Research Article

Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems

Algorithm 1

Learning process of key exchange for VVTPM.
Input K, L, N, n
(1)Initialize randomly for
(2)while do
(3)for k from 1 to K
(4)  for i from 1 to n
(5)   generate randomly
(6)  end
(7)  
(8)  
(9)end
(10)
(11)for i from 1 to n
(12)  for k from 1 to K
(13)   ifthen
(14)    
(15)    
(16)   end
(17)  end
(18)end
(19)end
Output