Crypto and AI: From Coevolution to Quantum Revolution [1st ed. 2023]
3031448065, 9783031448065
This book studies the intersection between cryptography and AI, highlighting the significant cross-impact and potential
146
104
16MB
English
Pages 242
Year 2023
Report DMCA / Copyright
DOWNLOAD EPUB FILE
Table of contents :
Book Description
Contents
Part I Preliminary Discussions
1 The Cross-Impact Between Cryptography and Artificial Intelligence: A Highlight
1.1 Introduction
1.2 AI Almost Everywhere in the Ecosystem of Crypto
1.2.1 A Minimal Ecosystem for Cryptography
1.2.2 The Omnipresence of AI in the Ecosystem of Crypto
1.3 The Omnipresence of Crypto in the Ecosystem of AI
1.3.1 A Minimal Ecosystem for AI
1.3.2 How Crypto Shows Itself in the Ecosystem of AI
1.4 Book Organization
Part II Past: War and Peace
2 The Dichotomy of Crypto and NN: War and Peace
2.1 Introduction
2.1.1 Goals and Objectives
2.1.2 Novel Aspects of the Chapter
2.1.3 Chapter Organization
2.2 Background and Motivations
2.2.1 Existing Surveys
2.2.2 Summary
2.2.3 Motivations
2.3 War: Neural Computing against Cryptography
2.3.1 Detecting Malicious Encryption
2.3.1.1 Encryption Detection in Software Code
2.3.1.2 Encryption Detection in Network Traffic
2.3.2 Cryptanalysis
2.3.3 Vulnerability Analysis
2.3.4 Attack
2.4 Peace: Coexistence and Alliance
2.4.1 Coexistence
2.4.1.1 NNs Adapted to Encrypted Data
2.4.1.2 Cryptographic Technology Adapted to Neural Computing
2.4.2 Alliance
2.4.2.1 The Role of NNs in Cryptography
2.4.2.2 The Role of Cryptography in Secure Neural Computing
2.5 Look Ahead: The Promise of Quantum Computing
2.5.1 Quantum-Inspired Neural Networks
2.5.2 Quantum NNs in Cryptography
2.5.3 NNs in Quantum Cryptography
2.5.4 Summary
Part III Present: Coevolution
3 AI Makes Crypto Evolve
3.1 Introduction
3.1.1 Goals and Objectives
3.1.2 Novel Aspects of the Chapter
3.1.3 Chapter Organization
3.2 Background and Motivations
3.2.1 Surveys on AI in Security
3.2.2 Surveys on AI in Cryptography (AIIC)
3.2.3 Summary
3.2.4 Motivations
3.3 AIUC
3.3.1 Encryption Detection
3.3.2 Attack and Cryptanalysis
3.3.3 AI-Unaware PUF
3.3.3.1 ML Attacks
3.3.3.2 DL Attacks
3.3.3.3 Hybrid Attacks
3.4 AIRC
3.4.1 ML-Resilient PUFs
3.5 AIBC
3.5.1 Improved Design Objectives
3.5.1.1 Performance
3.5.1.2 Reliability
3.5.1.3 Signal Quality and Noise Resistance
3.5.2 Security-Related Scenarios
3.5.2.1 Authentication
3.5.2.2 Privacy
3.5.2.3 Trust
3.5.2.4 Information Hiding
3.5.2.5 Visual Cryptography
3.6 AIAC
3.6.1 AI-Assisted Key Management
3.6.2 Neural Hashing
3.6.3 AI-Assisted Random Number Generation
3.6.3.1 Design
3.6.4 Attack, Test, and Cryptanalysis
3.6.4.1 Test and Analysis
3.6.4.2 Cryptanalysis
3.6.4.3 Attack
3.6.5 AI-Assisted Cryptographic Arithmetic Module
3.6.6 AI-Assisted Substitution Boxes
3.6.7 AI-Assisted PUF
3.7 AIEC
3.7.1 Neural Cryptography
3.7.1.1 Cryptography and Different Types of NNs
3.7.1.2 Chaotic Neural Cryptography
3.7.1.3 The Synchronization Challenge
3.7.1.4 Variants of Neural Cryptography
3.7.1.5 Security of Neural Cryptography
3.7.1.6 Other Design Objectives
3.7.2 Homomorphic Neural Cryptography
3.8 Look Ahead: The Promise of Quantum Computing
3.8.1 Quantum-Inspired AI
3.8.1.1 Quantum-Inspired Neural Networks
3.8.1.2 Quantum-Inspired Machine Learning
3.8.1.3 Quantum-Inspired Reinforcement Learning
3.8.2 (Quantum-AI)-Supported Cryptography
3.8.3 Summary
4 Crypto Makes AI Evolve
4.1 Introduction
4.1.1 Goals and Objectives
4.1.2 Novel Aspects of the Chapter
4.1.3 Chapter Organization
4.2 Background and Motivations
4.2.1 Surveys on Secure AI
4.2.2 Surveys on the Role of Cryptography
4.2.3 Motivations
4.3 The Evolution Path and Stages
4.3.1 CSAI
4.3.2 CAAI
4.3.3 CFAI
4.3.4 CEAI
4.3.5 CPAI
4.3.5.1 Crypto Moving Toward AI
4.3.5.2 AI Moving Toward Crypto
