The Dichotomy of Neural Networks and Cryptography: War and Peace
Abstract
:1. Introduction
1.1. Contributions
- 1.
- Our paper is the first of its kind to analyze the cross-impact between neural networks and cryptography and decompose it into two opposite sides.
- War: In this side, we study the aggressive activities assisted by neural networks against cryptography. We investigate the role of NNs in cryptanalysis and attacks against cryptographic systems.
- Peace: This side consists of the ways cryptography and NNs mutually support each other. We study this mutual support in the following lines.
- -
- Cryptographic techniques, mechanisms and devices can be used to provide confidentiality for NNs and their processed data.
- -
- Neural networks can be applied in the design of cryptosystems aiming at improved security and efficiency.
- 2.
- In addition to shedding light on the current state in the dichotomy of NNs and cryptography, we establish a future roadmap for further research in this area. This roadmap is developed in consideration of future computing paradigms and expected advancements.
1.2. Organization
2. Existing Surveys and Motivations
- There are a few reviews on the role of artificial intelligence (AI), and especially NNs in cryptography. However, to the best of our knowledge, there is no comprehensive survey on the roles of cryptography in secure neural networks. Moreover, there is no survey on the role of neural networks in aggressive activities against cryptography.
3. War: Neural Computing against Cryptography
3.1. Detecting Malicious Encryption
3.1.1. Software Code
3.1.2. Network Traffic
3.2. Cryptanalysis
3.3. Vulnerability Analysis
3.4. Attack
4. Peace: Coexistence and Alliance
4.1. Coexistence
4.1.1. NNs Adapted to Encrypted Data
NNs Trained over Encrypted Datasets
NNs Capable of Processing Encrypted Input Data
- 1.
- Classification: Different kinds of input data can be classified in their encrypted form by special types of NNs. Some of these types are discussed below. Similar to identifying encrypted malicious data, NNs have been trained to classify other kinds of encrypted data to protect the confidentiality of the contents while still providing useful classification.
- Encrypted Network Traffic: This type of input data can be classified by NNs for anomaly detection [55] or application identification [56,57] purposes. Some papers focused on improving the classification of TLS/SSL traffic since it is commonly used to protect web traffic. Zhang et al. designed a NN combining, stereo transform, and convolutional NNs to classify TLS/SSL traffic with up to 95% accuracy [58]. Yang et al. proposed using a Bayesian NN system that observes non-encrypted handshake packets, the specific cipher being used and the compression method to classify TLS connections [59]. Zhou and Cui improved upon the Alexnet deep NN by developing multi-scale convolution, a deconvolution operation, and batch standardization in order to reduce training time [60]. Other papers focused their efforts further on classifying encrypted VPN traffic. Song et al. applied a text convolutional NN system to classifying VPN traffic [61]. In order to avoid imbalances in class identification caused during training a loss function and class weighing method were implemented. Zou et al. proposed a novel deep NN that takes series of three packets as input so that features of packets that are continuous between packets can be considered by the system [62]. He and Li method interprets encrypted packets as greyscale images [63]. The images are classifies the by a convolutional NN. In implementation a convolutional NN was trained on VPN traffic and was able to classify similar traffic with 97.3% accuracy. Wang et al. [64] on the other hand evaluated their novel NN’s ability to classify mobile data sourced from 80 different mobile applications. The novel design combines long short-term memory recurrent networks with convolutional NNs, for pattern and signature recognition, respectively. Some researchers designed systems focusing on factors external to the specifics of one encryption method. Wang and Zhu made an early attempt in 2017 at end-to-end encrypted traffic classification using a 1D convolution NN [65]. While many approaches rely on deep learning which require a lot of training Cheng et al. propose using lighter weight system utilizing multi-headed attention and 1D convolutional NN which has to consider far less parameters and halves the training time of comparable systems [66]. In order to perform classification using information provided by observing feature attributes Cui et al. propose an improvement to CapsNet which weighs effective traffic more and now considers the spacing of features [67]. Yang et al. developed a classification method using an auto encoder and convolutional NNs taking packet length and arrival time into account [68]. More recently Wang et al. proposed a similar method using the combination of stacked autoencoder and convolutional NN but raising the number of parameters to 26, including both statistical data and information from the raw packets, to supply high level classification features [69].
- Encrypted Image: In order to efficient perform ITS image evaluation, images need to be secured. This group of researchers proposes using a convolutional NN to classify encrypted images based on partially decrypting them to reveal only nonsensitive information [70].
- Encrypted Speech: In order to retrieve encrypted speech, a deep NN using deep hashing is proposed with two different models: both convolutions and convolutional recurrent. With their high quality deep hashing capabilities, a two stage retrieval strategy is proposed [71].
- Encrypted Application: Uses an end-to-end encryption application for encrypting network traffic based on a 1 dimensional convolutional NN using spatial and temporal features [72].
- 2.
4.1.2. Cryptographic Technology Adapted to Neural Computing
4.2. Alliance
4.2.1. The Role of NNs in Cryptography
- Key Management: Neural Cryptography has been applied to key management in many different ways, some have researched its use in concealing keys in Deep NNs [81], while others have researched the use of NN’s using tree parity machines as a way to distribute keys of a symmetric encryption system [82]. A more novel approach uses Artificial Spiking NNs (ASNNs) to create keys for a symmetric block cipher algorithm with the ability to use any block size [83]. This method provides no need for key exchange [83]. The environment systems itself uses a semblance of public key cryptography where the public key is the seed used to generate the private key on both sides [83]. Additional approaches to neural cryptography symmetric key exchanges involve using a 3D cube algorithm in order to induce secrets on the receiver side or search guided gravitational neural keys [84,85].
- Random Number Generation: Neural cryptography has guided the verification of Pseudo Random Number Generators (PRNGs) by picking up on statistical biases unknown to humans [86]. This is achieved using neural cryptography to detect the difference between actual output and desired ideal random numbers [86].
- Applications: The applications of neural cryptography can be studied in the following lines.
- -
- Encrypting Different Content Types: Neural cryptography has been successfully tested on different content types, among which one may refer to the following.
- *
- Image: Regular scrambling-diffusion image encryption suffers from many vulnerabilities [96]. Particularly both the scrambling and diffusion are performed independently meaning an attacker can attack each separately [96]. With neural cryptography this vulnerability can be resolved. More specifically using an algorithm that performs the initial scrambling and diffusion in parallel then a second diffusion from a Hopfield chaotic NN trained [96]. This allows not only for the protection from the aforementioned independent cracking of the scrambling and diffusion steps, but also resists chosen plaintext attacks [96]. Other groups have also implemented parallelization in their neural cryptography encryption algorithms, electing instead to perform these operations using cellular NNs and block encryption to create an algorithm based on the feistel framework [97]. Cellular NNs are being used in all kinds of Image Encryption software, including an encryption scheme that uses the hyper chaotic system sequences of a cellular NN to shuffle around the bit of an image before performing a bit-wise XOR [98]. It is important to note that this method uses asymmetric RSA for key exchanges [98]. This can pose an issue since the security of the model relies then on the RSA key and not the Neural Cryptography system [99]. To resolve this issue a NN at the receiver end and a stochastic encryption method at the senders end can be used to eliminate the need for key exchanges all together [99]. Finally, Wavelet Chaotic NNs (WCNN) and chaotic NNs have also been used for secure encryption and decryption of images [100]. However, research has shown that WCNN provides stronger ciphertext [100]. Furthermore, during transmission the only data that would need to be sent is approximation coefficients, reducing the size of the ciphertext drastically [100].
- *
- Video: For video encryption of the MPEG-2 video code, research has shown that using Chaotic NNs to encrypt the bitstream results in high entropy and high key sensitivity, both desirable results for security [101]. This model transmits data via the Orthogonal Frequency Division Multiplexing (OFDM) modulation technique and controls the bit rate and quality of the decrypted video [101]. A hybrid chaos and NN cipher encryption algorithm for compressed video signal transmission over wireless channel.
- *
- Text: While image and video encryption introduces new types of encryption, some approaches taken for text encryption have been to improve upon existing systems to provide new cryptographic schemes. Some groups have used Neural cryptography to encrypt plaintext, generating both a secret key and a hash using the Auto Encoder NNs (AENN) [102]. AENN is a NN meant to provide the least possible distortion to the resulting ciphertext, this allows ciphertext normalization to still appear as ascii [102]. Another improvement of schemes is the use of secret dimensions of a NN model as key instead of relying on asymmetric keys and trapdoor functions [103]. The application of delayed Chaotic NNs to generate binary sequences has also been researched in text encryption [104]. The binary sequence is used to create the key for the first level of encryption [104]. Then used in conjunction with DNA cryptography to create a secure ciphertext [104].
- -
- Applications in Security-Related Scenarios: There are some security-related scenarios, which depend on cryptography. Neural networks have been used by researchers in many of these scenarios. To mention a few, we may refer to the following.
- *
- Privacy: The security of ubiquitous computing has seen great improvement due to Neural cryptography. The idea of neural synchronization to generate shared keys is currently one that provides real-time security for systems already in place [105].
- *
- Authentication: While issues with WiMAX have been thoroughly documented [106]. Neural Cryptography proposes solutions to authentication and authorization by creating neural synchronized key pairs [106]. To achieve this neural synchronization two NNs are created with the same weight changing algorithm and passed the same input [107]. To achieve neural synchronization boundary conditions are set, whenever both weights shift to the same direction and one of the networks touches the boundary, the boundaries close tighter eventually leading to neural synchronization [107]. RFID has seen many problems due to having no international standards and posses security risk, one proposed solution [108]. Involves using a tree parity NN in order to perform key generation [108]. Biometric recognition for authentication has also seen support from deep recurrent NNs in order to increase accuracy and performance of models [109].
