tolerant to significant parameter mismatch which for unidirectional coupling would resu… ▽ More

    Submitted 26 April, 2006; originally announced April 2006.

    Comments: 5 pages, 6 figures

  13. arXiv:cs/0604083  [pdf, ps, other

    cs.IT

    Optimum Asymptotic Multiuser Efficiency of Pseudo-Orthogonal Randomly Spread CDMA

    Authors: Ori Shental, Ido Kanter

    Abstract: A $K$-user pseudo-orthogonal (PO) randomly spread CDMA system, equivalent to transmission over a subset of $K'\leq K$ single-user Gaussian channels, is introduced. The high signal-to-noise ratio performance of the PO-CDMA is analyzed by rigorously deriving its asymptotic multiuser efficiency (AME) in the large system limit. Interestingly, the $K'$-optimized PO-CDMA transceiver scheme yields an A… ▽ More

    Submitted 21 April, 2006; originally announced April 2006.

    Comments: WIC 27th Symposium on Information Theory in the Benelux, 2006

  14. Information and multiaccess interference in a complexity-constrained vector channel

    Authors: Rodrigo de Miguel, Ori Shental, Ralf R. Muller, Ido Kanter

    Abstract: Rodrigo de Miguel et al 2007 J. Phys. A: Math. Theor. 40 5241-5260: A noisy vector channel operating under a strict complexity constraint at the receiver is introduced. According to this constraint, detected bits, obtained by performing hard decisions directly on the channel's matched filter output, must be the same as the transmitted binary inputs. An asymptotic analysis is carried out using ma… ▽ More

    Submitted 19 May, 2009; v1 submitted 19 April, 2006; originally announced April 2006.

    Comments: The author has withdrawn this submission [arXiv admin]

  15. arXiv:cond-mat/0604569  [pdf, ps, other

    cond-mat.stat-mech cs.CR

    Public-channel cryptography based on mutual chaos pass filters

    Authors: Einat Klein, Noam Gross, Evi Kopelowitz, Michael Rosenbluh, Lev Khaykovich, Wolfgang Kinzel, Ido Kanter

    Abstract: We study the mutual coupling of chaotic lasers and observe both experimentally and in numeric simulations, that there exists a regime of parameters for which two mutually coupled chaotic lasers establish isochronal synchronization, while a third laser coupled unidirectionally to one of the pair, does not synchronize. We then propose a cryptographic scheme, based on the advantage of mutual-coupli… ▽ More

    Submitted 25 April, 2006; originally announced April 2006.

  16. Genetic attack on neural cryptography

    Authors: Andreas Ruttor, Wolfgang Kinzel, Rivka Naeh, Ido Kanter

    Abstract: Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This… ▽ More

    Submitted 1 June, 2006; v1 submitted 1 December, 2005; originally announced December 2005.

    Comments: 8 pages, 12 figures; section 5 amended, typos corrected

    Journal ref: Phys. Rev. E 73, 036121 (2006)

  17. Stable isochronal synchronization of mutually coupled chaotic lasers

    Authors: Einat Klein, Noam Gross, Michael Rosenbluh, Wolfgang Kinzel, Lev Khaykovich, Ido Kanter

    Abstract: The dynamics of two mutually coupled chaotic diode lasers are investigated experimentally and numerically. By adding self feedback to each laser, stable isochronal synchronization is established. This stability, which can be achieved for symmetric operation, is essential for constructing an optical public-channel cryptographic system. The experimental results on diode lasers are well described b… ▽ More

    Submitted 28 November, 2005; originally announced November 2005.

  18. From finite-system entropy to entropy rate for a Hidden Markov Process

    Authors: Or Zuk, Eytan Domany, Ido Kanter, Michael Aizenman

    Abstract: A recent result presented the expansion for the entropy rate of a Hidden Markov Process (HMP) as a power series in the noise variable $\eps$. The coefficients of the expansion around the noiseless ($\eps = 0$) limit were calculated up to 11th order, using a conjecture that relates the entropy rate of a HMP to the entropy of a process of finite length (which is calculated analytically). In this c… ▽ More

    Submitted 6 October, 2005; originally announced October 2005.

    Journal ref: IEEE Signal Processing Letters 13,517 (2006).

