A Review of Artificial Intelligence (AI) Applications in Key Generation for Encryption Algorithms
DOI:
https://doi.org/10.58564/IJSER.4.1.2025.289Keywords:
AI Applications, key generation, encryption algorithms, string, imageAbstract
In the last few years, Artificial Intelligence (AI) has greatly increased. One specific area has seen significant progress: the use of AI in producing key generation algorithms for cryptography. These algorithms are a critical part of the encryption process. By using AI in this way, the cryptographic community hopes to make the process more secure and efficient. This push has led to several research papers and a wide range of different approaches. Here, we survey the scientific literature in this area and discuss the various strategies that have been taken.
References
[1] G. Eneration, “D ESIGN O F A N EFFICIENT N EURAL K EY,” vol. 2, no. 1, pp. 60–69, 2011.
[2] A. J. Kadhim and T. S. Atia, “Strengthening Security and Confidentiality in E-Health Systems through Quantum Encryption of Healthcare,” Al-Iraqia J. Sci. Eng. Res., vol. 2, no. 3, 2023, doi: 10.58564/ijser.2.3.2023.83.
[3] M. H. Abood and S. W. Abdulmajeed, “High Security Image Cryptographic Algorithm Using Chaotic Encryption Algorithm with Hash-LSB Steganography,” Al-Iraqia J. Sci. Eng. Res., vol. 1, no. 2, pp. 65–74, 2023, doi: 10.33193/ijser.2.1.2022.53.
[4] F. Quinga-Socasi, L. Zhinin-Vera, and O. Chang, “A Deep Learning Approach for Symmetric-Key Cryptography System,” Adv. Intell. Syst. Comput., vol. 1288, no. October, pp. 539–552, 2021, doi: 10.1007/978-3-030-63128-4_41.
[5] F. Yu et al., “A 6D Fractional-Order Memristive Hopfield Neural Network and its Application in Image Encryption,” Front. Phys., vol. 10, no. March, pp. 1–14, 2022, doi: 10.3389/fphy.2022.847385.
[6] J. Jin and K. Kim, “3D CUBE Algorithm for the Key Generation Method: Applying Deep Neural Network Learning-Based,” IEEE Access, vol. 8, pp. 33689–33702, 2020, doi: 10.1109/ACCESS.2020.2973695.
[7] J. Jin and S. S. Park, “Key generation and management method using AI generated Rubik’s cube states,” Int. Conf. Inf. Netw., vol. 2023-Janua, no. 2020, pp. 719–724, 2023, doi: 10.1109/ICOIN56518.2023.10048916.
[8] T. Dong and T. Huang, “Neural Cryptography Based on Complex-Valued Neural Network,” IEEE Trans. Neural Networks Learn. Syst., vol. 31, no. 11, pp. 4999–5004, 2020, doi: 10.1109/TNNLS.2019.2955165.
[9] J. Dey, “State-of-the-art session key generation on priority-based adaptive neural machine (PANM) in telemedicine,” Neural Comput. Appl., vol. 35, no. 13, pp. 9517–9533, 2023, doi: 10.1007/s00521-022-08169-2.
[10] J. Dey and A. Bhowmik, “Concurring of Neural Machines for Robust Session Key Generation and Validation in Telecare Health System During COVID-19 Pandemic,” Wirel. Pers. Commun., vol. 130, no. 3, pp. 1885–1904, 2023, doi: 10.1007/s11277-023-10362-y.
[11] S. Jeong, C. Park, D. Hong, C. Seo, and N. Jho, “Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems,” Secur. Commun. Networks, vol. 2021, 2021, doi: 10.1155/2021/6680782.
[12] S. Jhajharia, S. Mishra, and S. Bali, “Public key cryptography using neural networks and genetic algorithms,” 2013 6th Int. Conf. Contemp. Comput. IC3 2013, pp. 137–142, 2013, doi: 10.1109/IC3.2013.6612177.
[13] M. Indrasena Reddy, A. P. Siva Kumar, and K. Subba Reddy, “A secured cryptographic system based on DNA and a hybrid key generation approach,” BioSystems, vol. 197, no. September 2019, p. 104207, 2020, doi: 10.1016/j.biosystems.2020.104207.
[14] H. A. Atee, R. Ahmad, and N. M. Noor, “Extreme Learning Machine Based Sub-key Generation for Cryptography system,” no. January 2015, 2018.
