Applications of Artificial Intelligence to Cryptography

  • Jonathan Blackledge Stokes Professor, Science Foundation Ireland
  • Napo Mosola Research Associate, School of Mathematics, Statistics & Computer Science, University of KwaZulu-Natal, South Africa
Keywords: Artificial Intelligence, Artificial Neural Networks, Evolutionary Computing, Machine Learning.

Abstract

This paper considers some recent advances in the field of Cryptography using Artificial Intelligence (AI) It specifically considers the applications of Machine Learning (ML) and Evolutionary Computing (EC) concepts used to generate ciphers. A short overview is given on Artificial Neural Networks (ANNs) and the principles of Deep Learning (DL) using Deep ANNs.  In this context, the paper considers: (i) the implementation of EC and ANNs to generate unique and unclonable ciphers; (ii) ML strategies for detecting the genuine randomness (or otherwise) of binary streams for applications in Cryptanalysis.  The paper aims to provide an overview on how AI can be applied for encrypting data and undertaking cryptanalysis of such data and other encrypted data classes in order to assess the cryptographic strength of an encryption algorithm. For example, to detect patterns of intercepted data streams that are signatures of encrypted data. An application is presented which includes authentication of high-value documents such as bank notes, using smartphones.  Using an antenna of a smartphone to read (in the near field) an embedded flexible integrate circuit with a non-programmable coprocessor, ultra-strong encrypted information can be used on-line for validation.

References

(1) Copeland, B. J., Artificial intelligence. Encyclopedia Britannica, 2020.
https://www.britannica.com/technology/artificial-intelligence

(2) Turing, A. M., Computing Machinery and Intelligence. Mind, 1950, 49: p. 433-460 [Online] Available from:
https://www.csee.umbc.edu/courses/471/papers/turing.pdf [Accessed 27 April 2020].

(3) Wikibooks, Artificial Neural Networks/Neural Network Basics, 2020.
https://en.wikibooks.org/wiki/Artificial_Neural_Networks/Neural_Network_Basics

(4) Kostadinov, S., Understanding the Back-Propagation Algorithm, Towards Data Science, 2019.
https://towardsdatascience.com/understanding-backpropagation-algorithm-7bb3aa2f95fd

(5) Capterra, Artificial Intelligence Software, 2020.
https://www.capterra.com/artificial-intelligence-software/

(6) AI System Inc., 2020. https://aisystems.ai/

(7) MathWorks, AI with MATLAB, 2020.
https://uk.mathworks.com/campaigns/offers/ai-with-matlab.html

(8) MathWorks, Machine Learning with MATLAB, 2020.
https://uk.mathworks.com/campaigns/offers/machine-learning-with-matlab.html

(9) Joshi, P., Artificial Intelligence with Python: A Comprehensive Guide to Building Intelligent Apps for Python
Beginners and Developers, Packt Publishing Limited, 2017. ISBN: 978-1-78646-439-2.
https://www.amazon.com/Artificial-Intelligence-Python-ComprehensiveIntelligent/dp/178646439X

(10) Turner, M. J., Blackledge, J. M. and Andrews, P., Fractal Geometry in Digital Imaging, Academic Press,
1998. ISBN: 0-12-703970-8, 1998.

(11) Fractal Geometry: Mathematical Methods, Algorithms and Applications (Ed. J. M. Blackledge, A. K. Evans
and M. J. Turner), Woodhead Publishing: Series in Mathematics and Applications, 2002. ISBN: 190427500.

(12) Deep Learning in Digital Pathology, Global Engage, 2020.
http://www.global-engage.com/life-science/deep-learning-in-digital-pathology/

(13) Google Cloud. AI & Machine Learning Products, Advanced Guide to Inception V3 on Cloud TPU,
https://cloud.google.com/tpu/docs/inception-v3-advanced

(14) Zhang, W., Itoh, K., Tanida, J. and Ichioka, Y., Parallel Distributed Processing Model with Local Space-invariant Interconnections and its Optical Architecture, Applied Optics, 1990, 29(32), p. 4790–4797.
https://drive.google.com/file/d/0B65v6Wo67Tk5ODRzZmhSR29VeDg/view

(15) Blackledge, J. M., Digital Image Processing, Woodhead Publishing Series in Electronic and Optical
Materials, 2005, ISBN-13: 978-1898563495. https://arrow.tudublin.ie/engschelebk/3/

