Neural Networks-Based Cryptography: A Survey
A current trend of research focuses on artificial intelligence based cryptography which although proposed almost thirty years ago could not attract much attention. Abadi and Anderson’s work on adversarial cryptography in 2016 rejuvenated the research area which now focuses in building neu...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2021-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9527229/ |
id |
doaj-bcb66f2eaa4145678ee28a26a077a85b |
---|---|
record_format |
Article |
spelling |
doaj-bcb66f2eaa4145678ee28a26a077a85b2021-09-14T23:00:57ZengIEEEIEEE Access2169-35362021-01-01912472712474010.1109/ACCESS.2021.31096359527229Neural Networks-Based Cryptography: A SurveyIshak Meraouche0https://orcid.org/0000-0002-1234-1844Sabyasachi Dutta1https://orcid.org/0000-0003-3567-5449Haowen Tan2https://orcid.org/0000-0001-9807-7185Kouichi Sakurai3https://orcid.org/0000-0003-4621-1674Graduate School of Information Science and Electrical Engineering, Kyushu University, Fukuoka, JapanDepartment of Computer Science, University of Calgary, Calgary, AB, CanadaCyber Security Center, Kyushu University, Fukuoka, JapanDepartment of Information Science and Electrical Engineering, Kyushu University, Fukuoka, JapanA current trend of research focuses on artificial intelligence based cryptography which although proposed almost thirty years ago could not attract much attention. Abadi and Anderson’s work on adversarial cryptography in 2016 rejuvenated the research area which now focuses in building neural networks that are able to learn cryptography using the idea from Generative Adversarial Networks (GANs). In this paper, we survey the most prominent research works that cover neural networks based cryptography from two main periods. The first period covers the oldest models that have been proposed shortly after 2000 and the second period covers the more recent models that have been proposed since 2016. We first discuss the implementation of the systems from the earlier era and the attacks mounted on them. After that, we focus on post 2016 era where more advanced techniques are utilized that rely on GANs in which neural networks compete with each other in order to achieve a goal e.g. learning to encrypt a communication. Finally, we discuss security analysis performed on adversarial cryptography models.https://ieeexplore.ieee.org/document/9527229/Cryptographydeep learningneural networksgenerative adversarial networks |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Ishak Meraouche Sabyasachi Dutta Haowen Tan Kouichi Sakurai |
spellingShingle |
Ishak Meraouche Sabyasachi Dutta Haowen Tan Kouichi Sakurai Neural Networks-Based Cryptography: A Survey IEEE Access Cryptography deep learning neural networks generative adversarial networks |
author_facet |
Ishak Meraouche Sabyasachi Dutta Haowen Tan Kouichi Sakurai |
author_sort |
Ishak Meraouche |
title |
Neural Networks-Based Cryptography: A Survey |
title_short |
Neural Networks-Based Cryptography: A Survey |
title_full |
Neural Networks-Based Cryptography: A Survey |
title_fullStr |
Neural Networks-Based Cryptography: A Survey |
title_full_unstemmed |
Neural Networks-Based Cryptography: A Survey |
title_sort |
neural networks-based cryptography: a survey |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2021-01-01 |
description |
A current trend of research focuses on artificial intelligence based cryptography which although proposed almost thirty years ago could not attract much attention. Abadi and Anderson’s work on adversarial cryptography in 2016 rejuvenated the research area which now focuses in building neural networks that are able to learn cryptography using the idea from Generative Adversarial Networks (GANs). In this paper, we survey the most prominent research works that cover neural networks based cryptography from two main periods. The first period covers the oldest models that have been proposed shortly after 2000 and the second period covers the more recent models that have been proposed since 2016. We first discuss the implementation of the systems from the earlier era and the attacks mounted on them. After that, we focus on post 2016 era where more advanced techniques are utilized that rely on GANs in which neural networks compete with each other in order to achieve a goal e.g. learning to encrypt a communication. Finally, we discuss security analysis performed on adversarial cryptography models. |
topic |
Cryptography deep learning neural networks generative adversarial networks |
url |
https://ieeexplore.ieee.org/document/9527229/ |
work_keys_str_mv |
AT ishakmeraouche neuralnetworksbasedcryptographyasurvey AT sabyasachidutta neuralnetworksbasedcryptographyasurvey AT haowentan neuralnetworksbasedcryptographyasurvey AT kouichisakurai neuralnetworksbasedcryptographyasurvey |
_version_ |
1717379493399625728 |