- *
- Steganography: Stenography is the study of hiding messages within something that is not a message, in some cases an image. One way to achieve this using neural cryptography is to first perform Discrete Cosine similarity Transform and Elliptic Curve Cryptography to first encrypt the image you would like to hide [110]. Then using a Deep NN this message is embedded into a host image [110]. Other groups have achieved similar results of image using Self-Organizing Map (SMO) NNs with 26 clusters for every letter of the alphabet [111]. Research has also been conducted to hide messages within sound [112]. To accomplish sound stenography, SMO’s are used again with 27 clusters, 1 for every letter in the alphabet and then a cluster for the space between words [112].
- *
- Visual Cryptography: One drawback of visual cryptography is its lack of evaluation criteria [113]. One group proposed a method of evaluating the desirable results of visual cryptography would be encryption-inconsistency and decryption-consistency [113]. Visual cryptography via NNs can be achieved by passing a Q’tron NN a set of greyscale images and the output be a set of binary images [114,115]. Other types of NNs used for visual cryptography includes Pi-Sigma NNs, which is a double layered feed forward network [116]. Allowing for fewer communications between sender and receiver with higher security [116].
- -
- Technological Applications: The recent literature comes with several successful applications of neural cryptography in the technology. Some of these applications are studied below.
- *
- Applications in Industry: A large contribution to NN in technology comes from its applications for secure wireless communication [108,117,118]. After proof of its security was published [119]. Particularly, NN have been used with Fast Handover Protocol in place of MIPv6 to replace its short comings, allow the encryption of large scale satellite images for secure transmission and decryption efficiently and lightweight implementation for key systems in an IoT environment [117,120,121]. Other applications of Neural Cryptography has allowed for homomorphic encrpytion to be applied to cloud services for secure communication and noise compression, as well as intelligent transportation systems to allow confidentiality of personal information [122,123]. Finally, chaotic NNs has seem many applications as well [124,125,126]. To note, hyper chaotic systems and chaotic Feistel transform and time synchronization with multiple dimensions have allowed the resistance of plain text attacks and brute force attacks within the physical layer [125,126].
- *
- Applications in Medical Technologies: Applications of neural cryptography in the field of medicine have come from the requirement of keeping patient images confidential [127]. One approach uses a Hermite Chaotic NN in two rounds, first a chaotic sequence is generated from a logical mapping and used to train the NN, then the image is passed into the network to generate a key for encryption [128]. Other methods of security proposed involve using the Region of Non-Interest in the image in order to watermark the image [127].
- Challenges:
- -
- NN Type Selection: A look at the literature shows that different kinds of NNs are useful for different applications. NN type selection is critical to the ability of neural cryptography to be successful, one group has even used NNs to effectively create new cryptography based off NN training [129]. Investigated the use of Complex-valued tree parity machines in order to perform key synchronizations and how CVTPM’s can be seen as more secured to create key synchronizations than using simple tree parity machines [130]. Achieved postquantum key exchange protocols by using NNs in order to augment Diffie–Hellman key exchange protocols by using multivariate cryptosystems [131]. Explored the relationship between cryptographic functions and the learning abilities of RNN [132,133]. Used Principle Component Analysis NNs to generate random numbers for a chaos encryption system [134]. Other groups have experimented with cellular NNs with iterative interchangeability to produce encryption that allows flat historgrams for randomness and bias [135]. Back-propogating NNs in order to provide strong image compression-encryption using a fractional-order hyperchaotic system [136]. unbounded inertia NNs with input saturation in order to obtain good cryptographic properties [137]. Memristive bidirectional associative memory NNs for colored image encryption [138]. Uses recurrent NNs parallel processing speed to increase the performance of encryption, also proposes a symmetric encryption scheme allowing for variable message and block sizes for data integrity and data encryption [139,140]. A look at the literature shows that different kinds of NNs are useful for different applications.
- -
- Hardware Implementation: A successful implementation of Izhikevich’s neural model has been created using SIMECK block cryptography to allow the spiking NN to perform authentication [141].
- -
- Neural Physically Unclonable Function (PUF): A Physically Unclonable Function is a physical device that when provided with challenges provides a response that acts as a digital finger print. The uniqueness of these fingerprints relies on the physical variations created during manufacturing of the device. Neural PUF are PUFs with NNs embedded into the hardware in an attempt to make them resistant against attacks from NNs learning the outcome of challenge response pairs [142]. It is well known that Strong PUF’s can have their pattern recognized by NNs, thus it is suggested to used a WiSARD NN in order to add machine learning resistance to strong PUF’S [142]. Further ways to disallow NNs to learn from challenge responses of PUF’s is to use analog NNs [143]. Moving on to hardware purposes, researches have created a 1-bit PUF with a 2 neuron CNN with good metrics for robustness [144]. Other uses for NNs in the space of PUF’s involve Error Coding Correction for keys which provides more efficient corrections than standard models [145]. Finally, Tests have been conducted to show there is feasibility in using NN based PUF’s for authentication purposes [146].
- -
- Security Evaluation: Here we discuss attacks on previously mentioned cryptographic systems [147,148]. First we note a majority attack on neural synchronization via NN to provide secret keys, this attack is possible due to many cooperating attackers [147]. Then we view the lack of side-channel resistance in tree parity machine NNs and how you can obtain the secret weight vector via this side channel attack [148]. Finally, we look at a power analysis attack on NNs in order to discover their secret information and then propose resistances against these types of side channel attacks [149]. Although NNs are susceptible to the aforementioned attacks, it also provides resistances to the more commonly known vectors of classical cryptography [150].
- -
- Synchronization: Synchronization of NNs is when a client and network exchange output of NN’s with the goal of having identical weights for synapses. Following with the derivation of a shared key using these keys. Researchers use Period Self-Triggered Impulses to attempt synchronization of NNs and then applied the NN to encrypted images [151]. There has also been study into the generalization of synchronization by using Discrete Time-Array Equations [152]. Other papers investigate the use of lag within the neuron activation functions of a network of NNs in order to provide secure synchronization [153]. Papers have also tested different reaction-diffusion technique of Lyapunov time-dependent impulses within NNs to see its applicability to encrypting images [154]. Synchronization for arrays in a network system can also be achieved by using master-slave synchronization of a delayed NN [155]. The use of memristor-based models and its chaotic properties have also been studied in regards to its image encryption capabilities [156]. Other memristive models using lyapunov functions have also been used for image encryption [157].
- -
- Asynchronous Neural Cryptography: Asynchronours Neural cryptography is neural cryptography where synchronization of the sender and receiver model need not be conducted, in fact they can calculate their weights separately based on information passed to each other via encryption schemes such as one time pad [158]. Produce a chaotic time series using a chaotic NN and use that to encrypt plaintext [158], while the method does have its errors the proposed encryption scheme to use in conjunction, a one-time pad, does alleviate those problems [158].
- Enablers: By “Enablers”, we mean technologies sciences and techniques used to support the design of neural cryptography systems. Some of these enablers are discussed below.
- -
- Chaos Theory: Chaos theory is a branch of mathematics that aims to understand and accurately describe systems which are highly sensitive to their initial conditions [159]. In image encryption, three separate chaotic functions are used for each rgb color in order to allow image encryption via Hopfield NNs [160]. Other uses of Hopfield NNs include using creating asymmetric cryptography by using the semblances of the NN with the human body to do synchronization [161]. Other uses for Hopfield NNs and its human-like similarities is using it in conjunction with DNA cryptography [104]. Signal encryption using the chaotic nature of some NNs have been explored to create digital envelopes [162]. Signal encryption has also been achieved using VLSI architecture for chaotic NNs [163]. Further broad-brand signal encryption utilize Chain Chaotic NNs [164]. Other uses for Chaos NNs is pseudo random number generations using a peice wise linear chaotic map [165,166]. Besides using chaotic maps for pseudo random generation, it is also being used in research in conjunction with S-boxes in order to improve upon public key cryptography [167,168], while encryption via NNs may be possible, a comparison with AES shows it provides better performance at the cost of security for larger files [169].
- -
- Genetic Algorithms: Genetic algorithms are heuristics based of the theory of evolution where the best performing individuals will be used to create the next generation of individuals for further optimization in the hopes to converge to an optimization. A version of genetic synchronization has been used to create a key where the hidden weights of both NNs acts as a key between parties where weights are taken as the distance between chromozones of the NN [170]. Other symmetric key applications use Genetic algorithms with error back propogating NNs to instead create the key to be used for other encryption schemes [171]. Some encryption schemes have also seen improvement, by using AES with a GA algorithm in a NN, the SP-Box portion of AES can be greatly improved [172]. Public Key cryptography enhancements via genetic algorithms have also been of interest to some researchers, in fact it has been used for key generation here as well [173].
- -
- Error Management Codes: Error management codes such as Cyclic Redundancy Check (CRC) have been used by some researchers in the design of neural cryptosystems. CRC is a type of checksum which is primarily used to verify there are no errors in a message. It accomplishes this by executing some polynomial operations on the body of a message, the result of the operations can then be used to verify the messages integrity [174]. One way researchers have augmented the security of neural cryptography is using the DTMP algorithm to produce erroneous bits into the bits transferred between NNs during the synchronization phase [175]. However it was found this two allows potential attacks [176]. The researchers continued by finding three algorithms to build upon the original idea of DTMP [176].
- -
- Frequency-Domain Transforms: Frequency-Domain transforms methematical algorithms which can be used to obtain a description of a function in the frequency domain as opposed to the time domain [177]. Researchers created a data transmission method using classification of speech patterns via NNs to leave no speech signals available on the phone line [178].
- -
- Blockchain: A blockchain is collection of data organized into blocks which are connected to each other by a chain of cryptographic hash digests, commonly implemented in a way such that modifications to the blockchain need to be made through a peer to peer network [179]. To aid in the authentication of users performing key synchronization, researchers have proposed using a second secret value for implicit identity authentication based on block chain technologies [180].
- -
- Combinatorics: Combinatorics is the study of arranging discrete structures, and can expand into other fields including enumeration, graph theory and algorithms [181]. With the power of cellular NNs and its chaotic sequences along with 5 distinct latin squares are used for greyscale image encryption [182].
- -
- Existing Cryptographic Algorithms: In existing cryptography some researchers propose using the synaptic connections of a NN and an input image in order to generate the secret key for an AES encryption [183]. Other researchers propose the use of a variety of AES encryptions for files using the same NN key structure [184].
4.2.2. The Role of Cryptography in Secure Neural Computing
Encrypted NNs
Crypto-Enabled NNs
Enabling In-Memory NNs Using Cryptography
Data Encryption for Securing NNs
Image Encryption for Privacy-Preserving NNs
5. Future Roadmap: The Promise of Secure AI
5.1. Quantum NNs in Cryptography
5.2. NNs in Quantum Cryptography
5.3. Quantum-Inspired AI
6. Concluding Remarks
6.1. State-of-the-Art: War and Peace
- The application of neural networks in the cryptanalysis of cryptographic schemes and attacks against them (War);
- The application of neural networks towards improving the security as well as the efficiency of cryptosystems (Peace);
- The application of cryptography towards the confidentiality of neural networks (Peace).
6.2. At the Horizon: Quantum Advancements
6.3. Contributions
6.4. Further Research
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Conflicts of Interest
References
- Si, J.; Li, G.; Cheng, Y.; Zhang, R.; Enemali, G.; Liu, C. Hierarchical Temperature Imaging Using Pseudo-Inversed Convolutional Neural Network Aided TDLAS Tomography. IEEE Trans. Instrum. Meas. 2021, 70, 4506711. [Google Scholar] [CrossRef]
- Wang, Y.; Cheng, J.; Zhou, Y.; Zhang, F.; Yin, Q. A Multichannel Fusion Convolutional Neural Network Based on Scattering Mechanism for PolSAR Image Classification. IEEE Geosci. Remote Sens. Lett. 2021, 19, 4007805. [Google Scholar] [CrossRef]
- Huang, Y.; Qiao, X.; Ren, P.; Liu, L.; Pu, C.; Dustdar, S.; Chen, J. A Lightweight Collaborative Deep Neural Network for the Mobile Web in Edge Cloud. IEEE Trans. Mob. Comput. 2021, 21, 2289–2305. [Google Scholar] [CrossRef]
- Liu, Y.; Chen, X.; Wu, Y.; Cai, H.; Yokoi, H. Adaptive Neural Network Control of a Flexible Spacecraft Subject to Input Nonlinearity and Asymmetric Output Constraint. IEEE Trans. Neural Netw. Learn. Syst. 2021, in press. [Google Scholar] [CrossRef]
- Zhang, Z.; Chen, G.; Yang, S. Ensemble Support Vector Recurrent Neural Network for Brain Signal Detection. IEEE Trans. Neural Netw. Learn. Syst. 2021, in press. [Google Scholar] [CrossRef]
- Nandy, S.; Adhikari, M.; Khan, M.A.; Menon, V.G.; Verma, S. An Intrusion Detection Mechanism for Secured IoMT framework based on Swarm-Neural Network. IEEE J. Biomed. Health Inform. 2021, 26, 1969–1976. [Google Scholar] [CrossRef]
- Alladi, T.; Gera, B.; Agrawal, A.; Chamola, V.; Yu, R. DeepADV: A Deep Neural Network Framework for Anomaly Detection in VANETs. IEEE Trans. Veh. Technol. 2021, 70, 12013–12023. [Google Scholar] [CrossRef]
- Zhang, C.; Yu, Y.; Wang, Y.; Han, Z.; Zhou, M. Chaotic Neural Network-Based Hysteresis Modeling With Dynamic Operator for Magnetic Shape Memory Alloy Actuator. IEEE Trans. Magn. 2021, 57, 2501004. [Google Scholar] [CrossRef]
- Wang, M.H.; Lu, S.D.; Liao, R.M. Fault Diagnosis for Power Cables Based on Convolutional Neural Network with Chaotic System and Discrete Wavelet Transform. IEEE Trans. Power Deliv. 2021, 37, 582–590. [Google Scholar] [CrossRef]
- Zhou, M.; Long, Y.; Zhang, W.; Pu, Q.; Wang, Y.; Nie, W.; He, W. Adaptive Genetic Algorithm-aided Neural Network with Channel State Information Tensor Decomposition for Indoor Localization. IEEE Trans. Evol. Comput. 2021, 25, 913–927. [Google Scholar] [CrossRef]
- Liu, Z.; Seo, H. IoT-NUMS: Evaluating NUMS Elliptic Curve Cryptography for IoT Platforms. IEEE Trans. Inf. Forensics Secur. 2019, 14, 720–729. [Google Scholar] [CrossRef]
- Gao, X.; Yu, J.; Chang, Y.; Wang, H.; Fan, J. Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword with Sensitive Information Privacy for Encrypted Cloud Data. IEEE Trans. Dependable Secur. Comput. 2021, in press. [Google Scholar] [CrossRef]
- Zhang, X.; Tang, W.; Gu, D.; Zhang, Y.; Xue, J.; Wang, X. Lightweight Multidimensional Encrypted Data Aggregation Scheme With Fault Tolerance for Fog-Assisted Smart Grids. IEEE Syst. J. 2022, in press. [Google Scholar] [CrossRef]
- Zolfaghari, B.; Singh, V.; Rai, B.K.; Bibak, K.; Koshiba, T. Cryptography in Hierarchical Coded Caching: System Model and Cost Analysis. Entropy 2021, 23, 1459. [Google Scholar] [CrossRef]
- Xiong, L.; Han, X.; Yang, C.N.; Shi, Y.Q. Robust Reversible Watermarking in Encrypted Image with Secure Multi-party based on Lightweight Cryptography. IEEE Trans. Circuits Syst. Video Technol. 2021, 32, 75–91. [Google Scholar] [CrossRef]
- Parida, P.; Pradhan, C.; Gao, X.Z.; Roy, D.S.; Barik, R.K. Image Encryption and Authentication With Elliptic Curve Cryptography and Multidimensional Chaotic Maps. IEEE Access 2021, 9, 76191–76204. [Google Scholar] [CrossRef]
- He, D.; Zeadally, S.; Kumar, N.; Wu, W. Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures. IEEE Trans. Inf. Forensics Secur. 2016, 11, 2052–2064. [Google Scholar] [CrossRef]
- Al-Shareeda, M.A.; Anbar, M.; Manickam, S.; Khalil, A.; Hasbullah, I.H. Security and Privacy Schemes in Vehicular Ad-Hoc Network With Identity-Based Cryptography Approach: A Survey. IEEE Access 2021, 9, 121522–121531. [Google Scholar] [CrossRef]
- Oudjida, A.K.; Liacha, A. Radix-2w Arithmetic for Scalar Multiplication in Elliptic Curve Cryptography. IEEE Trans. Circuits Syst. I Regul. Pap. 2021, 68, 1979–1989. [Google Scholar] [CrossRef]
- Tian, J.; Lin, J.; Wang, Z. Fast Modular Multipliers for Supersingular Isogeny-Based Post-Quantum Cryptography. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 2021, 29, 359–371. [Google Scholar] [CrossRef]
- Xie, J.; He, P.; Wang, X.M.; Imana, J.L. Efficient Hardware Implementation of Finite Field Arithmetic AB + C over Hybrid Fields for Post-Quantum Cryptography. IEEE Trans. Emerg. Top. Comput. 2021, 10, 1222–1228. [Google Scholar]
- Bibak, K.; Ritchie, R.; Zolfaghari, B. Everlasting security of quantum key distribution with 1K-DWCDM and quadratic hash. Quantum Inf. Comput. 2021, 21, 181–202. [Google Scholar] [CrossRef]
- Cohen, A.; D’Oliveira, R.G.L.; Salamatian, S.; Médard, M. Network Coding-Based Post-Quantum Cryptography. IEEE J. Sel. Areas Inf. Theory 2021, 2, 49–64. [Google Scholar] [CrossRef]
- Zolfaghari, B.; Bibak, K.; Koshiba, T. The Odyssey of Entropy: Cryptography. Entropy 2022, 24, 266. [Google Scholar] [CrossRef] [PubMed]
- Zolfaghari, B.; Bibak, K.; Nemati, H.R.; Koshiba, T.; Mitra, P. Statistical Trend Analysis on Physically Unclonable Functions: An Approach via Text Mining; CRC Press: Boca Raton, FL, USA, 2021. [Google Scholar]
- Lin, C.H.; Wu, J.X.; Chen, P.Y.; Li, C.M.; Pai, N.S.; Kuo, C.L. Symmetric Cryptography With a Chaotic Map and a Multilayer Machine Learning Network for Physiological Signal Infosecurity: Case Study in Electrocardiogram. IEEE Access 2021, 9, 26451–26467. [Google Scholar] [CrossRef]
- Canto, A.C.; Mozaffari-Kermani, M.; Azarderakhsh, R. Reliable CRC-Based Error Detection Constructions for Finite Field Multipliers With Applications in Cryptography. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 2021, 29, 232–236. [Google Scholar] [CrossRef]
- Vandewalle, J.; Preneel, B.; Csapodi, M. Data security issues, cryptographic protection methods, and the use of cellular neural networks and cellular automata. In Proceedings of the Fifth IEEE International Workshop on Cellular Neural Networks and their Applications, Proceedings (Cat. No.98TH8359), London, UK, 14–17 April 1998. [Google Scholar]
- Schmidt, T.; Rahnama, H.; Sadeghian, A. A review of applications of artificial neural networks in cryptosystems. In Proceedings of the World Automation Congress, Waikoloa, HI, USA, 28 September–2 October 2008. [Google Scholar]
- Hu, D.; Wang, Y. Security Research on WiMAX with Neural Cryptography. In Proceedings of the International Conference on Information Security and Assurance, Busan, Korea, 24–26 April 2008. [Google Scholar]
- Hadke, P.P.; Kale, S.G. Use of Neural Networks in cryptography: A review. In Proceedings of the World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave), Coimbatore, India, 29 February–1 March 2016. [Google Scholar]
- Sharma, A.; Sharma, D. Big data protection via neural and quantum cryptography. In Proceedings of the 3rd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, 16–18 March 2016. [Google Scholar]
- ÖzÇakmak, B.; Özbİlen, A.; YavanoĞlu, U.; Cİn, K. Neural and Quantum Cryptography in Big Data: A Review. In Proceedings of the IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA, 9–12 December 2019. [Google Scholar]
- Su, J.; Kankani, A.; Zajko, G.; Elchouemi, A.; Kurniawan, H. Review of Image encryption techniques using neural network for optical security in the healthcare sector—PNO System. In Proceedings of the 5th International Conference on Innovative Technologies in Intelligent Systems and Industrial Applications (CITISIA), Sydney, Australia, 25–27 November 2020. [Google Scholar]
- Meraouche, I.; Dutta, S.; Tan, H.; Sakurai, K. Neural Networks-Based Cryptography: A Survey. IEEE Access 2021, 9, 124727–247400. [Google Scholar] [CrossRef]
- Wright, J.L.; Manic, M. Neural network architecture selection analysis with application to cryptography location. In Proceedings of the International Joint Conference on Neural Networks (IJCNN), Barcelona, Spain, 18–23 July 2010. [Google Scholar]
- Jia, L.; Zhou, A.; Jia, P.; Liu, L.; Wang, Y.; Liu, L. A Neural Network-Based Approach for Cryptographic Function Detection in Malware. IEEE Access 2020, 8, 23506–23521. [Google Scholar] [CrossRef]
- Wright, J.L.; Manic, M. Neural network approach to locating cryptography in object code. In Proceedings of the IEEE Conference on Emerging Technologies & Factory Automation, Palma de Mallorca, Spain, 22–25 September 2009. [Google Scholar]
- Miller, S.; Curran, K.; Lunney, T. Multilayer perceptron neural network for detection of encrypted VPN network traffic. In Proceedings of the International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), Glasgow, UK, 11–12 June 2018. [Google Scholar]
- Yu, T.; Zou, F.; Li, L.; Yi, P. An encrypted malicious traffic detection system based on neural network. In Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), Guilin, China, 17–19 October 2019. [Google Scholar]
- Apolinario, J.; Mendonca, P.; Chaves, R.; Caloba, L. Cryptanalysis of speech signals ciphered by TSP using annealed Hopfield neural network and genetic algorithms. In Proceedings of the 39th Midwest Symposium on Circuits and Systems, Ames, IA, USA, 18–21 August 1996. [Google Scholar]
- Ruzhentsev, V.; Levchenko, R.; Fediushyn, O. Cryptanalysis of Simple Substitution-Permutation Cipher Using Artificial Neural Network. In Proceedings of the IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T), Kharkiv, Ukraine, 6–9 October 2020. [Google Scholar]
- Albassal, A.; Wahdan, A.M. Neural network based cryptanalysis of a feistel type block cipher. In Proceedings of the International Conference on Electrical, Electronic and Computer Engineering, Cairo, Egypt, 5–7 September 2004. [Google Scholar]
- Danziger, M.; Henriques, M.A.A. Improved cryptanalysis combining differential and artificial neural network schemes. In Proceedings of the International Telecommunications Symposium (ITS), Sao Paulo, Brazil, 17–20 August 2014. [Google Scholar]
- Xiao, Y.; Hao, Q.; Yao, D.D. Neural cryptanalysis: Metrics, methodology, and applications in CPS ciphers. In Proceedings of the IEEE Conference on Dependable and Secure Computing (DSC), Hangzhou, China, 18–20 November 2019. [Google Scholar]
- Khan, A.N.; Fan, M.Y.; Malik, A.; Husain, M.A. Cryptanalyzing merkle-hellman public key cryptosystem with artificial neural networks. In Proceedings of the IEEE 5th International Conference for Convergence in Technology (I2CT), Pune, India, 28–31 March 2019. [Google Scholar]
- Hsiao, F.H.; Hsieh, K.P.; Lin, Z.H. Exponential optimal synchronization of chaotic cryptosystems: Neural-network-based approach. In Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, Shanghai, China, 10–12 October 2014. [Google Scholar]
- Oun, A.; Niamat, M. Defense mechanism vulnerability analysis of ring oscillator PUFs against neural network modeling attacks using the dragonfly algorithm. In Proceedings of the IEEE International Conference on Electro Information Technology (EIT), Chicago, IL, USA, 31 July–1 August 2020. [Google Scholar]
- Arvandi, M.; Sadeghian, A. Chosen Plaintext attack against neural network-based symmetric cipher. In Proceedings of the International Joint Conference on Neural Networks, Orlando, FL, USA, 12–17 August 2007. [Google Scholar]
- Awano, H.; Iizuka, T.; Ikeda, M. PUFNet: A deep neural network based modeling attack for physically unclonable function. In Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS), Sapporo, Japan, 26–29 May 2019. [Google Scholar]
- Xu, R.; Joshi, J.; Li, C. NN-EMD: Efficiently Training Neural Networks using Encrypted Multi-sourced Datasets. IEEE Trans. Dependable Secur. Comput. 2021, in press. [Google Scholar] [CrossRef]
- Xu, R.; Joshi, J.B.; Li, C. CryptoNN: Training neural networks over encrypted data. In Proceedings of the IEEE 39th International Conference on Distributed Computing Systems (ICDCS), Dallas, TX, USA, 7–10 July 2019. [Google Scholar]
- Molek, V.; Hurtik, P. Training neural network over encrypted data. In Proceedings of the IEEE Third International Conference on Data Stream Mining & Processing (DSMP), Lviv, Ukraine, 21–25 August 2020. [Google Scholar]
- Nandakumar, K.; Ratha, N.; Pankanti, S.; Halevi, S. Towards deep neural network training on encrypted data. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Long Beach, CA, USA, 16–17 June 2019. [Google Scholar]
- Bazuhair, W.; Lee, W. Detecting malign encrypted network traffic using perlin noise and convolutional neural network. In Proceedings of the 10th Annual Computing and Communication Workshop and Conference (CCWC), Vegas, NV, USA, 6–8 January 2020. [Google Scholar]
- Shen, M.; Zhang, J.; Zhu, L.; Xu, K.; Du, X. Accurate Decentralized Application Identification via Encrypted Traffic Analysis Using Graph Neural Networks. IEEE Trans. Inf. Forensics Secur. 2021, 16, 2367–2380. [Google Scholar] [CrossRef]
- Wang, X.; Chen, S.; Su, J. Automatic Mobile App Identification From Encrypted Traffic With Hybrid Neural Networks. IEEE Access 2020, 8, 182065–182077. [Google Scholar] [CrossRef]
- Zhang, Y.; Zhao, S.; Zhang, J.; Ma, X.; Huang, F. STNN: A novel TLS/SSL encrypted traffic classification system based on stereo transform neural network. In Proceedings of the IEEE 25th International Conference on Parallel and Distributed Systems (ICPADS), Tianjin, China, 4–6 December 2019. [Google Scholar]
- Yang, J.; Narantuya, J.; Lim, H. Bayesian neural network based encrypted traffic classification using initial handshake packets. In Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks—Supplemental Volume (DSN-S), Valencia, Spain, 29 June–2 July 2019. [Google Scholar]
- Zhou, Y.; Cui, J. Research and improvement of encrypted traffic classification based on convolutional neural network. In Proceedings of the IEEE 8th International Conference on Computer Science and Network Technology (ICCSNT), Dalian, China, 20–22 November 2020. [Google Scholar]
- Song, M.; Ran, J.; Li, S. Encrypted traffic classification based on text convolution neural networks. In Proceedings of the IEEE 7th International Conference on Computer Science and Network Technology (ICCSNT), Dalian, China, 19–20 October 2019. [Google Scholar]
- Zou, Z.; Ge, J.; Zheng, H.; Wu, Y.; Han, C.; Yao, Z. Encrypted traffic classification with a convolutional long short-term memory neural network. In Proceedings of the IEEE 20th International Conference on High Performance Computing and Communications and IEEE 16th International Conference on Smart City and IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), Exeter, UK, 28–30 June 2018. [Google Scholar]
- He, Y.; Li, W. Image-based encrypted traffic classification with convolution neural networks. In Proceedings of the IEEE Fifth International Conference on Data Science in Cyberspace (DSC), Hong Kong, China, 27–29 July 2020. [Google Scholar]
- Wang, X.; Chen, S.; Su, J. App-net: A hybrid neural network for encrypted mobile traffic classification. In Proceedings of the IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Toronto, ON, Canada, 6–9 July 2020. [Google Scholar]
- Wang, W.; Zhu, M.; Wang, J.; Zeng, X.; Yang, Z. End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI), Beijing, China, 22–24 July 2017. [Google Scholar]
- Cheng, J.; He, R.; Yuepeng, E.; Wu, Y.; You, J.; Li, T. Real-Time encrypted traffic classification via lightweight neural networks. In Proceedings of the IEEE Global Communications Conference, Taipei, Taiwan, 7–11 December 2020. [Google Scholar]
- Cui, S.; Jiang, B.; Cai, Z.; Lu, Z.; Liu, S.; Liu, J. A session-packets-based encrypted traffic classification using capsule neural networks. In Proceedings of the IEEE 21st International Conference on High Performance Computing and Communications and IEEE 17th International Conference on Smart City and IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), Zhangjiajie, China, 10–12 August 2019. [Google Scholar]
- Yang, Y.; Kang, C.; Gou, G.; Li, Z.; Xiong, G. TLS/SSL encrypted traffic classification with autoencoder and convolutional neural network. In Proceedings of the IEEE 20th International Conference on High Performance Computing and Communications and IEEE 16th International Conference on Smart City and IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), Exeter, UK, 28–30 June 2018. [Google Scholar]
- Wang, M.; Zheng, K.; Luo, D.; Yang, Y.; Wang, X. An encrypted traffic classification framework based on convolutional neural networks and stacked autoencoders. In Proceedings of the IEEE 6th International Conference on Computer and Communications (ICCC), Chengdu, China, 11–14 December 2020. [Google Scholar]
- Lidkea, V.M.; Muresan, R.; Al-Dweik, A. Convolutional Neural Network Framework for Encrypted Image Classification in Cloud-Based ITS. IEEE Open J. Intell. Transp. Syst. 2020, 1, 35–50. [Google Scholar] [CrossRef]
- Zhang, Q.; Zhao, X.; Hu, Y. A Classification Retrieval Method for Encrypted Speech Based on Deep Neural Network and Deep Hashing. IEEE Access 2020, 8, 202469–202482. [Google Scholar] [CrossRef]
- Yang, K.; Xu, L.; Xu, Y.; Chao, J. Encrypted application classification with convolutional neural network. In Proceedings of the IFIP Networking Conference (Networking), Paris, France, 22–26 June 2020. [Google Scholar]
- Shortt, A.E.; Naughton, T.J.; Javidi, B. Compression of Optically Encrypted Digital Holograms Using Artificial Neural Networks. J. Disp. Technol. 2006, 2, 401–410. [Google Scholar] [CrossRef] [Green Version]
- Fezza, S.A.; Keita, M.; Hamidouche, W. Visual quality and security assessment of perceptually encrypted images based on multi-output deep neural network. In Proceedings of the 9th European Workshop on Visual Information Processing (EUVIP), Paris, France, 23–25 June 2021. [Google Scholar]
- Novotný, J.K. WTFHE: Neural-network-ready torus fully homomorphic encryption. In Proceedings of the 9th Mediterranean Conference on Embedded Computing (MECO), Budva, Montenegro, 8–11 June 2020. [Google Scholar]
- Ghimes, A.M.; Vladuta, V.A.; Patriciu, V.V.; Ioniţă, A. Applying neural network approach to homomorphic encrypted data. In Proceedings of the 10th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), Iasi, Romania, 28–30 June 2018. [Google Scholar]
- Meftah, S.; Tan, B.H.M.; Mun, C.F.; Aung, K.M.M.; Veeravalli, B.; Chandrasekhar, V. DOReN: Toward Efficient Deep Convolutional Neural Networks with Fully Homomorphic Encryption. IEEE Trans. Inf. Forensics Secur. 2021, 16, 3740–7520. [Google Scholar] [CrossRef]
- Zhou, J.; Li, J.; Panaousis, E.; Liang, K. Deep binarized convolutional neural network inferences over encrypted data. In Proceedings of the 7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/6th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), New York, NY, USA, 1–3 August 2020. [Google Scholar]
- Ma, Y.; Wu, L.; Gu, X.; He, J.; Yang, Z. A Secure Face-Verification Scheme Based on Homomorphic Encryption and Deep Neural Networks. IEEE Access 2017, 5, 16532–16538. [Google Scholar] [CrossRef]
- Gaid, M.L.; Fakhr, M.W.; Selim, G.I. Secure translation using fully homomorphic encryption and sequence-to-sequence neural networks. In Proceedings of the 28th International Conference on Computer Theory and Applications (ICCTA), Alexandria, Egypt, 30 October–1 November 2018. [Google Scholar]
- Kim, T.; Youn, T.Y.; Choi, D. Deep Neural Networks Based Key Concealment Scheme. IEEE Access 2020, 8, 204214–204225. [Google Scholar] [CrossRef]
- Allam, A.M.; Abbas, H.M. Group key exchange using neural cryptography with binary trees. In Proceedings of the 24th Canadian Conference on Electrical and Computer Engineering (CCECE), Niagara Falls, ON, Canada, 8–11 May 2011. [Google Scholar]
- Guerreiro, A.M.G.; de Araujo, C.P. A Neural Key Generator for a Public Block Cipher. In Proceedings of the Ninth Brazilian Symposium on Neural Networks, Ribeirao Preto, Brazil, 26–27 October 2006. [Google Scholar]
- Jin, J.; Kim, K. 3D CUBE Algorithm for the Key Generation Method: Applying Deep Neural Network Learning-Based. IEEE Access 2020, 8, 33689–33702. [Google Scholar] [CrossRef]
- Sarkar, A.; Singh, M.M.; Khan, M.Z.; Alhazmi, O.H. Nature-Inspired Gravitational Search-Guided Artificial Neural Key Exchange for IoT Security Enhancement. IEEE Access 2021, 9, 76780–76795. [Google Scholar] [CrossRef]
- Kimura, H.; Isobe, T.; Ohigashi, T. Neural-Network-Based Pseudo-Random Number Generator Evaluation Tool for Stream Ciphers. In Proceedings of the Seventh International Symposium on Computing and Networking Workshops (CANDARW), Nagasaki, Japan, 26–29 November 2019. [Google Scholar]
- Saraswat, P.; Garg, K.; Tripathi, R.; Agarwal, A. Encryption algorithm based on neural network. In Proceedings of the 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU), Ghaziabad, India, 18–19 April 2019. [Google Scholar]
- Munukur, R.K.; Gnanam, V. Neural network based decryption for random encryption algorithms. In Proceedings of the 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication, Hong Kong, China, 20–22 August 2009. [Google Scholar]
- Kinzel, W.; Kanter, I. Neural cryptography. In Proceedings of the 9th International Conference on Neural Information Processing, Vancouver, BC, Canada, 9–14 December 2002. [Google Scholar]
- Liu, C.Y.; Woungang, I.; Chao, H.C.; Dhurandher, S.K.; Chi, T.Y.; Obaidat, M.S. Message security in multi-path ad hoc networks using a neural network-based cipher. In Proceedings of the IEEE Global Telecommunications Conference—GLOBECOM, Houston, TX, USA, 5–9 December 2011. [Google Scholar]
- Tsmots, I.; Rabyk, V.; Lukaschuk, Y.; Teslyuk, V.; Liubun, Z. Neural Network Technology for Protecting Cryptographic Data. In Proceedings of the IEEE 12th International Conference on Electronics and Information Technologies (ELIT), Lviv, Ukraine, 19–21 May 2021. [Google Scholar]
- Hu, D. A New Service-Based Computing Security Model with Neural Cryptography. In Proceedings of the Second Pacific-Asia Conference on Web Mining and Web-based Application, Wuhan, China, 6–7 June 2009. [Google Scholar]
- Forgáč, R.; Očkay, M. Contribution to symmetric cryptography by convolutional neural networks. In Proceedings of the Communication and Information Technologies (KIT), Vysoke Tatry, Slovakia, 9–11 October 2019. [Google Scholar]
- Noura, H.; Samhat, A.E.; Harkouss, Y.; Yahiya, T.A. Design and realization of a new neural block cipher. In Proceedings of the International Conference on Applied Research in Computer Science and Engineering, Beirut, Lebanon, 8–9 October 2015. [Google Scholar]
- Rabyk, V.; Tsmots, I.; Lyubun, Z.; Skorokhoda, O. Method and means of symmetric real-time neural network data encryption. In Proceedings of the IEEE 15th International Conference on Computer Sciences and Information Technologies (CSIT), Zbarazh, Ukraine, 23–26 September 2020. [Google Scholar]
- Liu, L.; Zhang, L.; Jiang, D.; Guan, Y.; Zhang, Z. A Simultaneous Scrambling and Diffusion Color Image Encryption Algorithm Based on Hopfield Chaotic Neural Network. IEEE Access 2019, 7, 185796–185810. [Google Scholar] [CrossRef]
- Zhou, S. Image encryption technology research based on neural network. In Proceedings of the International Conference on Intelligent Transportation, Big Data and Smart City, Halong Bay, Vietnam, 19–20 December 2015. [Google Scholar]
- Hu, G.; Kou, W.; Dong, J.; Peng, J. A novel image encryption algorithm based on cellular neural networks hyper chaotic system. In Proceedings of the IEEE 4th International Conference on Computer and Communications (ICCC), Chengdu, China, 7–10 December 2018. [Google Scholar]
- Joshi, S.D.; Udupi, V.R.; Joshi, D.R. A novel neural network approach for digital image data encryption/decryption. In Proceedings of the International Conference on Power, Signals, Controls and Computation, Thrissur, India, 3–6 January 2012. [Google Scholar]
- Kumar, S.; Aid, R. Image encryption using wavelet based chaotic neural network. In Proceedings of the International Conference on Advances in Computing, Communications and Informatics (ICACCI), Jaipur, India, 21–24 September 2016. [Google Scholar]
- Fadil, T.A.; Yaakob, S.N.; Ahmad, B. A hybrid chaos and neural network cipher encryption algorithm for compressed video signal transmission over wireless channel. In Proceedings of the 2nd International Conference on Electronic Design (ICED), Penang, Malaysia, 19–21 August 2014. [Google Scholar]
- Gaffar, A.F.O.; Putra, A.B.W.; Malani, R. The Multi Layer Auto Encoder Neural Network (ML-AENN) for Encryption and Decryption of Text Message. In Proceedings of the 5th International Conference on Science in Information Technology (ICSITech), Jogjakarta, Indonesia, 23–24 October 2019. [Google Scholar]
- Wang, H.; Lursinsap, C. Neural Cryptosystem for Textual Message with Plasticity and Secret Dimensions. In Proceedings of the 18th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), Chiang Mai, Thailand, 19–22 May 2021. [Google Scholar]
- Roy, S.S.; Shahriyar, S.A.; Asaf-Uddowla, M.; Alam, K.M.R.; Morimoto, Y. A novel encryption model for text messages using delayed chaotic neural network and DNA cryptography. In Proceedings of the 20th International Conference of Computer and Information Technology (ICCIT), Dhaka, Bangladesh, 22–24 December 2017. [Google Scholar]
- Hu, D.; Lao, H. Privacy research on ubicomp computing with neural cryptography. In Proceedings of the 3rd International Conference on Grid and Pervasive Computing—Workshops, Kunming, China, 25–28 May 2008. [Google Scholar]
