Neural Networks-Based Cryptography: A Survey

被引:0
|
作者
Meraouche, Ishak [1 ]
Dutta, Sabyasachi [2 ]
Tan, Haowen [3 ]
Sakurai, Kouichi [4 ]
机构
[1] Kyushu Univ, Grad Sch Informat Sci & Elect Engn, Fukuoka 8190395, Japan
[2] Univ Calgary, Dept Comp Sci, Calgary, AB T2N 1N4, Canada
[3] Kyushu Univ, Cyber Secur Ctr, Fukuoka 8190395, Japan
[4] Kyushu Univ, Dept Informat Sci & Elect Engn, Fukuoka 8190395, Japan
来源
IEEE ACCESS | 2021年 / 9卷
基金
日本科学技术振兴机构;
关键词
Cryptography; Neural networks; Security; Machine learning algorithms; Neurons; Encryption; Task analysis; deep learning; neural networks; generative adversarial networks; INFORMATION;
D O I
10.1109/ACCESS.2021.3109635
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A current trend of research focuses on artificial intelligence based cryptography which although proposed almost thirty years ago could not attract much attention. Abadi and Anderson's work on adversarial cryptography in 2016 rejuvenated the research area which now focuses in building neural networks that are able to learn cryptography using the idea from Generative Adversarial Networks (GANs). In this paper, we survey the most prominent research works that cover neural networks based cryptography from two main periods. The first period covers the oldest models that have been proposed shortly after 2000 and the second period covers the more recent models that have been proposed since 2016. We first discuss the implementation of the systems from the earlier era and the attacks mounted on them. After that, we focus on post 2016 era where more advanced techniques are utilized that rely on GANs in which neural networks compete with each other in order to achieve a goal e.g. learning to encrypt a communication. Finally, we discuss security analysis performed on adversarial cryptography models.
引用
收藏
页码:124727 / 124740
页数:14
相关论文
共 50 条
  • [1] Neural Networks-Based Cryptography: A Survey
    Meraouche, Ishak
    Dutta, Sabyasachi
    Tan, Haowen
    Sakurai, Kouichi
    [J]. IEEE Access, 2021, 9 : 124727 - 124740
  • [2] On neural networks-based preprocessing for speaker identification
    Tadj, C
    [J]. 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IX, PROCEEDINGS: IMAGE, ACOUSTIC, SPEECH AND SIGNAL PROCESSING II, 2002, : 373 - 377
  • [3] LBSNN: Neural Networks-based Moving Sink
    Mechta, Djamila
    Harous, Saad
    [J]. 2018 9TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2018, : 475 - +
  • [4] A new neural networks-based model of hysteresis
    Ma, Lianwei
    Shen, Yu
    Li, Jinrong
    Zhao, Xinlong
    [J]. 2014 11TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION (WCICA), 2014, : 1540 - 1543
  • [5] Neural networks-based image compression system
    Charif, HN
    Salam, FM
    [J]. PROCEEDINGS OF THE 43RD IEEE MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS I-III, 2000, : 846 - 849
  • [6] A new comparison framework to survey neural networks-based vehicle detection and classification approaches
    Hashemi, Sajjad
    Emami, Hojjat
    Babazadeh Sangar, Amin
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (14)
  • [7] A neural networks-based approach for strategic planning
    Chien, TW
    Lin, C
    Tan, B
    Lee, WC
    [J]. INFORMATION & MANAGEMENT, 1999, 35 (06) : 357 - 364
  • [8] Neural networks-based approximation of fuzzy systems
    Gao, XZ
    Ovaska, SJ
    [J]. INTEGRATED COMPUTER-AIDED ENGINEERING, 2003, 10 (04) : 319 - 331
  • [9] Neural networks-based variationally enhanced sampling
    Bonati, Luigi
    Zhang, Yue-Yu
    Parrinello, Michele
    [J]. PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA, 2019, 116 (36) : 17641 - 17647
  • [10] Neural Cryptography Based on the Topology Evolving Neural Networks
    Zhu, Yuetong
    Vargas, Danilo Vasconcellos
    Sakurai, Kouichi
    [J]. 2018 SIXTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING WORKSHOPS (CANDARW 2018), 2018, : 472 - 478