(16) MathWorks, Introducing Deep Learning with MATLAB, 2020.
https://uk.mathworks.com/campaigns/offers/deep-learning-with-matlab.html

(17) Maghrebi, H., Portigliatti, T., Prouf, E., Breaking Cryptographic Implementations Using Deep Learning
Techniques, Security, Privacy, and Applied Cryptography Engineering (SPACE), 6th International
Conference, 2016. [Online] Available from: https://eprint.iacr.org/2016/921.pdf

(18) Bezobrazov, S., Blackledge, J. M. and Tobin, P. Cryptography using Artificial Intelligence (with S Bezobrazov, The International Joint Conference on Neural Networks (IJCNN2015), Killarney, Ireland, 12-17 July, 2015.

(19) Asiru, O. F., Blackledge, J. M. and Dlamini, M. T., Application of Artificial Intelligence for Detecting Computing Derived Viruses, 16th European Conference on Cyber Warfare and Security (ECCWS 2017), 2017, University College Dublin, Dublin June 29-30, p. 647-655.

(20) Hoare, O., Enigma: Code Breaking and the Second World War - The True Story through Contemporary
Documents. 2002, Introduced and Selected by Oliver Hoare, UK Public Records.

(21) Vernam, G. S., Cipher Printing Telegraph Systems for Secret Wire and Radio Telegraphic Communications,
Transactions of the American Institute of Electrical Engineers, 1926, 55, p. 109–115.

(22) Blum, L., Blum, M. and Shub, M. A Simple Unpredictable Pseudo-Random Number Generator, SIAM
Journal on Computing, 1986, 15 (2), p. 364–383.

(23) Matthews, R. On the Derivation of a ‘Chaotic’ Encryption Algorithm, Cryptologia, 1984, 8(1), p. 29–41.

(24) Ptitsyn, N. V., Deterministic Chaos in Digital Cryptography, PhD Thesis, De Montfort University, UK and
Moscow State Technical University, Russia, 2002.

(25) Erdos, P., Pemereance, C. and Schmutz, E., Carmichael’s Lamba Function, Acta Arithmetica, 1991, 58(4), p.
363-385.

(26) Kocare, L., Chaos and Cryptography, 2001, http://rfic.ucsd.edu/chaos/ws2001/kocarev.pdf.

(27) Blackledge, J. M., Ptitsyn, N. V. and Chernenky, V. M. Deterministic Chaos in Digital Cryptography,
First IMA Conference on Fractal Geometry: Mathematical Methods, Algorithms and Applications
(Eds. J M Blackledge, A K Evans and M Turner), Horwood Publishing Series in Mathematics and Applications, 2002, p. 189-222.

(28) Blackledge, J. M. Cryptography and Steganography: New Algorithms and Applications, Centre for
Advanced Studies Text-books, Warsaw University of Technology, ISBN: 978-83-61993-05-6, 2012.

(29) Eiben, A. E. and Schoenauer, M. Evolutionary Computing, Information Processing Letters, 2002, 82(1),
p. 1-6.

(30) Ehrenberg, R. (2012). Software Scientist: With a Little Data, Eureqa Generates Fundamental Laws of
Nature. Science News, 2012, 181(1), p. 20-21.

(31) Rechenberg, I. Evolutionsstrategien, Simulationsmethoden in der Medizin und Biologie. Springer, 1978,
302, p. 83-114.

(32) Fogel, L. J. Owens, A. J. and Walsh, M. J. (1996). Artificial Intelligence through Simulated Evolution. Wiley,
1966.

(33) Holland, J. H. Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to
Biology, Control, and Artificial Intelligence. University of Michigan Press, 1975.

(34) Eiben, A. E. and Smith, J. E. Introduction to Evolutionary Computing. Springer, 2003, ISBN 978-3-662-
05094-1

(35) Nutonian, Eureqa: The A.I.-Powered Modeling Engine, 2020. [Online] Available from: www.nutonian.com
[Accessed 29 January 2020].

(36) Schmidt, M. and H Lipson, H. Distilling Free-form Natural Laws from Experimental Data, Science, 2009.
[Online] Available from: https://science.sciencemag.org/content/324/5923/81

(37) Dubcakova, R. Eureqa: Software Review. Genetic Programming and Evolvable Machines, 2011, 12(2),
173-178.