- Hu, D.; Wang, Y. Secure Authentication on WiMAX with Neural Cryptography. In Proceedings of the International Conference on Information Security and Assurance, Busan, Korea, 24–26 April 2008. [Google Scholar]
- Allam, A.M.; Abbas, H.M.; El-Kharashi, M.W. Authenticated key exchange protocol using neural cryptography with secret boundaries. In Proceedings of the International Joint Conference on Neural Networks (IJCNN), Dallas, TX, USA, 4–9 August 2013. [Google Scholar]
- Firmino, M.; Brandão, G.B.; Guerreiro, A.M.G.; de Valentim, R.A.M. Neural cryptography applied to key management protocol with mutual authentication in RFID systems. In Proceedings of the International Conference for Internet Technology and Secured Transactions, London, UK, 9–12 November 2009. [Google Scholar]
- Arora, A.; Miri, R. Taylor-Grey Rider based Deep Recurrent Neural Network using Feature Level Fusion for Cryptography Enabled Biometric System. In Proceedings of the 3rd International Conference on Intelligent Sustainable Systems (ICISS), Palladam, India, 3–5 December 2020. [Google Scholar]
- Duan, X.; Guo, D.; Liu, N.; Li, B.; Gou, M.; Qin, C. A New High Capacity Image Steganography Method Combined With Image Elliptic Curve Cryptography and Deep Neural Network. IEEE Access 2020, 8, 25777–25788. [Google Scholar] [CrossRef]
- Petkov, T.; Sotirova, E.; Ahmed, S.; Sotirov, S. Encrypting message in a sound using self organizing map neural network described by a generalized net. In Proceedings of the IEEE 8th International Conference on Intelligent Systems (IS), Sofia, Bulgaria, 4–6 September 2016. [Google Scholar]
- Petkov, T.; Panayotova, K.; Sotirov, S. Generalized net model of encrypting message in an image using self organizing map neural network. In Proceedings of the 19th International Symposium on Electrical Apparatus and Technologies (SIELA), Bourgas, Bulgaria, 29 May–1 June 2016. [Google Scholar]
- Wang, Y.; Li, Y.; Lu, X.N. Evaluation criteria for visual cryptography schemes via neural networks. In Proceedings of the International Conference on Cyberworlds (CW), Caen, France, 29 September–1 October 2020. [Google Scholar]
- Yue, T.W.; Chiang, S. A neural network approach for visual cryptography. In Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks—IJCNN 2000—Neural Computing: New Challenges and Perspectives for the New Millennium, Como, Italy, 27 July 2000. [Google Scholar]
- Yue, T.W.; Chiang, S. A known-energy neural network approach for visual cryptography. In Proceedings of the International Joint Conference on Neural Networks, Washington, DC, USA, 15–19 July 2001. [Google Scholar]
- Ge, S.; Changgen, P.; Xuelan, M. Visual cryptography scheme using pi-sigma neural networks. In Proceedings of the International Symposium on Information Science and Engineering, Shanghai, China, 20–22 December 2008. [Google Scholar]
- Hu, D. Secure mobile network handover with neural cryptography. In Proceedings of the International Symposium on Communications and Information Technologies, Sydney, Australia, 17–19 October 2007. [Google Scholar]
- Mandal, J.K.; Sarkar, A. An adaptive neural network guided random block length based cryptosystem for online wireless communication (ANNRBLC). In Proceedings of the International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), Chennai, India, 28 February–3 March 2011. [Google Scholar]
- Karas, D.S.; Karagiannidis, G.K.; Schober, R. Neural network based PHY-layer key exchange for wireless communications. In Proceedings of the IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications, Toronto, ON, Canada, 11–14 September 2011. [Google Scholar]
- Sun, Y.; Lo, F.P.W.; Lo, B. Light-weight Internet-of-Things Device Authentication, Encryption and Key Distribution using End-to-End Neural Cryptosystems. IEEE Internet Things J. 2021, in press. [Google Scholar] [CrossRef]
- Ismail, I.A.; Galal-Edeen, G.H.; Khattab, S.; Bahtity, M.A.E.M.E. Satellite image encryption using neural networks backpropagation. In Proceedings of the 22nd International Conference on Computer Theory and Applications (ICCTA), Alexandria, Egypt, 13–15 October 2012. [Google Scholar]
- Yelina, T.N.; Bezzateev, S.V.; Mylnikov, V.A. The homomorphic encryption in pipelines accident prediction by using cloud-based neural network. In Proceedings of the Wave Electronics and its Application in Information and Telecommunication Systems (WECONF), Saint-Petersburg, Russia, 3–7 June 2019. [Google Scholar]
- Thoms, G.R.W.; Muresan, R.; Al-Dweik, A. Chaotic Encryption Algorithm With Key Controlled Neural Networks for Intelligent Transportation Systems. IEEE Access 2019, 7, 158697–158709. [Google Scholar] [CrossRef]
- Kumar, C.N.S.V.; Suhasini, A. Improved secure three-tier architecture for WSN using hopfield chaotic neural network with two stage encryption. In Proceedings of the International Conference on Computer, Electrical & Communication Engineering (ICCECE), Kolkata, India, 16–17 December 2016. [Google Scholar]
- Bi, M.; Zhuo, X.; Fu, X.; Yang, X.; Hu, W. Cellular Neural Network Encryption Scheme for Time Synchronization and CPAs Resistance in OFDM-PON. IEEE Access 2019, 7, 57129–57137. [Google Scholar] [CrossRef]
- Zhou, Y.; Bi, M.; Zhuo, X.; Lv, Y.; Yang, X.; Hu, W. Physical Layer Dynamic Key Encryption in OFDM-PON System Based on Cellular Neural Network. IEEE Photonics J. 2021, 13, 7200314. [Google Scholar] [CrossRef]
- Preethi, P.; Asokan, R. Neural Network oriented RONI prediction for embedding process with hex code encryption in DICOM images. In Proceedings of the 2nd International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), Greater Noida, India, 18–19 December 2020. [Google Scholar]
- Han, B.; Jia, Y.; Huang, G.; Cai, L. A medical image encryption algorithm based on hermite chaotic neural network. In Proceedings of the IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), Chongqing, China, 12–14 June 2020. [Google Scholar]
- Zhu, Y.; Vargas, D.V.; Sakurai, K. Neural cryptography based on the topology evolving neural networks. In Proceedings of the Sixth International Symposium on Computing and Networking Workshops (CANDARW), Takayama, Japan, 27–30 November 2018. [Google Scholar]
- Dong, T.; Huang, T. Neural Cryptography Based on Complex-Valued Neural Network. IEEE Trans. Neural Netw. Learn. Syst. 2020, 31, 4999–5004. [Google Scholar] [CrossRef]
- Wang, J.; Cheng, L.M.; Su, T. Multivariate Cryptography Based on Clipped Hopfield Neural Network. IEEE Trans. Neural Netw. Learn. Syst. 2018, 29, 353–363. [Google Scholar] [CrossRef]
- Srivastava, S.; Bhatia, A. On the learning capabilities of recurrent neural networks: A cryptographic perspective. In Proceedings of the IEEE International Conference on Big Knowledge (ICBK), Singapore, 17 November 2018. [Google Scholar]
- Zhou, K.; Kang, Y.; Huang, Y.; Feng, E. Encrypting algorithm based on RBF neural network. In Proceedings of the Third International Conference on Natural Computation, Haikou, China, 24–27 October 2007. [Google Scholar]
- Fei, X.; Liu, G.; Zheng, B. A chaotic encryption system using PCA neural networks. In Proceedings of the IEEE Conference on Cybernetics and Intelligent Systems, Chengdu, China, 21–24 September 2008. [Google Scholar]
- Lin, J.; Luo, Y.; Liu, J.; Bi, J.; Qiu, S.; Cen, M.; Liao, Z. An image compression-encryption algorithm based on cellular neural network and compressive sensing. In Proceedings of the IEEE 3rd International Conference on Image, Vision and Computing (ICIVC), Chongqing, China, 27–29 June 2018. [Google Scholar]
- Yang, F.; Mou, J.; Cao, Y.; Chu, R. An image encryption algorithm based on BP neural network and hyperchaotic system. China Commun. 2020, 17, 21–28. [Google Scholar] [CrossRef]
- Li, H.; Li, C.; Ouyang, D.; Nguang, S.K. Impulsive synchronization of unbounded delayed inertial neural networks with actuator saturation and sampled-data control and its application to image encryption. IEEE Trans. Neural Netw. Learn. Syst. 2021, 32, 1460–1473. [Google Scholar] [CrossRef]
- Xiao, J.; Wang, W.; Wang, M. Image encryption algorithm based on memristive BAM neural networks. In Proceedings of the IEEE Third International Conference on Data Science in Cyberspace (DSC), Guangzhou, China, 18–21 June 2018. [Google Scholar]
- Arvandi, M.; Wu, S.; Sadeghian, A.; Melek, W.; Woungang, I. Symmetric cipher design using recurrent neural networks. In Proceedings of the IEEE International Joint Conference on Neural Network, Vancouver, BC, Canada, 16–21 July 2006. [Google Scholar]
- Arvandi, M.; Wu, S.; Sadeghian, A. On the use of recurrent neural networks to design symmetric ciphers. IEEE Comput. Intell. Mag. 2008, 3, 42–53. [Google Scholar] [CrossRef]
- Feizi, S.; Nemati, A.; Haghiri, S.; Ahmadi, A.; Seif, M. Digital hardware implementation of lightweight cryptography algorithm using neural networks. In Proceedings of the 28th Iranian Conference on Electrical Engineering (ICEE), Tabriz, Iran, 4–6 August 2020. [Google Scholar]