  19. arXiv:cs/0510005  [pdf, ps, other

    cs.IT cond-mat.stat-mech

    Taylor series expansions for the entropy rate of Hidden Markov Processes

    Authors: Or Zuk, Eytan Domany, Ido Kanter, Michael Aizenman

    Abstract: Finding the entropy rate of Hidden Markov Processes is an active research topic, of both theoretical and practical importance. A recently used approach is studying the asymptotic behavior of the entropy rate in various regimes. In this paper we generalize and prove a previous conjecture relating the entropy rate to entropies of finite systems. Building on our new theorems, we establish series ex… ▽ More

    Submitted 3 October, 2005; originally announced October 2005.

    Journal ref: Proceedings 2006 IEEE International Conference on Communications (ICC 2006).

  20. arXiv:cs/0509049  [pdf, ps, other

    cs.IT

    On the Achievable Information Rates of CDMA Downlink with Trivial Receivers

    Authors: Ori Shental, Ido Kanter, Anthony J. Weiss

    Abstract: A noisy CDMA downlink channel operating under a strict complexity constraint on the receiver is introduced. According to this constraint, detected bits, obtained by performing hard decisions directly on the channel's matched filter output, must be the same as the transmitted binary inputs. This channel setting, allowing the use of the simplest receiver scheme, seems to be worthless, making relia… ▽ More

    Submitted 16 September, 2005; originally announced September 2005.

    Comments: Submitted to IEEE Transactions on Information Theory

  21. Capacity of Complexity-Constrained Noise-Free CDMA

    Authors: Ori Shental, Ido Kanter, Anthony J. Weiss

    Abstract: An interference-limited noise-free CDMA downlink channel operating under a complexity constraint on the receiver is introduced. According to this paradigm, detected bits, obtained by performing hard decisions directly on the channel's matched filter output, must be the same as the transmitted binary inputs. This channel setting, allowing the use of the simplest receiver scheme, seems to be worth… ▽ More

    Submitted 16 September, 2005; originally announced September 2005.

    Comments: To appear in IEEE Communications Letters

  22. arXiv:cs/0507060  [pdf, ps, other

    cs.IT cond-mat.stat-mech math.ST

    The Entropy of a Binary Hidden Markov Process

    Authors: O. Zuk, I. Kanter, E. Domany

    Abstract: The entropy of a binary symmetric Hidden Markov Process is calculated as an expansion in the noise parameter epsilon. We map the problem onto a one-dimensional Ising model in a large field of random signs and calculate the expansion coefficients up to second order in epsilon. Using a conjecture we extend the calculation to 11th order and discuss the convergence of the resulting series.

    Submitted 23 July, 2005; originally announced July 2005.

  23. arXiv:cond-mat/0507554  [pdf, ps, other

    cond-mat.dis-nn

    A framework for public-channel cryptography using chaotic lasers

    Authors: Noam Gross, Einat Klein, Michael Rosenbluh, Wolfgang Kinzel, Lev Khaykovich, Ido Kanter

    Abstract: Two mutually coupled chaotic diode lasers with individual external feedback, are shown to establish chaos synchronization in the low-frequency fluctuations regime. A third laser with identical external feedback but coupled unidirectionally to one of the pair does not synchronize. Both experiments and simulations reveal the existence of a window of parameters for which synchronization by mutual c… ▽ More

    Submitted 24 July, 2005; originally announced July 2005.

  24. arXiv:cond-mat/0412613  [pdf, ps, other

    cond-mat.other cond-mat.dis-nn

    Public-channel cryptography using chaos synchronization

    Authors: Einat Klein, Rachel Mislovaty, Ido Kanter, Wolfgang Kinzel

    Abstract: We present a key-exchange protocol that comprises two parties with chaotic dynamics that are mutually coupled and undergo a synchronization process, at the end of which they can use their identical dynamical state as an encryption key. The transferred coupling-signals are based non-linearly on time-delayed states of the parties, and therefore they conceal the parties' current state and can be tr… ▽ More

    Submitted 29 March, 2005; v1 submitted 22 December, 2004; originally announced December 2004.

