{"title":"利用生成式对抗网络增强密码密钥生成能力","authors":"Purushottam Singh, Prashant Pranav, Shamama Anwar, Sandip Dutta","doi":"10.1002/cpe.8226","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>In this research, we present an innovative cryptographic key generation method utilizing a Generative Adversarial Network (GAN), enhanced by Merkel tree verification, marking a significant advancement in cryptographic security. Our approach successfully generates a large 6272-bit key, rigorously tested for randomness and reliability using the Dieharder and NIST test suites. This groundbreaking method harmoniously blends cutting-edge machine learning techniques with traditional cryptographic verification, setting a new standard in data encryption and security. Our findings not only demonstrate the efficacy of GANs in producing highly secure cryptographic keys but also highlight the effectiveness of Merkel tree verification in ensuring the integrity of these keys. The integration of merkel tree in our method provides a means to efficiently verify the authenticity of the large generated key sets. This research has broad implications for the future of secure communications, providing a robust solution in a world increasingly reliant on digital security. The integration of machine learning and cryptographic principles opens up new avenues for research and development, promising to bolster security measures in an era where digital threats are constantly evolving. This work contributes significantly to the field of cryptography, offering a novel perspective and robust solutions to the challenges of digital data protection.</p>\n </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 22","pages":""},"PeriodicalIF":1.5000,"publicationDate":"2024-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Leveraging generative adversarial networks for enhanced cryptographic key generation\",\"authors\":\"Purushottam Singh, Prashant Pranav, Shamama Anwar, Sandip Dutta\",\"doi\":\"10.1002/cpe.8226\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div>\\n \\n <p>In this research, we present an innovative cryptographic key generation method utilizing a Generative Adversarial Network (GAN), enhanced by Merkel tree verification, marking a significant advancement in cryptographic security. Our approach successfully generates a large 6272-bit key, rigorously tested for randomness and reliability using the Dieharder and NIST test suites. This groundbreaking method harmoniously blends cutting-edge machine learning techniques with traditional cryptographic verification, setting a new standard in data encryption and security. Our findings not only demonstrate the efficacy of GANs in producing highly secure cryptographic keys but also highlight the effectiveness of Merkel tree verification in ensuring the integrity of these keys. The integration of merkel tree in our method provides a means to efficiently verify the authenticity of the large generated key sets. This research has broad implications for the future of secure communications, providing a robust solution in a world increasingly reliant on digital security. The integration of machine learning and cryptographic principles opens up new avenues for research and development, promising to bolster security measures in an era where digital threats are constantly evolving. This work contributes significantly to the field of cryptography, offering a novel perspective and robust solutions to the challenges of digital data protection.</p>\\n </div>\",\"PeriodicalId\":55214,\"journal\":{\"name\":\"Concurrency and Computation-Practice & Experience\",\"volume\":\"36 22\",\"pages\":\"\"},\"PeriodicalIF\":1.5000,\"publicationDate\":\"2024-07-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Concurrency and Computation-Practice & Experience\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1002/cpe.8226\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, SOFTWARE ENGINEERING\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Concurrency and Computation-Practice & Experience","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/cpe.8226","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, SOFTWARE ENGINEERING","Score":null,"Total":0}
Leveraging generative adversarial networks for enhanced cryptographic key generation
In this research, we present an innovative cryptographic key generation method utilizing a Generative Adversarial Network (GAN), enhanced by Merkel tree verification, marking a significant advancement in cryptographic security. Our approach successfully generates a large 6272-bit key, rigorously tested for randomness and reliability using the Dieharder and NIST test suites. This groundbreaking method harmoniously blends cutting-edge machine learning techniques with traditional cryptographic verification, setting a new standard in data encryption and security. Our findings not only demonstrate the efficacy of GANs in producing highly secure cryptographic keys but also highlight the effectiveness of Merkel tree verification in ensuring the integrity of these keys. The integration of merkel tree in our method provides a means to efficiently verify the authenticity of the large generated key sets. This research has broad implications for the future of secure communications, providing a robust solution in a world increasingly reliant on digital security. The integration of machine learning and cryptographic principles opens up new avenues for research and development, promising to bolster security measures in an era where digital threats are constantly evolving. This work contributes significantly to the field of cryptography, offering a novel perspective and robust solutions to the challenges of digital data protection.
期刊介绍:
Concurrency and Computation: Practice and Experience (CCPE) publishes high-quality, original research papers, and authoritative research review papers, in the overlapping fields of:
Parallel and distributed computing;
High-performance computing;
Computational and data science;
Artificial intelligence and machine learning;
Big data applications, algorithms, and systems;
Network science;
Ontologies and semantics;
Security and privacy;
Cloud/edge/fog computing;
Green computing; and
Quantum computing.