(38) Blackledge, J. M., Bezobrazov, S. Tobin, P. and Zamora, F. Cryptography using Evolutionary Computing,
Proc. IET ISSC2013, Letterkenny, Co Donegal, Ireland, June 20-21, 2013 (Awarded Best Paper Prize for
ISSC2013). https://arrow.tudublin.ie/aaconmuscon/5/

(39) NIST, Cryptographic Algorithm Validation Program (CAVP), 2020, [Online] Available at
https://csrc.nist.gov/Projects/cryptographic-algorithm-validation-program

(40) NIST, CAVP Random Number Generators, 2020, [Online] Available at
https://csrc.nist.gov/Projects/cryptographic-algorithm-validation-program/Random-Number-Generators

(41) Random.org, 2020. [Online] Available from https://www.random.org/

(42) Araneus Information Systems Oy, 2020. [Online] Available from https://www.araneus.fi/

(43) Ntolo, S. Student No. 3175732, Course Work Assignment Report, Information and Communications
Security (COS 792), Department of Computer Science, University of Western Cape, 2018.

(44) Mosola, N. N., Dlamini, M. T., Blackledge, J. M., Eloff, J. H. P. and Venter, H. S. Chaos-based Encryption Keys
and Neural Key-store for Cloud-hosted Data Confidentiality, Southern Africa Telecommunication Networks
and Applications Conference (SATNAC), 2017, September 3-10, p. 168-173.

(45) Wikipedia, List of Random Number Generators, 2020. [Online] Available from
https://en.wikipedia.org/wiki/List_of_random_number_generators


(46) Blackledge, J. M. and Ptitsyn, N. V. On the Applications of Deterministic Chaos for Encrypting Data on the
Cloud, Third International Conference on Evolving Internet, INTERNET 2011, 19-24 June, IARIA, 2011,
Luxembourg, p. 78-87. ISBN: 978-1-61208-008-6, 2011.

(47) Tobin, P., Blackledge, J. M., Bezobrasov, S., Personalised Encryptor Generation for the Cloud using
Evolutionary Computing, International Workshop on Nonlinear Maps and their Applications (NOMA-2015),
Dublin, Ireland, 15-16 June, 2015.

(48) Tobin, P., Blackledge, J. M., McKeever, M., Secrecy and Randomness: Encoding Cloud Data Locally using a
(49) One-Time Pad, International Journal on Advances in Security, IARIA, 2017, 10(3), p. 167-181.


(50) Blackledge, J. M Information Hiding using Stochastic Diffusion for the Covert Transmission of Encrypted
Images, Proc of IET ISSC2010 UCC Cork, 23-24 June, 2010.

(51) Blackledge, J. M. and Al-Rawi, A. R. Steganography using Stochastic Diffusion for the Covert Communication
of Digital Images, IANEG International Journal of Applied Mathematics, 2011, 41(4), p. 270-298.

(52) Blackledge, J. M., Tobin, P. Myeza, J. and Adolfo, C. M. Information Hiding with Data Diffusion Using
Convolutional Encoding for Super-Encryption, Mathematica Aeterna, 2017, 7(4), p. 319 – 356.
https://arrow.tudublin.ie/engscheleart2/127/

(53) Blackledge, J. M., Govere, W. and Sibanda, D. Phase-Only Digital Encryption, IAENG International Journal of Applied Mathematics, 2019, 49(2), p. 212-228. https://arrow.tudublin.ie/engscheleart2/192/

(54) Blackledge, J. M., Tobin, P., Govere, W. and Sibanda D. Phase-only Digital Encryption using a Three-pass
Protocol, ISSC2019, IEEE UK and Ireland Signal Processing Chapter, Maynooth University, 17-18, June 2019.

(55) Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A. and Bengio, Y.
Generative Adversarial Networks, Proceedings of the International Conference on Neural Information
Processing Systems (NIPS), 2014, p. 2672–2680.
https://papers.nips.cc/paper/5423-generative-adversarial-nets.pdf

(56) Szilard, L. On the Decrease of Entropy in a Thermodynamics System by the Intervention of Intelligent Beings,
Zeitschrift fur Physik, 1922, 53, p. 840–856.
http://fab.cba.mit.edu/classes/862.19/notes/computation/Szilard-1929.pdf

(57) Shannon, C. E., A Mathematical Theory of Communication, The Bell System Technical Journal, 1949, 27, p.
379–423, 1948. http://people.math.harvard.edu/~ctm/home/text/others/shannon/entropy/entropy.pdf

(58) A. N. Kolmogorov, A. N., Entropy per Unit Time as a Metric Invariant of Automorphism, Russian Academy
of Sciences, 1959, 124, p. 754-755.