    Comments: 4 figures

  25. An Efficient Joint Source-Channel Decoder with Dynamical Block Priors

    Authors: Ido Kanter, Haggai Kfir, Shahar Keren

    Abstract: An efficient joint source-channel (s/c) decoder based on the side information of the source and on the MN-Gallager algorithm over Galois fields is presented. The dynamical block priors (DBP) are derived either from a statistical mechanical approach via calculation of the entropy for the correlated sequences, or from the Markovian transition matrix. The Markovian joint s/c decoder has many advant… ▽ More

    Submitted 21 December, 2004; originally announced December 2004.

    Comments: 13 pages, to appear in "Progress in Theoretical Physics Supplement", May 2005

  26. arXiv:cond-mat/0412572  [pdf, ps, other

    cond-mat.dis-nn

    An Efficient MN-Algorithm for Joint Source-Channel Coding

    Authors: Haggai Kfir, Eyal Shpilman, Ido Kanter

    Abstract: Belief Propagation (BP) decoding of LDPC codes is extended to the case of Joint Source-Channel coding. The uncompressed source is treated as a Markov process, characterized by a transition matrix, T, which is utilized as side information for the Joint scheme. The method is based on the ability to calculate a Dynamical Block Prior (DBP), for each decoded symbol separately, and re-estimate this pr… ▽ More

    Submitted 21 December, 2004; originally announced December 2004.

    Journal ref: Proceedings of ISITA-2004, pp. 200-205, Parma, Italy, October 2004

  27. Neural cryptography with queries

    Authors: Andreas Ruttor, Wolfgang Kinzel, Ido Kanter

    Abstract: Neural cryptography is based on synchronization of tree parity machines by mutual learning. We extend previous key-exchange protocols by replacing random inputs with queries depending on the current state of the neural networks. The probability of a successful attack is calculated for different model parameters using numerical simulations. The results show that queries restore the security again… ▽ More

    Submitted 1 March, 2005; v1 submitted 15 November, 2004; originally announced November 2004.

    Comments: 12 pages, 8 figures; typos corrected

    Journal ref: J. Stat. Mech. (2005) P01009

  28. arXiv:physics/0405081  [pdf, ps, other

    physics.atom-ph physics.gen-ph

    Is a multiple excitation of a single atom equivalent to a single excitation of an ensemble of atoms?

    Authors: Ido Kanter, Aviad Frydman, Assaf Ater

    Abstract: Recent technological advances have enabled to isolate, control and measure the properties of a single atom, leading to the possibility to perform statistics on the behavior of single quantum systems. These experiments have enabled to check a question which was out of reach previously: Is the statistics of a repeatedly excitation of an atom N times equivalent to a single excitation of an ensemble… ▽ More

    Submitted 16 May, 2004; originally announced May 2004.

    Comments: 3 pages, 3 figures

    Journal ref: Europhysics Letters, 69 874 (2005)

  29. Utilizing hidden Markov processes as a new tool for experimental physics

    Authors: Ido Kanter, Aviad Frydman, Asaf Ater

    Abstract: A hidden Markov process is a well known concept in information theory and is used for a vast range of applications such as speech recognition and error correction. We bridge between two disciplines, experimental physics and advanced algorithms, and propose to use a physically oriented hidden Markov process as a new tool for analyzing experimental data. This tool enables one to extract valuable i… ▽ More

    Submitted 22 February, 2004; originally announced February 2004.

    Comments: 4 pages, 4 figures

    Journal ref: Europhysics Letters, 69, 798 (2005)

  30. arXiv:cond-mat/0312068  [pdf, ps, other

    cond-mat.dis-nn cond-mat.stat-mech

    Cooperating Attackers in Neural Cryptography

    Authors: L. N. Shacham, E. Klein, R. Mislovaty, I. Kanter, W. Kinzel

    Abstract: A new and successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The advanced attacker presented here, named the ``Majority-Flipping Attacker'', is the first whose success does not decay with the parameters of the model. This ne… ▽ More

    Submitted 2 December, 2003; originally announced December 2003.

