Analysis of Cryptography Encryption for Network Security using AI Techniques
DOI:
https://doi.org/10.61841/7gje0y18Abstract
This paper considers some recent advances in the field of Cryptography using Artificial Intelligence (AI). It specifically considers the applications of Machine Learning (ML) and Evolutionary Computing (EC) to analyze and encrypt data. A short overview is given on Artificial Neural Networks (ANNs) and the principles of Deep Learning using Deep ANNs. In this context, the paper considers: (i) the implementation of EC and ANNs for generating unique and unclonable ciphers; (ii) ML strategies for detecting the genuine randomness (or otherwise) of finite binary strings for applications in Cryptanalysis. The aim of the paper is to provide an overview on how AI can be applied for encrypting data and undertaking cryptanalysis of such data and other data types in order to assess the cryptographic strength of an encryption algorithm, e.g. to detect patterns of intercepted data streams that are signatures of encrypted data. This includes some of the authors’ prior contributions to the field which is referenced throughout. Applications are presented which include the authentication of high-value documents such as bank notes with a smartphone. This involves using the antenna of a smartphone to read (in the near field) a flexible radio frequency tag that couples to an integrated circuit with a non programmable coprocessor. The coprocessor retains ultra-strong encrypted information generated using EC that can be decrypted on-line, thereby validating the authenticity of the document through the Internet of Things with a smartphone. The application of optical authentication methods using a smartphone and optical ciphers is also briefly explored.
Downloads
References
1. Preneel, B. (2010, September). Cryptography for network security: Failures, successes, and challenges. International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, 36–54. Springer, Berlin, Heidelberg.
2. Kumari, S. (2017). A research paper on cryptography encryption and compression techniques. International Journal of Engineering and Computer Science, 6(4).
3. Bhatia, P., & Sumbaly, R. (2014). Framework for wireless network security using quantum cryptography. arXiv preprint arXiv:1412.2495.
4. Tayal, S., Gupta, N., Gupta, P., Goyal, D., & Goyal, M. (2017). A review paper on network security and cryptography. Advances in Computational Sciences and Technology, 10(5), 763–770.
5. Panda, M. (2014). Security in wireless sensor networks using cryptographic techniques. American Journal of Engineering Research (AJER), 3(1), 50–56.
6. Dhamdhere, S. T., & Gumaste, S. V. (n.d.). Security in wireless sensor network using cryptographic techniques.
7. Kumar, S. N. (2015). Review on network security and cryptography. International Transaction of Electrical and Computer Engineers System, 3(1), 1–11.
8. Kaur, S., Kaur, R., & Raina, C. K. (2017). Review on network security and cryptography.
9. Duong, T., & Rizzo, J. (2011, May). Cryptography in the web: The case of cryptographic design flaws in ASP.NET. IEEE Symposium on Security and Privacy (SP), 481–489. IEEE.
10. Stallings, W. (2006). Cryptography and Network Security (4th ed.). Pearson Education India.
11. Blackledge, J. M., Evans, M. J., & Turner, M. J. (Eds.). (2002). Fractal Geometry: Mathematical Methods, Algorithms and Applications. Woodhead Publishing. ISBN: 190427500.
12. Deep Learning in Digital Pathology. (2020). Global Engage. Retrieved from http://www.global-engage.com/lifescience/deep-learning-in-digital-pathology/
13. Google Cloud. (n.d.). AI & Machine Learning Products: Advanced Guide to Inception V3 on Cloud TPU. Retrieved from https://cloud.google.com/tpu/docs/inception-v3-advanced
14. Zhang, W., Itoh, K., Tanida, J., & Ichioka, Y. (1990). Parallel distributed processing model with local space-invariant interconnections and its optical architecture. Applied Optics, 29(32), 4790–4797. Retrieved from https://drive.google.com/file/d/0B65v6Wo67Tk5ODRzZmhSR29VeDg/view
15. Blackledge, J. M. (2005). Digital Image Processing. Woodhead Publishing Series in Electronic and Optical Materials. ISBN-13: 978-1898563495. Retrieved from https://arrow.tudublin.ie/engschelebk/3/
16. MathWorks. (2020). Introducing Deep Learning with MATLAB. Retrieved from https://uk.mathworks.com/campaigns/offers/deep-learning-with-matlab.html
17. Maghrebi, H., Portigliatti, T., & Prouf, E. (2016). Breaking cryptographic implementations using deep learning techniques. Security, Privacy, and Applied Cryptography Engineering (SPACE), 6th International Conference. Retrieved from https://eprint.iacr.org/2016/921.pdf
18. Bezobrazov, S., Blackledge, J. M., & Tobin, P. (2015). Cryptography using artificial intelligence. International Joint Conference on Neural Networks (IJCNN 2015), Killarney, Ireland, July 12–17.
19. Asiru, O. F., Blackledge, J. M., & Dlamini, M. T. (2017). Application of artificial intelligence for detecting computing-derived viruses. 16th European Conference on Cyber Warfare and Security (ECCWS 2017), University College Dublin, June 29–30, 647–655.
20. Hoare, O. (2002). Enigma: Code Breaking and the Second World War – The True Story through Contemporary Documents. UK Public Records.
21. Vernam, G. S. (1926). Cipher printing telegraph systems for secret wire and radio telegraphic communications. Transactions of the American Institute of Electrical Engineers, 55, 109–115.
22. Blum, L., Blum, M., & Shub, M. A. (1986). Simple unpredictable pseudo-random number generator. SIAM Journal on Computing, 15(2), 364–383.
23. Matthews, R. (1984). On the derivation of a ‘chaotic’ encryption algorithm. Cryptologia, 8(1), 29–41.
24. Ptitsyn, N. V. (2002). Deterministic Chaos in Digital Cryptography. PhD Thesis, De Montfort University, UK and Moscow State Technical University, Russia.
25. Evans, M. J., Turner, M. J., & Blackledge, J. M. (2002). Fractal Geometry and Its Applications. Woodhead Publishing.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