4.4 Look Ahead: The Promise of Quantum Computing
4.4.1 Quantum-Inspired Cryptography
4.4.2 Quantum-Inspired AI
4.4.3 Summary
Part IV Future (From a Dichotomy to a Trichotomy- Quantum Computing: The Third Vertex of the Triangle)
5 Chaotic Image Encryption: State-of-the-Art, Ecosystem, and the Promise of Quantum-Inspired AI
5.1 Introduction
5.1.1 Goals and Objectives
5.1.2 Novel Aspects of the Chapter
5.1.3 Chapter Organization
5.2 Background and Motivations
5.2.1 Surveys on Image Encryption
5.2.2 Surveys on Chaotic Image Encryption
5.2.3 Surveys on AI-Assisted Image Processing
5.2.4 Surveys on AI-Assisted Image Encryption
5.3 State-of-the-Art
5.3.1 State-of-the-Art in Chaos Aspect
5.3.1.1 Chaos Domains
5.3.1.2 Chaos Sources
5.3.1.3 Chaos Dimension
5.3.2 State-of-the-Art in the Image Aspect
5.3.2.1 Two-Dimensional Versus Three-Dimensional Image
5.3.2.2 Gray-Scale Versus Color Image
5.3.2.3 Transforms
5.3.3 State-of-the-Art in the Encryption Aspect
5.3.3.1 Symmetric Versus Asymmetric Cryptography
5.3.3.2 Block Cipher vs. Stream Cipher
5.3.3.3 Primitives
5.4 Ecosystem
5.4.1 Challenges
5.4.1.1 Encrypted Image Processing
5.4.1.2 Attack Protection
5.4.1.3 Evaluation
5.4.2 Application Areas
5.4.2.1 IoT
5.4.2.2 Medical Systems
5.4.2.3 Satellite Systems
5.4.3 Enabling Technologies
5.4.3.1 DNA Computing
5.4.3.2 Quantum Computing
5.4.3.3 Signal Processing
5.4.3.4 Hardware Technology
5.4.3.5 Parallel Processing
5.4.3.6 Fuzzy Systems
5.5 Look Ahead: The Promise of Quantum-Inspired AI
5.5.1 Neural Networks in Chaos: Chaotic Neural Networks and Their Applications
5.5.2 Neural Networks in Image Processing
5.5.3 Neural Networks in Encryption: Neural Cryptography
5.5.4 Neural Networks in Image Security
5.5.5 Neural Networks in Image Encryption
5.5.5.1 Network Types
5.5.5.2 Encryption
5.5.5.3 Steganography
5.5.5.4 Privacy
5.5.5.5 Synchronization
5.5.6 Neural Networks in Chaotic Encryption
5.5.7 Neural Networks in Chaotic Image Encryption
5.5.8 Neural-Like Image Encryption
5.5.8.1 Combinatorial Optimization Problems
5.5.9 Chaotic Neural Networks in Image Encryption
5.5.10 Quantum-Inspired Image Processing
5.5.11 Quantum-Inspired Cryptography
5.5.12 Quantum-Inspired Chaos
5.5.13 Quantum-Inspired AI
5.5.14 Summary
6 Information-Theoretic Cryptography: Life Cycle, Ecosystem, and the Promise of Quantum-Inspired AI
6.1 Introduction
6.1.1 Goals and Objectives
6.1.2 Novel Aspects of the Chapter
6.1.3 Chapter Organization
6.2 Entropy Measures and Related Concepts
6.2.1 Entropy Measures
6.2.2 Related Concepts
6.3 Background and Motivations
6.4 The Life Cycle of Information-Theoretic Cryptography
6.4.1 Modeling, Design, and Implementation
6.4.1.1 Security Models Related to Entropy
6.4.1.2 Cryptosystem Elements
6.4.1.3 Modification and Use of Existing Cryptosystems
6.4.2 Analysis and Evaluation
6.4.2.1 Entropy as a Security Measure
6.4.2.2 Applications in Security Proof
6.4.2.3 Applications in Adversarial Analysis
6.4.2.4 Analysis of Well-Known Cryptographic Schemes
6.4.2.5 Analysis of Cryptographic Problems and Functions
6.5 The Ecosystem of Information-Theoretic Cryptography
6.5.1 Cryptography-Based Security Controls
6.5.1.1 Obfuscation
6.5.1.2 Message Authentication Codes
6.5.1.3 Cryptography-Based Privacy
6.5.1.4 Steganography and Steganalysis
6.5.1.5 User/Device Authentication
6.5.1.6 Digital Signature
6.5.1.7 Secret Sharing
6.5.2 Applications
6.5.3 Enablers
6.5.3.1 Cryptographic Primitives
6.5.3.2 Cryptographic Hardware
6.5.4 Content Types
6.6 Look Ahead: The Promise of QiAI
6.6.1 Truly Random Number Generation
6.6.2 Information-Theoretic Random Number Generation
6.6.3 Quantum Information Theory
6.6.4 Quantum-Inspired Cryptography
6.6.5 Quantum Random Number Generation
6.6.6 Summary
Part V Discussions
7 Conclusions and Further Works
7.1 Conclusions
7.2 Further Works
Bibliography
Index