  31. Neural cryptography with feedback

    Authors: Andreas Ruttor, Wolfgang Kinzel, Lanir Shacham, Ido Kanter

    Abstract: Neural cryptography is based on a competition between attractive and repulsive stochastic forces. A feedback mechanism is added to neural cryptography which increases the repulsive forces. Using numerical simulations and an analytic approach, the probability of a successful attack is calculated for different model parameters. Scaling laws are derived which show that feedback improves the securit… ▽ More

    Submitted 15 July, 2004; v1 submitted 26 November, 2003; originally announced November 2003.

    Comments: 8 pages, 10 figures; abstract changed, references updated

    Journal ref: Phys. Rev. E 69, 046110 (2004)

  32. arXiv:cond-mat/0308308  [pdf, ps, other

    cond-mat.stat-mech cond-mat.dis-nn

    An efficient joint source-channel coding for a D-dimensional array

    Authors: Ido Kanter, Haggai Kfir, Shahar Keren

    Abstract: An efficient joint source-channel (S/C) decoder based on the side information of the source and on the MN-Gallager Code over Galois fields, $q$, is presented. The dynamical posterior probabilities are derived either from the statistical mechanical approach for calculation of the entropy for the correlated sequences, or by the Markovian joint S/C algorithm. The Markovian joint S/C decoder has man… ▽ More

    Submitted 15 August, 2003; originally announced August 2003.

    Comments: 19 pages and 12 figures

  33. Statistical mechanical aspects of joint source-channel coding

    Authors: Ido Kanter, Haggai Kfir

    Abstract: An MN-Gallager Code over Galois fields, $q$, based on the Dynamical Block Posterior probabilities (DBP) for messages with a given set of autocorrelations is presented with the following main results: (a) for a binary symmetric channel the threshold, $f_c$, is extrapolated for infinite messages using the scaling relation for the median convergence time, $t_{med} \propto 1/(f_c-f)$; (b) a degradat… ▽ More

    Submitted 11 May, 2003; v1 submitted 3 March, 2003; originally announced March 2003.

    Comments: 6 pages

  34. Public channel cryptography by synchronization of neural networks and chaotic maps

    Authors: Rachel Mislovaty, Einat Klein, Ido Kanter, Wolfgang Kinzel

    Abstract: Two different kinds of synchronization have been applied to cryptography: Synchronization of chaotic maps by one common external signal and synchronization of neural networks by mutual learning. By combining these two mechanisms, where the external signal to the chaotic maps is synchronized by the nets, we construct a hybrid network which allows a secure generation of secret encryption keys over… ▽ More

    Submitted 5 February, 2003; originally announced February 2003.

    Comments: 4 pages

  35. arXiv:cond-mat/0301005  [pdf, ps, other

    cond-mat.stat-mech

    Communication near the channel capacity with an absence of compression: Statistical Mechanical Approach

    Authors: Ido Kanter, Hanan Rosemarin

    Abstract: The generalization of Shannon's theory to include messages with given autocorrelations is presented. The analytical calculation of the channel capacity is based on the transfer matrix method of the effective 1D Hamiltonian. This bridge between statistical physics and information theory leads to efficient Low-Density Parity-Check Codes over Galois fields that nearly saturate the channel capacity.… ▽ More

    Submitted 1 January, 2003; originally announced January 2003.

    Comments: error correction, data compression

  36. Mutual learning in a tree parity machine and its application to cryptography

    Authors: Michal Rosen-Zvi, Einat Klein, Ido Kanter, Wolfgang Kinzel

    Abstract: Mutual learning of a pair of tree parity machines with continuous and discrete weight vectors is studied analytically. The analysis is based on a mapping procedure that maps the mutual learning in tree parity machines onto mutual learning in noisy perceptrons. The stationary solution of the mutual learning in the case of continuous tree parity machines depends on the learning rate where a phase… ▽ More

    Submitted 10 September, 2002; originally announced September 2002.

  37. arXiv:cond-mat/0208453  [pdf, ps, other

    cond-mat.dis-nn cond-mat.stat-mech

    Neural Cryptography

    Authors: Wolfgang Kinzel, Ido Kanter

    Abstract: Two neural networks which are trained on their mutual output bits show a novel phenomenon: The networks synchronize to a state with identical time dependent weights. It is shown how synchronization by mutual learning can be applied to cryptography: secret key exchange over a public channel.

    Submitted 23 August, 2002; originally announced August 2002.

