Research Article
Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems
Algorithm 1
Learning process of key exchange for VVTPM.
| Input K, L, N, n | (1) | Initialize randomly for | (2) | while do | (3) | for k from 1 to K | (4) | for i from 1 to n | (5) | generate randomly | (6) | end | (7) | | (8) | | (9) | end | (10) | | (11) | for i from 1 to n | (12) | for k from 1 to K | (13) | ifthen | (14) | | (15) | | (16) | end | (17) | end | (18) | end | (19) | end | | Output |
|