- Santiago, L.; Patil, V.C.; Prado, C.B.; Alves, T.A.O.; Marzulo, L.A.J.; França, F.M.G.; Kundu, S. Realizing strong PUF from weak PUF via neural computing. In Proceedings of the IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), Cambridge, UK, 23–25 October 2017. [Google Scholar]
- Takalo, H.; Ahmadi, A.; Mirhassani, M.; Ahmadi, M. Analog cellular neural network for application in physical unclonable functions. In Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS), Montreal, QC, Canada, 22–25 May 2016. [Google Scholar]
- Addabbo, T.; Fort, A.; Marco, M.D.; Pancioni, L.; Vignoli, V. Physically Unclonable Functions Derived From Cellular Neural Networks. IEEE Trans. Circuits Syst. I Regul. Pap. 2013, 60, 3205–3214. [Google Scholar] [CrossRef]
- Alimohammadi, N.; Shokouhi, S.B. Secure hardware key based on physically unclonable functions and artificial neural network. In Proceedings of the 8th International Symposium on Telecommunications (IST), Tehran, Iran, 27–28 September 2016. [Google Scholar]
- Shibagaki, K.; Umeda, T.; Nozaki, Y.; Yoshikawa, M. Feasibility evaluation of neural network physical unclonable function. In Proceedings of the IEEE 7th Global Conference on Consumer Electronics (GCCE), Nara, Japan, 9–12 October 2018. [Google Scholar]
- Mislovaty, R.; Klein, E.; Kanter, I.; Kinzel, W. Security of neural cryptography. In Proceedings of the 11th IEEE International Conference on Electronics, Circuits and Systems, Tel Aviv, Israel, 13–15 December 2004. [Google Scholar]
- Stöttinger, M.; Huss, S.A.; Mühlbach, S.; Koch, A. Side-channel resistance evaluation of a neural network based lightweight cryptography scheme. In Proceedings of the IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, Hong Kong, China, 11–13 December 2010. [Google Scholar]
- Liu, N.; Guo, D. Security analysis of public-key encryption scheme based on neural networks and its implementing. In Proceedings of the International Conference on Computational Intelligence and Security, Chengdu, China, 19–21 November 2006. [Google Scholar]
- Allam, A.M.; Abbas, H.M.; El-Kharashi, M.W. Security analysis of neural cryptography implementation. In Proceedings of the IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM), Victoria, BC, Canada, 27–29 August 2013. [Google Scholar]
- Tan, X.; Xiang, C.; Cao, J.; Xu, W.; Wen, G.; Rutkowski, L. Synchronization of Neural Networks via Periodic Self-Triggered Impulsive Control and Its Application in Image Encryption. IEEE Trans. Cybern. 2021, in press. [Google Scholar] [CrossRef] [PubMed]
- Zang, H.; Min, L. Generalized synchronization theorems for a kind of Neural Network with application in data encryption. In Proceedings of the 3rd IEEE Conference on Industrial Electronics and Applications, Singapore, 3–5 June 2008. [Google Scholar]
- Wen, S.; Zeng, Z.; Huang, T.; Meng, Q.; Yao, W. Lag Synchronization of Switched Neural Networks via Neural Activation Function and Applications in Image Encryption. IEEE Trans. Neural Netw. Learn. Syst. 2015, 26, 1493–1502. [Google Scholar] [CrossRef] [Green Version]
- Chen, W.H.; Luo, S.; Zheng, W.X. Impulsive Synchronization of Reaction–Diffusion Neural Networks With Mixed Delays and Its Application to Image Encryption. IEEE Trans. Neural Netw. Learn. Syst. 2016, 27, 2696–2710. [Google Scholar] [CrossRef]
- Zhang, X.; Sheng, S.; Lu, G.; Zheng, Y. Synchronization for arrays of coupled jumping delayed neural networks and its application to image encryption. In Proceedings of the IEEE 56th Annual Conference on Decision and Control (CDC), Melbourne, Australia, 12–15 December 2017. [Google Scholar]
- Wang, W.; Wang, X.; Luo, X.; Yuan, M. Finite-Time Projective Synchronization of Memristor-Based BAM Neural Networks and Applications in Image Encryption. IEEE Access 2018, 6, 56457–56476. [Google Scholar] [CrossRef]
- Wang, W.; Yu, X.; Luo, X.; Kurths, J. Finite-Time Synchronization of Chaotic Memristive Multidirectional Associative Memory Neural Networks and Applications in Image Encryption. IEEE Access 2018, 6, 35764–35779. [Google Scholar] [CrossRef]
- Zou, A.; Xiao, X. An asynchronous encryption arithmetic based on laguerre chaotic neural networks. In Proceedings of the WRI Global Congress on Intelligent Systems, Xiamen, China, 19–21 May 2009. [Google Scholar]
- Chaos. Available online: https://mathworld.wolfram.com/Chaos.html (accessed on 18 May 2022).
- Bharadwaj, G.V.S.E.; Vijaya, K.; Balaga, S.K.; Thanikaiselvan, V. Image encryption based on neural network architecture and chaotic systems. In Proceedings of the Second International Conference on Electronics, Communication and Aerospace Technology (ICECA), Coimbatore, India, 29–31 March 2018. [Google Scholar]
- De Almeida Ramos, E.; Filho, J.C.B.; Reis, R. Cryptography by synchronization of hopfield neural networks that simulate chaotic signals generated by the human body. In Proceedings of the 17th IEEE International New Circuits and Systems Conference (NEWCAS), Munich, Germany, 23–26 June 2019. [Google Scholar]
- Chatzidakis, S.; Forsberg, P.; Tsoukalas, L.H. Chaotic neural networks for intelligent signal encryption. In Proceedings of the 5th International Conference on Information, Intelligence, Systems and Applications, Chania, Greece, 7–9 July 2014. [Google Scholar]
- Su, S.; Lin, A.; Yen, J.C. Design and realization of a new chaotic neural encryption/decryption network. In Proceedings of the IEEE Asia-Pacific Conference on Circuits and Systems. Electronic Communication Systems. (Cat. No.00EX394), Tianjin, China, 4–6 December 2000. [Google Scholar]
- Dogaru, R.; Murgan, A.; Ioan, D. Chains of discrete-time chaotic neural networks for generation of broadband signals with applications in improved ciphering systems. In Proceedings of the 8th Mediterranean Electrotechnical Conference on Industrial Applications in Power Systems, Computer Science and Telecommunications, Bari, Italy, 16 May 1996. [Google Scholar]
- Singla, P.; Sachdeva, P.; Ahmad, M. A chaotic neural network based cryptographic pseudo-random sequence design. In Proceedings of the Fourth International Conference on Advanced Computing & Communication Technologies, Rohtak, India, 8–9 February 2014. [Google Scholar]
- Lokesh, S.; Kounte, M.R. Chaotic neural network based pseudo-random sequence generator for cryptographic applications. In Proceedings of the International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), Davangere, India, 29–31 October 2015. [Google Scholar]
- Zhang, Y.; Xue, T.; Zhai, Z.; Ma, C.; Cai, X. The improvement of public key cryptography based on chaotic neural networks. In Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, Kaohsiung, Taiwan, 26–28 November 2008. [Google Scholar]
- Ahmad, M.; Malik, M. Design of chaotic neural network based method for cryptographic substitution box. In Proceedings of the International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), Chennai, India, 3–5 March 2016. [Google Scholar]
- Skovajsová, L. Comparison of cryptography by chaotic neural network and by AES. In Proceedings of the IEEE 19th International Symposium on Computational Intelligence and Informatics and 7th IEEE International Conference on Recent Achievements in Mechatronics, Automation, Computer Sciences and Robotics (CINTI-MACRo), Szeged, Hungary, 14–16 November 2019. [Google Scholar]
- Mandal, J.K.; Sarkar, A. An adaptive genetic key based neural encryption for online wireless communication (AGKNE). In Proceedings of the International Conference on Recent Trends in Information Systems, Kolkata, India, 21–23 December 2011. [Google Scholar]
- Sagar, V.; Kumar, K. A symmetric key cryptography using genetic algorithm and error back propagation neural network. In Proceedings of the 2nd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, 11–13 March 2015. [Google Scholar]
- Kalaiselvi, K.; Kumar, A. Enhanced AES cryptosystem by using genetic algorithm and neural network in S-box. In Proceedings of the IEEE International Conference on Current Trends in Advanced Computing (ICCTAC), Bangalore, India, 10–11 March 2016. [Google Scholar]
- Jhajharia, S.; Mishra, S.; Bali, S. Public key cryptography using neural networks and genetic algorithms. In Proceedings of the Sixth International Conference on Contemporary Computing (IC3), Noida, India, 8–10 August 2013. [Google Scholar]
- Checksum and Cyclic Redundancy Check Mechanism. Available online: https://link.springer.com/referenceworkentry/10.1007/978-0-387-39940-9_1474 (accessed on 18 May 2022).
- Allam, A.M.; Abbas, H.M. Improved security of neural cryptography using don’t-trust-my-partner and error prediction. In Proceedings of the International Joint Conference on Neural Networks, Atlanta, GA, USA, 14–19 June 2009. [Google Scholar]
- Allam, A.M.; Abbas, H.M. On the Improvement of Neural Cryptography Using Erroneous Transmitted Information with Error Prediction. IEEE Trans. Neural Netw. 2011, 21, 1915–1924. [Google Scholar] [CrossRef]
- Fourier Transform. Available online: https://docs.opencv.org/3.4/de/dbc/tutorial_py_fourier_transform.html (accessed on 18 May 2022).