    Comments: 9th International Conference on Neural Information Processing, Singapore, Nov. 2002

  38. Parallel versus sequential updating for Belief Propagation decoding

    Authors: H. Kfir, I. Kanter

    Abstract: sequential updating scheme (SUS) for the belief propagation algorithm is proposed, and is compared with the parallel (regular) updating scheme (PUS). Simulation results on various codes indicate that the number of iterations of the belief algorithm for the SUS is about one half of the required iterations for the PUS, where both decoding algorithms have the same error correction properties. The c… ▽ More

    Submitted 7 July, 2002; originally announced July 2002.

    Comments: 15 pages, 3 figures, submitted to Phys. Rev. E june 2002

  39. A secure key-exchange protocol with an absence of injective functions

    Authors: R. Mislovaty, Y. Perchenok, Ido Kanter, Wolfgang Kinzel

    Abstract: The security of neural cryptography is investigated. A key-exchange protocol over a public channel is studied where the parties exchanging secret messages use multilayer neural networks which are trained by their mutual output bits and synchronize to a time dependent secret key. The weights of the networks have integer values between $\pm L$. Recently an algorithm for an eavesdropper which could… ▽ More

    Submitted 12 June, 2002; originally announced June 2002.

    Comments: 4 pages, 4 figures

  40. arXiv:cond-mat/0203011  [pdf, ps, other

    cond-mat.dis-nn

    Interacting neural networks and cryptography

    Authors: Wolfgang Kinzel, Ido Kanter

    Abstract: Two neural networks which are trained on their mutual output bits are analysed using methods of statistical physics. The exact solution of the dynamics of the two weight vectors shows a novel phenomenon: The networks synchronize to a state with identical time dependent weights. Extending the models to multilayer networks with discrete weights, it is shown how synchronization by mutual learning c… ▽ More

    Submitted 1 March, 2002; originally announced March 2002.

    Comments: Invited talk for the meeting of the German Physical Society

  41. Learning and predicting time series by neural networks

    Authors: Ansgar Freking, Wolfgang Kinzel, Ido Kanter

    Abstract: Artificial neural networks which are trained on a time series are supposed to achieve two abilities: firstly to predict the series many time steps ahead and secondly to learn the rule which has produced the series. It is shown that prediction and learning are not necessarily related to each other. Chaotic sequences can be learned but not predicted while quasiperiodic sequences can be well predic… ▽ More

    Submitted 28 February, 2002; originally announced February 2002.

    Comments: 5 pages

  42. Cryptography based on neural networks - analytical results

    Authors: Michal Rosen-Zvi, Ido Kanter, Wolfgang Kinzel

    Abstract: Mutual learning process between two parity feed-forward networks with discrete and continuous weights is studied analytically, and we find that the number of steps required to achieve full synchronization between the two networks in the case of discrete weights is finite. The synchronization process is shown to be non-self-averaging and the analytical solution is based on random auxiliary variab… ▽ More

    Submitted 20 February, 2002; originally announced February 2002.

  43. arXiv:cond-mat/0202112  [pdf, ps, other

    cond-mat.stat-mech cond-mat.dis-nn

    Secure exchange of information by synchronization of neural networks

    Authors: I. Kanter, W. Kinzel, E. Kanter

    Abstract: A connection between the theory of neural networks and cryptography is presented. A new phenomenon, namely synchronization of neural networks is leading to a new method of exchange of secret messages. Numerical simulations show that two artificial networks being trained by Hebbian learning rule on their mutual outputs develop an antiparallel state of their synaptic weights. The synchronized weig… ▽ More

    Submitted 7 February, 2002; originally announced February 2002.

    Comments: 11 pages, 5 figures

    Journal ref: Europhys. Lett. 57, pp. 141-147 (2002

  44. arXiv:cond-mat/0109042  [pdf, ps, other

    cond-mat.soft cond-mat.stat-mech q-bio

    Statistical properties of contact vectors

    Authors: A. Kabakcioglu, I. Kanter, M. Vendruscolo, E. Domany

    Abstract: We study the statistical properties of contact vectors, a construct to characterize a protein's structure. The contact vector of an N-residue protein is a list of N integers n_i, representing the number of residues in contact with residue i. We study analytically (at mean-field level) and numerically the amount of structural information contained in a contact vector. Analytical calculations reve… ▽ More

    Submitted 4 September, 2001; originally announced September 2001.

