Analysis of Cryptography Encryption for Network Security using AI Techniques

Authors

  • Vidhya Shenigaram Assistant Professor, Department of CSE, Kshatriya College of Engineering Author
  • Dheeraja Pathri Assistant Professor, Department of CSE, Kshatriya College of Engineering Author
  • Choul Swapna Assistant Professor, Department of CSE, Kshatriya College of Engineering Author
  • Venkatesh Jamalapoor Assistant Professor, Department of CSE, Kshatriya College of Engineering Author

DOI:

https://doi.org/10.61841/7gje0y18

Abstract

This paper considers some recent advances in the field of Cryptography using Artificial Intelligence (AI). It specifically considers the applications of Machine Learning (ML) and Evolutionary Computing (EC) to analyze and encrypt data. A short overview is given on Artificial Neural Networks (ANNs) and the principles of Deep Learning using Deep ANNs. In this context, the paper considers: (i) the implementation of EC and ANNs for generating unique and unclonable ciphers; (ii) ML strategies for detecting the genuine randomness (or otherwise) of finite binary strings for applications in Cryptanalysis. The aim of the paper is to provide an overview on how AI can be applied for encrypting data and undertaking cryptanalysis of such data and other data types in order to assess the cryptographic strength of an encryption algorithm, e.g. to detect patterns of intercepted data streams that are signatures of encrypted data. This includes some of the authors’ prior contributions to the field which is referenced throughout. Applications are presented which include the authentication of high-value documents such as bank notes with a smartphone. This involves using the antenna of a smartphone to read (in the near field) a flexible radio frequency tag that couples to an integrated circuit with a non programmable coprocessor. The coprocessor retains ultra-strong encrypted information generated using EC that can be decrypted on-line, thereby validating the authenticity of the document through the Internet of Things with a smartphone. The application of optical authentication methods using a smartphone and optical ciphers is also briefly explored.

Downloads

Download data is not yet available.

References

1. Preneel, B. (2010, September). Cryptography for network security: Failures, successes, and challenges. International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, 36–54. Springer, Berlin, Heidelberg.

2. Kumari, S. (2017). A research paper on cryptography encryption and compression techniques. International Journal of Engineering and Computer Science, 6(4).

3. Bhatia, P., & Sumbaly, R. (2014). Framework for wireless network security using quantum cryptography. arXiv preprint arXiv:1412.2495.

4. Tayal, S., Gupta, N., Gupta, P., Goyal, D., & Goyal, M. (2017). A review paper on network security and cryptography. Advances in Computational Sciences and Technology, 10(5), 763–770.

5. Panda, M. (2014). Security in wireless sensor networks using cryptographic techniques. American Journal of Engineering Research (AJER), 3(1), 50–56.

6. Dhamdhere, S. T., & Gumaste, S. V. (n.d.). Security in wireless sensor network using cryptographic techniques.

7. Kumar, S. N. (2015). Review on network security and cryptography. International Transaction of Electrical and Computer Engineers System, 3(1), 1–11.

8. Kaur, S., Kaur, R., & Raina, C. K. (2017). Review on network security and cryptography.

9. Duong, T., & Rizzo, J. (2011, May). Cryptography in the web: The case of cryptographic design flaws in ASP.NET. IEEE Symposium on Security and Privacy (SP), 481–489. IEEE.

10. Stallings, W. (2006). Cryptography and Network Security (4th ed.). Pearson Education India.

11. Blackledge, J. M., Evans, M. J., & Turner, M. J. (Eds.). (2002). Fractal Geometry: Mathematical Methods, Algorithms and Applications. Woodhead Publishing. ISBN: 190427500.

12. Deep Learning in Digital Pathology. (2020). Global Engage. Retrieved from http://www.global-engage.com/lifescience/deep-learning-in-digital-pathology/

13. Google Cloud. (n.d.). AI & Machine Learning Products: Advanced Guide to Inception V3 on Cloud TPU. Retrieved from https://cloud.google.com/tpu/docs/inception-v3-advanced

14. Zhang, W., Itoh, K., Tanida, J., & Ichioka, Y. (1990). Parallel distributed processing model with local space-invariant interconnections and its optical architecture. Applied Optics, 29(32), 4790–4797. Retrieved from https://drive.google.com/file/d/0B65v6Wo67Tk5ODRzZmhSR29VeDg/view

15. Blackledge, J. M. (2005). Digital Image Processing. Woodhead Publishing Series in Electronic and Optical Materials. ISBN-13: 978-1898563495. Retrieved from https://arrow.tudublin.ie/engschelebk/3/

16. MathWorks. (2020). Introducing Deep Learning with MATLAB. Retrieved from https://uk.mathworks.com/campaigns/offers/deep-learning-with-matlab.html

17. Maghrebi, H., Portigliatti, T., & Prouf, E. (2016). Breaking cryptographic implementations using deep learning techniques. Security, Privacy, and Applied Cryptography Engineering (SPACE), 6th International Conference. Retrieved from https://eprint.iacr.org/2016/921.pdf

18. Bezobrazov, S., Blackledge, J. M., & Tobin, P. (2015). Cryptography using artificial intelligence. International Joint Conference on Neural Networks (IJCNN 2015), Killarney, Ireland, July 12–17.

19. Asiru, O. F., Blackledge, J. M., & Dlamini, M. T. (2017). Application of artificial intelligence for detecting computing-derived viruses. 16th European Conference on Cyber Warfare and Security (ECCWS 2017), University College Dublin, June 29–30, 647–655.

20. Hoare, O. (2002). Enigma: Code Breaking and the Second World War – The True Story through Contemporary Documents. UK Public Records.

21. Vernam, G. S. (1926). Cipher printing telegraph systems for secret wire and radio telegraphic communications. Transactions of the American Institute of Electrical Engineers, 55, 109–115.

22. Blum, L., Blum, M., & Shub, M. A. (1986). Simple unpredictable pseudo-random number generator. SIAM Journal on Computing, 15(2), 364–383.

23. Matthews, R. (1984). On the derivation of a ‘chaotic’ encryption algorithm. Cryptologia, 8(1), 29–41.

24. Ptitsyn, N. V. (2002). Deterministic Chaos in Digital Cryptography. PhD Thesis, De Montfort University, UK and Moscow State Technical University, Russia.

25. Evans, M. J., Turner, M. J., & Blackledge, J. M. (2002). Fractal Geometry and Its Applications. Woodhead Publishing.

Downloads

Published

21.12.2019

How to Cite

Shenigaram, V., Pathri, D., Swapna, C., & Jamalapoor, V. (2019). Analysis of Cryptography Encryption for Network Security using AI Techniques . International Journal of Psychosocial Rehabilitation, 23(6), 1916-1921. https://doi.org/10.61841/7gje0y18