The Dichotomy of Neural Networks and Cryptography: War and Peace

Behrouz Zolfaghari*, Takeshi Koshiba

*Corresponding author for this work

Research output: Contribution to journalReview articlepeer-review

3 Citations (Scopus)

Abstract

In recent years, neural networks and cryptographic schemes have come together in war and peace; a cross-impact that forms a dichotomy deserving a comprehensive review study. Neural networks can be used against cryptosystems; they can play roles in cryptanalysis and attacks against encryption algorithms and encrypted data. This side of the dichotomy can be interpreted as a war declared by neural networks. On the other hand, neural networks and cryptographic algorithms can mutually support each other. Neural networks can help improve the performance and the security of cryptosystems, and encryption techniques can support the confidentiality of neural networks. The latter side of the dichotomy can be referred to as the peace. There are, to the best of our knowledge, no current surveys that take a comprehensive look at the many ways neural networks are currently interacting with cryptography. This survey aims to fill that niche by providing an overview on the state of the cross-impact between neural networks and cryptography systems. To this end, this paper will highlight the current areas where progress is being made as well as the aspects where there is room for future research to be conducted.

Original languageEnglish
Article number61
JournalApplied System Innovation
Volume5
Issue number4
DOIs
Publication statusPublished - 2022 Aug
Externally publishedYes

Keywords

  • cryptanalysis
  • cryptography
  • neural network
  • survey

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Information Systems
  • Human-Computer Interaction
  • Industrial and Manufacturing Engineering
  • Applied Mathematics
  • Artificial Intelligence

Fingerprint

Dive into the research topics of 'The Dichotomy of Neural Networks and Cryptography: War and Peace'. Together they form a unique fingerprint.

Cite this