(59) Sinai, Y. G., On the Notion of Entropy of a Dynamical System, Russian Academy of Sciences, 1959, 124,
p. 768-771.

(60) Marsaglia, G., Random Numbers Fall Mainly in the Planes, Proc. Natl. Acad. Sci., 1968, 61(1), p. 25–28.

(61) Gao, Y., Kontoyiannis, I., Bienenstock, E., Estimating the Entropy of Binary Time Series: Methodology, Some
Theory and a Simulation Study, Entropy, 2008, 10, p. 71-99.

(62) Pincus, S., Approximate Entropy as a Measure of System Complexity, Proc. Natn. Acad. Sci., 1991, 88, p. 2297-2301.

(63) Rukhin, A. L., Approximate Entropy for Testing Randomness, J. Appl. Prob., 2000, 37(1), p. 88-100.

(64) Richman, J. S. and Moorman, J. R., Physiological Time-series Analysis using Approximate Entropy and Sample Entropy, American J. of Physiology-Heart and Circulatory Physiology, 2000, 278(6), p. H2039-H2049.

(65) Chen, W., Zhuang, J., Yu W. and Wang, Z., Measuring Complexity using FuzzyEn, ApEn, and SampEn, Med.
Eng. and Phys., 2009, 31(1), p. 61-68.

(66) Carroll, J. M., The Binary Derivative Test: Noise Filter, Crypto Aid and Random Number Seed Selector,
Simulation, 1989, 53, p. 129-135.

(67) Carroll, J. M. and Sun, Y., The Binary Derivative Test for the Appearance of Randomness and its use as a Noise Filter, Technical Report No. 221, Department of Computer Science, University of Western Ontario, 1998.

(68) Bruwer, C. S., Correlation Attacks on Stream Ciphers using Convolutional Codes, Masters Thesis, University of Pretoria, 2005.

(69) Croll, G. J., BiEntropy – The Approximate Entropy of a Finite Binary String, 2013.
https://pdfs.semanticscholar.org/d8d6/bf07050f9dcd026bfafe62c079b4e309dd7a.pdf

(70) Text to Binary translator, Rapid Tables, 2019. [Online] Available from
https://www.rapidtables.com/convert/number/ascii-to-binary.html
(71) Talkin’ things, Enabling Digital Transformation through Physical Products, 2020. http://talkinthings.com/
(72) NFC Flex Stamp Antenna, 2020. file://mac/Home/Downloads/L152.pdf
(73) Gołofit, K. and Wieczorek, P. Z., Chaos-based Physical Unclonable Functions, MDPI Applied Sciences, Special
Issue on ‘Side Channel Attacks’, 2019. https://www.mdpi.com/2076-3417/9/5/991

(74) Wikipedia, Retroreflector, 2020. https://en.wikipedia.org/wiki/Retroreflector
(75) Glowtec, Reflective Powder, 2020. https://glowtec.co.uk/Reflective-powder/
(76) Shor, P.W., Algorithms for Quantum Computation: Discrete Logarithms and Factoring, Proceedings 35th
Annual Symposium on Foundations of Computer Science, 1994, IEEE Comp. Soc. Press, p. 124–134

(77) Open Quantum Safe Project, Software for Prototyping Quantum Resistant Cryptography, 2016.
https://openquantumsafe.org/

(78) Stamp, M., Introduction to Machine Learning with Applications in Information Security,
Chapman & Hall/CRC Machine Learning & Pattern Recognition, 2018. ISBN-13: 978-1138626782

(79) Alan, M. M., Applications of Machine Learning in Cryptography: A Survey, 2019.
https://arxiv.org/pdf/1902.04109.pdf

(80) Advances of DNA Computing in Cryptography (Eds. S. Namasudra and G. Chandra Deka), Chapman and
Hall/CRC, 2018.
Published
2020-06-30
How to Cite
Blackledge, J., & Mosola, N. (2020). Applications of Artificial Intelligence to Cryptography. Transactions on Machine Learning and Artificial Intelligence, 8(3), 21-60. https://doi.org/10.14738/tmlai.83.8219