[15] L. Hernández-Álvarez et al., “KeyEncoder: A secure and usable EEG-based cryptographic key generation mechanism,” Pattern Recognit. Lett., vol. 173, no. June, pp. 1–9, 2023, doi: 10.1016/j.patrec.2023.07.008.
[16] Y. Fatma, R. Wardoyo, and H. Mukhtar, “An Approach to Cryptography Based on Neural Network Using Image for Public Key Generation,” AIP Conf. Proc., vol. 2601, 2023, doi: 10.1063/5.0130464.
[17] Y. Ding, F. Tan, Z. Qin, M. Cao, K. K. R. Choo, and Z. Qin, “DeepKeyGen: A Deep Learning-Based Stream Cipher Generator for Medical Image Encryption and Decryption,” IEEE Trans. Neural Networks Learn. Syst., vol. 33, no. 9, pp. 4915–4929, 2022, doi: 10.1109/TNNLS.2021.3062754.
[18] Y. Ding et al., “DeepEDN: A Deep-Learning-Based Image Encryption and Decryption Network for Internet of Medical Things,” IEEE Internet Things J., vol. 8, no. 3, pp. 1504–1518, 2021, doi: 10.1109/JIOT.2020.3012452.
[19] X. Chai, Y. Wang, X. Chen, Z. Gan, and Y. Zhang, “TPE-GAN: Thumbnail Preserving Encryption Based on GAN With Key,” IEEE Signal Process. Lett., vol. 29, pp. 972–976, 2022, doi: 10.1109/LSP.2022.3163685.
[20] K. Panwar, A. Singh, S. Kukreja, K. K. Singh, N. Shakhovska, and A. Boichuk, “Encipher GAN: An End-to-End Color Image Encryption System Using a Deep Generative Model,” Systems, vol. 11, no. 1, pp. 1–15, 2023, doi: 10.3390/systems11010036.
[21] Z. Man et al., “A novel image encryption algorithm based on least squares generative adversarial network random number generator,” Multimed. Tools Appl., vol. 80, no. 18, pp. 27445–27469, 2021, doi: 10.1007/s11042-021-10979-w.
[22] S. Venkatesan, M. Ramakrishnan, and M. Archana, “Unique and Random Key Generation Using Deep Convolutional Neural Network and Genetic Algorithm for Secure Data Communication Over Wireless Network,” Artif. Intell. Sustain. Appl., pp. 249–263, 2023, doi: 10.1002/9781394175253.ch15.
[23] E. A. A. Hagras, S. Aldosary, H. Khaled, and T. M. Hassan, “Authenticated Public Key Elliptic Curve Based on Deep Convolutional Neural Network for Cybersecurity Image Encryption Application,” Sensors, vol. 23, no. 14, 2023, doi: 10.3390/s23146589.
[24] F. Q. Socasi, R. Velastegui, L. Zhinin-Vera, R. Valencia-Ramos, F. Ortega-Zamorano, and O. Chang, “Digital cryptography implementation using neurocomputational model with autoencoder architecture,” ICAART 2020 - Proc. 12th Int. Conf. Agents Artif. Intell., vol. 2, no. Icaart 2020, pp. 865–872, 2020, doi: 10.5220/0009154908650872.
[25] R. Valencia-Ramos, L. Zhinin-Vera, G. E. Pilliza, and O. Chang, “An Asymetric-key Cryptosystem based on Artificial Neural Network,” Int. Conf. Agents Artif. Intell., vol. 3, no. Icaart, pp. 540–547, 2022, doi: 10.5220/0010857700003116.
[26] S. R. Maniyath and T. V, “An efficient image encryption using deep neural network and chaotic map,” Microprocess. Microsyst., vol. 77, p. 103134, 2020, doi: 10.1016/j.micpro.2020.103134.
[27] M. Dridi, M. A. Hajjaji, B. Bouallegue, and A. Mtibaa, “Cryptography of medical images based on a combination between chaotic and neural network”, doi: 10.1049/iet-ipr.2015.0868.
[28] J. Ye, X. Deng, A. Zhang, and H. Yu, “A Novel Image Encryption Algorithm Based on Improved Arnold Transform and Chaotic Pulse-Coupled Neural Network,” Entropy, vol. 24, no. 8, 2022, doi: 10.3390/e24081103.
[29] Y. Sang, J. Sang, and M. S. Alam, “Image encryption based on logistic chaotic systems and deep autoencoder,” Pattern Recognit. Lett., vol. 153, pp. 59–66, 2022, doi: 10.1016/j.patrec.2021.11.025.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Zahraa Atheer Ali, Hasan Falah Hasan

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.