- Ashtiyani, M.; Behbahani, S.; Asadi, S.; Birgani, P.M. Transmitting Encrypted Data by Wavelet Transform and Neural Network. In Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, Giza, Egypt, 15–18 December 2007. [Google Scholar]
- What Is a Blockchain? Available online: https://www.investopedia.com/terms/b/blockchain.asp (accessed on 18 May 2022).
- Noh, S.; Rhee, K.H. Implicit authentication in neural key exchange based on the randomization of the Public Blockchain. In Proceedings of the IEEE International Conference on Blockchain (Blockchain), Rhodes, Greece, 2–6 November 2020. [Google Scholar]
- Combinatorics. Available online: https://www.cs.uleth.ca/~morris/Combinatorics/Combinatorics.pdf (accessed on 18 May 2022).
- Lin, M.; Long, F.; Guo, L. Grayscale image encryption based on Latin square and cellular neural network. In Proceedings of the Chinese Control and Decision Conference (CCDC), Yinchuan, China, 28–30 May 2016. [Google Scholar]
- Lytvyn, V.; Peleshchak, I.; Peleshchak, R.; Vysotska, V. Information encryption based on the synthesis of a neural network and AES algorithm. In Proceedings of the 3rd International Conference on Advanced Information and Communications Technologies (AICT), Lviv, Ukraine, 2–6 July 2019. [Google Scholar]
- Husein, A.M.; Harahap, M.; Dharma, A.; Simarmata, A.M. Hybrid-AES-Blowfish algorithm: Key exchange using neural network. In Proceedings of the International Conference of Computer Science and Information Technology (ICoSNIKOM), Medan, Indonesia, 28–29 November 2019. [Google Scholar]
- Liu, Y.; Zhang, J.; Tang, W. Noise removal using Cohen-Grossberg neural network for improving the quality of the decrypted image in color encryption. In Proceedings of the IEEE 3rd International Conference on Communication Software and Networks, Xi’an, China, 27–29 May 2011. [Google Scholar]
- Tsmots, I.; Tsymbal, Y.; Skorokhoda, O.; Tkachenko, R. Neural-like methods and hardware structures for real-time data encryption and decryption. In Proceedings of the IEEE 14th International Conference on Computer Sciences and Information Technologies (CSIT), Lviv, Ukraine, 17–20 September 2019. [Google Scholar]
- Li, H.; Han, T. An end-to-end encrypted neural network for gradient updates transmission in federated learning. In Proceedings of the Data Compression Conference (DCC), Snowbird, UT, USA, 26–29 March 2019. [Google Scholar]
- Choi, Y.; Sim, J.; Kim, L.S. CREMON: Cryptography Embedded on the Convolutional Neural Network Accelerator. IEEE Trans. Circuits Syst. II Express Briefs 2020, 67, 3337–3341. [Google Scholar] [CrossRef]
- Emmanuel, A.B.; Zhou, S.; Liao, Y.; Liu, Q. Privacy-preservation in distributed deep neural networks via encryption of selected gradients. In Proceedings of the IEEE 22nd International Conference on High Performance Computing and Communications and IEEE 18th International Conference on Smart City and IEEE 6th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), Cuvu, Fiji, 14–16 December 2020. [Google Scholar]
- Cai, Y.; Chen, X.; Tian, L.; Wang, Y.; Yang, H. Enabling secure in-memory neural network computing by sparse fast gradient encryption. In Proceedings of the IEEE/ACM International Conference on Computer-Aided Design (ICCAD), Austin, TX, USA, 2–6 November 2019. [Google Scholar]
- Cai, Y.; Chen, X.; Tian, L.; Wang, Y.; Yang, H. Enabling Secure NVM-Based in-Memory Neural Network Computing by Sparse Fast Gradient Encryption. IEEE Trans. Comput. 2020, 69, 1596–1610. [Google Scholar] [CrossRef]
- Cantoro, R.; Deligiannis, N.I.; Reorda, M.S.; Traiola, M.; Valea, E. Evaluating data encryption effects on the resilience of an artificial neural network. In Proceedings of the IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), Frascati, Italy, 19–21 October 2020. [Google Scholar]
- Hu, X.; Tian, J.; Wang, Z. Fast permutation architecture on encrypted data for secure neural network inference. In Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems (APCCAS), Ha Long, Vietnam, 8–10 December 2020. [Google Scholar]
- Sirichotedumrong, W.; Maekawa, T.; Kinoshita, Y.; Kiya, H. Privacy-preserving deep neural networks with pixel-based image encryption considering data augmentation in the encrypted domain. In Proceedings of the IEEE International Conference on Image Processing (ICIP), Taipei, Taiwan, 22–25 September 2019. [Google Scholar]
- Sirichotedumrong, W.; Kinoshita, Y.; Kiya, H. On the security of pixel-based image encryption for privacy-preserving deep neural networks. In Proceedings of the IEEE 8th Global Conference on Consumer Electronics (GCCE), Osaka, Japan, 15–18 October 2019. [Google Scholar]
- Sirichotedumrong, W.; Kinoshita, Y.; Kiya, H. Privacy-Preserving deep neural networks using pixel-based image encryption without common security keys. In Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), Lanzhou, China, 18–21 November 2019. [Google Scholar]
- Sirichotedumrong, W.; Kinoshita, Y.; Kiya, H. Pixel-Based Image Encryption Without Key Management for Privacy-Preserving Deep Neural Networks. IEEE Access 2019, 7, 177844–177855. [Google Scholar] [CrossRef]
- Liu, X.; Jin, X.; Zhao, Y. Optical image encryption using fractional-order quantum cellular neural networks in a fractional fourier domain. In Proceedings of the 14th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD), Huangshan, China, 28–30 July 2018. [Google Scholar]
- Anh, T.T.; Thanh, N.V.; Luong, T.D. A construction of cryptography system based on quantum neural network. In Proceedings of the Eighth International Conference on Knowledge and Systems Engineering (KSE), Hanoi, Vietnam, 6–8 October 2016. [Google Scholar]
- Dai, S. Quantum Cryptanalysis on a Multivariate Cryptosystem Based on Clipped Hopfield Neural Network. IEEE Trans. Neural Netw. Learn. Syst. 2021, in press. [Google Scholar] [CrossRef] [PubMed]
- Niemiec, M.; Mehic, M.; Voznak, M. Security Verification of artificial neural networks used to error correction in quantum cryptography. In Proceedings of the 26th Telecommunications Forum (TELFOR), Belgrade, Serbia, 20–21 November 2018. [Google Scholar]
- Wang, B.; Li, Y.; Lei, C.; Zhao, Y.; Zhang, J.; Wang, X. Quantum noise diffusion mapping based on chaotic recurrent neural network in quantum noise cipher. In Proceedings of the Asia Communications and Photonics Conference (ACP) and International Conference on Information Photonics and Optical Communications (IPOC), Beijing, China, 24–27 October 2020. [Google Scholar]
- Zamani, H.; Nadimi-Shahraki, M.H.; Gandomic, A.H. QANA: Quantum-based avian navigation optimizer algorithm. Eng. Appl. Artif. Intell. 2021, 104, 104314. [Google Scholar] [CrossRef]
- Cheng, H.C.; Hanson, E.P.; Datta, N.; Hsieh, M.H. Duality between source coding with quantum side information and classical-quantum channel coding. IEEE Trans. Inf. Theory 2022, in press. [Google Scholar] [CrossRef]
- Lee, W.K.; Hwang, S.O. High Throughput Implementation of Post-quantum Key Encapsulation and Decapsulation on GPU for Internet of Things Applications. IEEE Trans. Serv. Comput. 2021, in press. [Google Scholar] [CrossRef]
- Li, Y.; Aghvami, A.H.; Dong, D. Intelligent Trajectory Planning in UAV-Mounted Wireless Networks: A Quantum-Inspired Reinforcement Learning Perspective. IEEE Wirel. Commun. Lett. 2021, 10, 1994–1998. [Google Scholar] [CrossRef]
- Dong, D.; Chen, C.; Chu, J.; Tarn, T.J. Robust Quantum-Inspired Reinforcement Learning for Robot Navigation. IEEE/ASME Trans. Mechatron. 2012, 17, 86–97. [Google Scholar] [CrossRef]
- Wei, Q.; Ma, H.; Chen, C.; Dong, D. Deep Reinforcement Learning with Quantum-Inspired Experience Replay. IEEE Trans. Cybern. 2021, in press. [Google Scholar] [CrossRef]
- Masuyama, N.; Loo, C.K.; Seera, M.; Kubota, N. Quantum-Inspired Multidirectional Associative Memory With a Self-Convergent Iterative Learning. IEEE Trans. Neural Netw. Learn. Syst. 2018, 29, 1058–1068. [Google Scholar] [CrossRef]
- Patel, O.P.; Bharill, N.; Tiwari, A.; Prasad, M. A Novel Quantum-Inspired Fuzzy Based Neural Network for Data Classification. IEEE Trans. Emerg. Top. Comput. 2021, 9, 1031–1044. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zolfaghari, B.; Koshiba, T. The Dichotomy of Neural Networks and Cryptography: War and Peace. Appl. Syst. Innov. 2022, 5, 61. https://doi.org/10.3390/asi5040061
Zolfaghari B, Koshiba T. The Dichotomy of Neural Networks and Cryptography: War and Peace. Applied System Innovation. 2022; 5(4):61. https://doi.org/10.3390/asi5040061
Chicago/Turabian StyleZolfaghari, Behrouz, and Takeshi Koshiba. 2022. "The Dichotomy of Neural Networks and Cryptography: War and Peace" Applied System Innovation 5, no. 4: 61. https://doi.org/10.3390/asi5040061
APA StyleZolfaghari, B., & Koshiba, T. (2022). The Dichotomy of Neural Networks and Cryptography: War and Peace. Applied System Innovation, 5(4), 61. https://doi.org/10.3390/asi5040061