Leveraging generative adversarial networks for enhanced cryptographic key generation

被引:1
作者
Singh, Purushottam [1 ]
Pranav, Prashant [1 ]
Anwar, Shamama [1 ]
Dutta, Sandip [1 ]
机构
[1] Birla Inst Technol, Dept Comp Sci & Engn, Ranchi 835215, India
关键词
cryptography; generative adversarial network; key generation; Merkel tree; neural network; security;
D O I
10.1002/cpe.8226
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this research, we present an innovative cryptographic key generation method utilizing a Generative Adversarial Network (GAN), enhanced by Merkel tree verification, marking a significant advancement in cryptographic security. Our approach successfully generates a large 6272-bit key, rigorously tested for randomness and reliability using the Dieharder and NIST test suites. This groundbreaking method harmoniously blends cutting-edge machine learning techniques with traditional cryptographic verification, setting a new standard in data encryption and security. Our findings not only demonstrate the efficacy of GANs in producing highly secure cryptographic keys but also highlight the effectiveness of Merkel tree verification in ensuring the integrity of these keys. The integration of merkel tree in our method provides a means to efficiently verify the authenticity of the large generated key sets. This research has broad implications for the future of secure communications, providing a robust solution in a world increasingly reliant on digital security. The integration of machine learning and cryptographic principles opens up new avenues for research and development, promising to bolster security measures in an era where digital threats are constantly evolving. This work contributes significantly to the field of cryptography, offering a novel perspective and robust solutions to the challenges of digital data protection.
引用
收藏
页数:19
相关论文
共 36 条
  • [1] Abdalrdha ZK., 2019, INT J SCI RES SCI EN, V6, P230, DOI DOI 10.32628/IJSRSET196550
  • [2] Armknecht F., 2015, FAST SOFTWARE ENCRYP
  • [3] Arora Sanjeev, 2018, CONVERGENCE ANAL GRA
  • [4] Deterministic chaos game: A new fractal based pseudo-random number generator and its cryptographic application
    Ayubi, Peyman
    Setayeshi, Saeed
    Rahmani, Amir Masoud
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 52
  • [5] A survey on ECG analysis
    Berkaya, Selcan Kaplan
    Uysal, Alper Kursat
    Gunal, Efnan Sora
    Ergin, Semih
    Gunal, Serkan
    Gulmezoglu, M. Bilginer
    [J]. BIOMEDICAL SIGNAL PROCESSING AND CONTROL, 2018, 43 : 216 - 235
  • [6] Generative Adversarial Networks An overview
    Creswell, Antonia
    White, Tom
    Dumoulin, Vincent
    Arulkumaran, Kai
    Sengupta, Biswa
    Bharath, Anil A.
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2018, 35 (01) : 53 - 65
  • [7] da Silva TF., 2014, IEEE J SEL TOP QUANT, V21, P159
  • [8] Das SB., 2020, SMART COMPUTING PARA, V2
  • [9] Duangphasuk S, 2011, IEEE INT CONF NETWOR, P287, DOI 10.1109/ICON.2011.6168490
  • [10] Ghazi B., 2018, RESOURCEEFFICIENT CO