    Comments: 20 pages, 6 figures

  45. arXiv:cond-mat/0104011  [pdf, ps, other

    cond-mat.stat-mech cond-mat.dis-nn

    Multilayer neural networks with extensively many hidden units

    Authors: Michal Rosen-Zvi, Andreas Engel, Ido Kanter

    Abstract: The information processing abilities of a multilayer neural network with a number of hidden units scaling as the input dimension are studied using statistical mechanics methods. The mapping from the input layer to the hidden units is performed by general symmetric Boolean functions whereas the hidden layer is connected to the output by either discrete or continuous couplings. Introducing an over… ▽ More

    Submitted 1 April, 2001; originally announced April 2001.

    Comments: 4 pages, 2 figures

  46. arXiv:cond-mat/0103185  [pdf, ps, other

    cond-mat.stat-mech cond-mat.dis-nn

    Low autocorrelated multi-phase sequences

    Authors: Liat Ein-Dor, Ido Kanter, Wolfgang KJinzel

    Abstract: The interplay between the ground state energy of the generalized Bernasconi model to multi-phase, and the minimal value of the maximal autocorrelation function, $C_{max}=\max_K{|C_K|}$, $K=1,..N-1$, is examined analytically and the main results are: (a) The minimal value of $\min_N{C_{max}}$ is $0.435\sqrt{N}$ significantly smaller than the typical value for random sequences… ▽ More

    Submitted 8 March, 2001; originally announced March 2001.

    Comments: 4 pages, 4 figures

  47. Training a perceptron in a discrete weight space

    Authors: Michal Rosen-Zvi, Ido Kanter

    Abstract: On-line and batch learning of a perceptron in a discrete weight space, where each weight can take $2 L+1$ different values, are examined analytically and numerically. The learning algorithm is based on the training of the continuous perceptron and prediction following the clipped weights. The learning is described by a new set of order parameters, composed of the overlaps between the teacher and… ▽ More

    Submitted 27 February, 2001; originally announced February 2001.

    Comments: 10 pages, 5 figs., submitted to PRE

  48. Generation of unpredictable time series by a Neural Network

    Authors: Richard Metzler, Wolfgang Kinzel, Liat Ein-Dor, Ido Kanter

    Abstract: A perceptron that learns the opposite of its own output is used to generate a time series. We analyse properties of the weight vector and the generated sequence, like the cycle length and the probability distribution of generated sequences. A remarkable suppression of the autocorrelation function is explained, and connections to the Bernasconi model are discussed. If a continuous transfer functi… ▽ More

    Submitted 3 April, 2001; v1 submitted 17 November, 2000; originally announced November 2000.

    Comments: 11 pages, 14 figures; slightly expanded and clarified, mistakes corrected; accepted for publication in PRE

  49. Secure and linear cryptosystems using error-correcting codes

    Authors: I. Kanter, E. Kanter, L. Ein-Dor

    Abstract: A public-key cryptosystem, digital signature and authentication procedures based on a Gallager-type parity-check error-correcting code are presented. The complexity of the encryption and the decryption processes scale linearly with the size of the plaintext Alice sends to Bob. The public-key is pre-corrupted by Bob, whereas a private-noise added by Alice to a given fraction of the ciphertext of… ▽ More

    Submitted 27 August, 2000; originally announced August 2000.

    Journal ref: Europhys. Lett. 51 (15 July), 244 (2000)

  50. On time's arrow in Ehrenfest models with reversible deterministic dynamics

    Authors: R. Metzler, W. Kinzel, I. Kanter

    Abstract: We introduce a deterministic, time-reversible version of the Ehrenfest urn model. The distribution of first-passage times from equilibrium to non-equilibrium states and vice versa is calculated. We find that average times for transition to non-equilibrium always scale exponentially with the system size, whereas the time scale for relaxation to equilibrium depends on microscopic dynamics. To illu… ▽ More

    Submitted 25 July, 2000; originally announced July 2000.

    Comments: 6 pages, 7 figures, revtex