Neural Networks-Based Cryptography: A Survey

A current trend of research focuses on artificial intelligence based cryptography which although proposed almost thirty years ago could not attract much attention. Abadi and Anderson’s work on adversarial cryptography in 2016 rejuvenated the research area which now focuses in building neu...

Full description

Bibliographic Details
Main Authors: Ishak Meraouche, Sabyasachi Dutta, Haowen Tan, Kouichi Sakurai
Format: Article
Language:English
Published: IEEE 2021-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9527229/
id doaj-bcb66f2eaa4145678ee28a26a077a85b
record_format Article
spelling doaj-bcb66f2eaa4145678ee28a26a077a85b2021-09-14T23:00:57ZengIEEEIEEE Access2169-35362021-01-01912472712474010.1109/ACCESS.2021.31096359527229Neural Networks-Based Cryptography: A SurveyIshak Meraouche0https://orcid.org/0000-0002-1234-1844Sabyasachi Dutta1https://orcid.org/0000-0003-3567-5449Haowen Tan2https://orcid.org/0000-0001-9807-7185Kouichi Sakurai3https://orcid.org/0000-0003-4621-1674Graduate School of Information Science and Electrical Engineering, Kyushu University, Fukuoka, JapanDepartment of Computer Science, University of Calgary, Calgary, AB, CanadaCyber Security Center, Kyushu University, Fukuoka, JapanDepartment of Information Science and Electrical Engineering, Kyushu University, Fukuoka, JapanA current trend of research focuses on artificial intelligence based cryptography which although proposed almost thirty years ago could not attract much attention. Abadi and Anderson’s work on adversarial cryptography in 2016 rejuvenated the research area which now focuses in building neural networks that are able to learn cryptography using the idea from Generative Adversarial Networks (GANs). In this paper, we survey the most prominent research works that cover neural networks based cryptography from two main periods. The first period covers the oldest models that have been proposed shortly after 2000 and the second period covers the more recent models that have been proposed since 2016. We first discuss the implementation of the systems from the earlier era and the attacks mounted on them. After that, we focus on post 2016 era where more advanced techniques are utilized that rely on GANs in which neural networks compete with each other in order to achieve a goal e.g. learning to encrypt a communication. Finally, we discuss security analysis performed on adversarial cryptography models.https://ieeexplore.ieee.org/document/9527229/Cryptographydeep learningneural networksgenerative adversarial networks
collection DOAJ
language English
format Article
sources DOAJ
author Ishak Meraouche
Sabyasachi Dutta
Haowen Tan
Kouichi Sakurai
spellingShingle Ishak Meraouche
Sabyasachi Dutta
Haowen Tan
Kouichi Sakurai
Neural Networks-Based Cryptography: A Survey
IEEE Access
Cryptography
deep learning
neural networks
generative adversarial networks
author_facet Ishak Meraouche
Sabyasachi Dutta
Haowen Tan
Kouichi Sakurai
author_sort Ishak Meraouche
title Neural Networks-Based Cryptography: A Survey
title_short Neural Networks-Based Cryptography: A Survey
title_full Neural Networks-Based Cryptography: A Survey
title_fullStr Neural Networks-Based Cryptography: A Survey
title_full_unstemmed Neural Networks-Based Cryptography: A Survey
title_sort neural networks-based cryptography: a survey
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2021-01-01
description A current trend of research focuses on artificial intelligence based cryptography which although proposed almost thirty years ago could not attract much attention. Abadi and Anderson’s work on adversarial cryptography in 2016 rejuvenated the research area which now focuses in building neural networks that are able to learn cryptography using the idea from Generative Adversarial Networks (GANs). In this paper, we survey the most prominent research works that cover neural networks based cryptography from two main periods. The first period covers the oldest models that have been proposed shortly after 2000 and the second period covers the more recent models that have been proposed since 2016. We first discuss the implementation of the systems from the earlier era and the attacks mounted on them. After that, we focus on post 2016 era where more advanced techniques are utilized that rely on GANs in which neural networks compete with each other in order to achieve a goal e.g. learning to encrypt a communication. Finally, we discuss security analysis performed on adversarial cryptography models.
topic Cryptography
deep learning
neural networks
generative adversarial networks
url https://ieeexplore.ieee.org/document/9527229/
work_keys_str_mv AT ishakmeraouche neuralnetworksbasedcryptographyasurvey
AT sabyasachidutta neuralnetworksbasedcryptographyasurvey
AT haowentan neuralnetworksbasedcryptographyasurvey
AT kouichisakurai neuralnetworksbasedcryptographyasurvey
_version_ 1717379493399625728