Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ido Kanter is active.

Publication


Featured researches published by Ido Kanter.


Physica A-statistical Mechanics and Its Applications | 2003

Parallel versus sequential updating for belief propagation decoding

Haggai Kfir; Ido Kanter

A sequential updating scheme (SUS) for the belief propagation algorithm is proposed, and is compared with the parallel (regular) updating scheme (PUS). Simulation results on various codes indicate that the number of iterations of the belief algorithm for the SUS is about one half of the required iterations for the PUS, where both decoding algorithms have the same error correction properties. The complexity per iteration for both schemes is similar, resulting in a lower total complexity for the SUS, furthermore, the SUS utilizes significantly less memory during the decoding process. We demonstrate that the acceleration in convergence time is related to the inter-iteration information sharing, which is a property of only the SUS, and which increases the “correction gain” per iteration. Finally, the connection between the dynamics of error correcting codes and physical systems is discussed.


EPL | 2002

Secure exchange of information by synchronization of neural networks

Ido Kanter; W. Kinzel; E. Kanter

A connection between the theory of neural networks and cryptography is presented. A new phenomenon, namely synchronization of neural networks is leading to a new method of exchange of secret messages. Numerical simulations show that two artificial networks being trained by Hebbian learning rule on their mutual outputs develop an antiparallel state of their synaptic weights. The synchronized weights are used to construct an ephemeral key exchange protocol for a secure transmission of secret data. It is shown that an opponent who knows the protocol and all details of any transmission of the data has no chance to decrypt the secret message, since tracking the weights is a hard problem compared to synchronization. The complexity of the generation of the secure channel is linear with the size of the network.


Physical Review E | 2006

Stable isochronal synchronization of mutually coupled chaotic lasers

Einat Klein; Noam Gross; M. Rosenbluh; Wolfgang Kinzel; Lev Khaykovich; Ido Kanter

The dynamics of two mutually coupled chaotic diode lasers are investigated experimentally and numerically. By adding self-feedback to each laser, stable isochronal synchronization is established. This stability, which can be achieved for symmetric operation, is essential for constructing an optical public-channel cryptographic system. The experimental results on diode lasers are well described by rate equations of coupled single mode lasers.


Physical Review Letters | 2003

Public channel cryptography by synchronization of neural networks and chaotic maps.

Rachel Mislovaty; Einat Klein; Ido Kanter; Wolfgang Kinzel

Two different kinds of synchronization have been applied to cryptography: synchronization of chaotic maps by one common external signal and synchronization of neural networks by mutual learning. By combining these two mechanisms, where the external signal to the chaotic maps is synchronized by the nets, we construct a hybrid network which allows a secure generation of secret encryption keys over a public channel. The security with respect to attacks, recently proposed by Shamir et al., is increased by chaotic synchronization.


IEEE Transactions on Information Theory | 2008

Discrete-Input Two-Dimensional Gaussian Channels With Memory: Estimation and Information Rates Via Graphical Models and Statistical Mechanics

Ori Shental; Noam Shental; Shlomo Shamai; Ido Kanter; Anthony J. Weiss; Yair Weiss

Discrete-input two-dimensional (2D) Gaussian channels with memory represent an important class of systems, which appears extensively in communications and storage. In spite of their widespread use, the workings of 2D channels are still very much unknown. In this work, we try to explore their properties from the perspective of estimation theory and information theory. At the heart of our approach is a mapping of a 2D channel to an undirected graphical model, and inferring its a posteriori probabilities (APPs) using generalized belief propagation (GBP). The derived probabilities are shown to be practically accurate, thus enabling optimal maximum a posteriori (MAP) estimation of the transmitted symbols. Also, the Shannon-theoretic information rates are deduced either via the vector-wise Shannon-McMillan-Breiman (SMB) theorem, or via the recently derived symbol-wise Guo-Shamai-Verdu (GSV) theorem. Our approach is also described from the perspective of statistical mechanics, as the graphical model and inference algorithm have their analogues in physics. Our experimental study, based on common channel settings taken from cellular networks and magnetic recording devices, demonstrates that under nontrivial memory conditions, the performance of this fully tractable GBP estimator is almost identical to the performance of the optimal MAP estimator. It also enables a practically accurate simulation-based estimate of the information rate. Rationalization of this excellent performance of GBP in the 2-D Gaussian channel setting is addressed.


arXiv: Disordered Systems and Neural Networks | 2002

Interacting Neural Networks and Cryptography

Wolfgang Kinzel; Ido Kanter

Two neural networks which are trained on their mutual output bits are analysed using methods of statistical physics. The exact solution of the dynamics of the two weight vectors shows a novel phenomenon: The networks synchronize to a state with identical time dependent weights. Extending the models to multilayer networks with discrete weights, it is shown how synchronization by mutual learning can be applied to secret key exchange over a public channel.


Physical Review E | 2006

Public-channel cryptography based on mutual chaos pass filters

Einat Klein; Noam Gross; Evi Kopelowitz; M. Rosenbluh; Lev Khaykovich; Wolfgang Kinzel; Ido Kanter

We study the mutual coupling of chaotic lasers and observe both experimentally and in numeric simulations that there exists a regime of parameters for which two mutually coupled chaotic lasers establish isochronal synchronization, while a third laser coupled unidirectionally to one of the pair does not synchronize. We then propose a cryptographic scheme, based on the advantage of mutual coupling over unidirectional coupling, where all the parameters of the system are public knowledge. We numerically demonstrate that in such a scheme the two communicating lasers can add a message signal (compressed binary message) to the transmitted coupling signal and recover the message in both directions with high fidelity by using a mutual chaos pass filter procedure. An attacker, however, fails to recover an errorless message even if he amplifies the coupling signal.


Physical Review E | 2002

Secure key-exchange protocol with an absence of injective functions.

Rachel Mislovaty; Y. Perchenok; Ido Kanter; Wolfgang Kinzel

The security of neural cryptography is investigated. A key-exchange protocol over a public channel is studied where the parties exchanging secret messages use multilayer neural networks which are trained by their mutual output bits and synchronize to a time dependent secret key. The weights of the networks have integer values between +/-L. Recently an algorithm for an eavesdropper which could break the key was introduced by [A. Shamir, A. Mityagin, and A. Klimov, Ramp Session (Eurocrypt, Amsterdam, 2002)]. We show that the synchronization time increases with L2 while the probability to find a successful attacker decreases exponentially with L. Hence for large L we find a secure key-exchange protocol which depends neither on number theory nor on injective trapdoor functions used in conventional cryptography.


EPL | 2011

Synchronization of unidirectional time delay chaotic networks and the greatest common divisor

Ido Kanter; M. Zigzag; A. Englert; F. Geissler; Wolfgang Kinzel

We present the interplay between synchronization of unidirectional coupled chaotic nodes with heterogeneous delays and the greatest common divisor (GCD) of loops composing the oriented graph. In the weak chaos region and for GCD=1 the network is in chaotic zero-lag synchronization, whereas for GCD=m>1 synchronization of m-sublattices emerges. Complete synchronization can be achieved when all chaotic nodes are influenced by an identical set of delays and in particular for the limiting case of homogeneous delays. Results are supported by simulations of chaotic systems, self-consistent and mixing arguments, as well as analytical solutions of Bernoulli maps.


Physical Review E | 2006

Genetic attack on neural cryptography

Andreas Ruttor; Wolfgang Kinzel; Rivka Naeh; Ido Kanter

Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

Collaboration


Dive into the Ido Kanter's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ori Shental

University of California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge