Neural Networks-Based Cryptography: A Survey

被引:11
|
作者
Meraouche, Ishak [1 ]
Dutta, Sabyasachi [2 ]
Tan, Haowen [3 ]
Sakurai, Kouichi [4 ]
机构
[1] Kyushu Univ, Grad Sch Informat Sci & Elect Engn, Fukuoka 8190395, Japan
[2] Univ Calgary, Dept Comp Sci, Calgary, AB T2N 1N4, Canada
[3] Kyushu Univ, Cyber Secur Ctr, Fukuoka 8190395, Japan
[4] Kyushu Univ, Dept Informat Sci & Elect Engn, Fukuoka 8190395, Japan
来源
IEEE ACCESS | 2021年 / 9卷
基金
日本科学技术振兴机构;
关键词
Cryptography; Neural networks; Security; Machine learning algorithms; Neurons; Encryption; Task analysis; deep learning; neural networks; generative adversarial networks; INFORMATION;
D O I
10.1109/ACCESS.2021.3109635
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A current trend of research focuses on artificial intelligence based cryptography which although proposed almost thirty years ago could not attract much attention. Abadi and Anderson's work on adversarial cryptography in 2016 rejuvenated the research area which now focuses in building neural networks that are able to learn cryptography using the idea from Generative Adversarial Networks (GANs). In this paper, we survey the most prominent research works that cover neural networks based cryptography from two main periods. The first period covers the oldest models that have been proposed shortly after 2000 and the second period covers the more recent models that have been proposed since 2016. We first discuss the implementation of the systems from the earlier era and the attacks mounted on them. After that, we focus on post 2016 era where more advanced techniques are utilized that rely on GANs in which neural networks compete with each other in order to achieve a goal e.g. learning to encrypt a communication. Finally, we discuss security analysis performed on adversarial cryptography models.
引用
收藏
页码:124727 / 124740
页数:14
相关论文
共 50 条
  • [31] Neural networks-based adaptive control for a class of nonlinear bioprocesses
    Petre, Emil
    Selisteanu, Dan
    Sendrescu, Dorin
    Ionete, Cosmin
    [J]. NEURAL COMPUTING & APPLICATIONS, 2010, 19 (02): : 169 - 178
  • [32] A study of neural networks-based airport logistics forecast system
    Meng, JJ
    Bai, CM
    Peng, ZR
    [J]. CONCURRENT ENGINEERING: THE WORLDWIDE ENGINEERING GRID, PROCEEDINGS, 2004, : 913 - 917
  • [33] Stochastic Neural Networks-Based Algorithmic Trading for the Cryptocurrency Market
    Kalariya, Vasu
    Parmar, Pushpendra
    Jay, Patel
    Tanwar, Sudeep
    Raboaca, Maria Simona
    Alqahtani, Fayez
    Tolba, Amr
    Neagu, Bogdan-Constantin
    [J]. MATHEMATICS, 2022, 10 (09)
  • [34] An efficient wavelet/neural networks-based face detection algorithm
    Mohabbati, Bardia
    Kasaei, Shohreh
    [J]. 2005 1ST IEEE/IFIP INTERNATIONAL CONFERENCE IN CENTRAL ASIA ON INTERNET (ICI), 2005, : 174 - 178
  • [35] Limitations of Neural Networks-based NER for Resume Data Extraction
    Pinzon, Juan F.
    Krainikovsky, Stanislav
    Samarev, Roman
    [J]. PROCESAMIENTO DEL LENGUAJE NATURAL, 2020, (65): : 53 - 58
  • [36] A novel neural networks-based approach for designing FIR filters
    Wang, Xiaohua
    Meng, Xianzhi
    He, Yigang
    [J]. WCICA 2006: SIXTH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-12, CONFERENCE PROCEEDINGS, 2006, : 4029 - +
  • [37] Estimating neural networks-based algorithm for adaptive cache replacement
    Obaidat, MS
    Khalid, H
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 1998, 28 (04): : 602 - 611
  • [38] Active contour with neural networks-based information fusion kernel
    Cai, Xiongcai
    Sowmya, Arcot
    [J]. NEURAL INFORMATION PROCESSING, PT 2, PROCEEDINGS, 2006, 4233 : 324 - 333
  • [39] Deep neural networks-based rolling bearing fault diagnosis
    Chen, Zhiqiang
    Deng, Shengcai
    Chen, Xudong
    Li, Chuan
    Sanchez, Rene-Vinicio
    Qin, Huafeng
    [J]. MICROELECTRONICS RELIABILITY, 2017, 75 : 327 - 333
  • [40] Neural Networks-Based Aerodynamic Data Modeling: A Comprehensive Review
    Hu, Liwei
    Zhang, Jun
    Xiang, Yu
    Wang, Wenyong
    [J]. IEEE ACCESS, 2020, 8 : 90805 - 90823