5 research outputs found

    ΠœΠ΅Ρ‚ΠΎΠ΄ сокрытия ΠΏΡ€ΠΈΠ²Π°Ρ‚Π½Ρ‹Ρ… Π΄Π°Π½Π½Ρ‹Ρ… для Π±Π»ΠΎΠΊΡ‡Π΅ΠΉΠ½-систСмы провСдСния Ρ‚Π΅Π½Π΄Π΅Ρ€ΠΎΠ²

    Get PDF
    ΠŸΡ€Π΅Π΄Π»ΠΎΠΆΠ΅Π½ Π½ΠΎΠ²Ρ‹ΠΉ ΠΌΠ΅Ρ‚ΠΎΠ΄, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡŽΡ‰ΠΈΠΉ Ρ€Π΅ΡˆΠΈΡ‚ΡŒ ΠΏΡ€ΠΎΠ±Π»Π΅ΠΌΡƒ приватности ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΈ Π² ΠΎΡ‚ΠΊΡ€Ρ‹Ρ‚Ρ‹Ρ… Π±Π»ΠΎΠΊΡ‡Π΅ΠΉΠ½-систСмах с использованиСм криптографичСского ΠΏΡ€ΠΎΡ‚ΠΎΠΊΠΎΠ»Π° Π΄ΠΎΠΊΠ°Π·Π°Ρ‚Π΅Π»ΡŒΡΡ‚Π²Π° с Π½ΡƒΠ»Π΅Π²Ρ‹ΠΌ Ρ€Π°Π·Π³Π»Π°ΡˆΠ΅Π½ΠΈΠ΅ΠΌ zk-SNARK. ΠœΠ΅Ρ‚ΠΎΠ΄ Ρ€Π΅Π°Π»ΠΈΠ·ΠΎΠ²Π°Π½ Π² Π²ΠΈΠ΄Π΅ криптографичСской схСмы Π½Π° основС Π±ΠΈΠ±Π»ΠΈΠΎΡ‚Π΅ΠΊΠΈ libsnark ΠΈ ΠΈΠ½Ρ‚Π΅Π³Ρ€ΠΈΡ€ΠΎΠ²Π°Π½ Π² ΠΌΠΎΠ΄ΠΈΡ„ΠΈΡ†ΠΈΡ€ΠΎΠ²Π°Π½Π½Ρ‹ΠΉ Ethereum Π‘++ ΠΊΠ»ΠΈΠ΅Π½Ρ‚

    НСйросСтСвая обфускация вычислСний Π½Π°Π΄ Π·Π°ΡˆΠΈΡ„Ρ€ΠΎΠ²Π°Π½Π½Ρ‹ΠΌΠΈ Π΄Π°Π½Π½Ρ‹ΠΌΠΈ

    Get PDF
    ΠŸΡ€Π΅Π΄Π»ΠΎΠΆΠ΅Π½ ΠΏΠΎΠ΄Ρ…ΠΎΠ΄ ΠΏΠΎ нСйросСтСвой криптографичСской обфускации вычислСний. ΠžΠΏΠΈΡ€Π°ΡΡΡŒ Π½Π° Ρ€Π°Π½Π΅Π΅ ΠΏΠΎΠ»ΡƒΡ‡Π΅Π½Π½Ρ‹Π΅ Ρ€Π΅Π·ΡƒΠ»ΡŒΡ‚Π°Ρ‚Ρ‹ ΠΎ свойствС строгой обфускации нСразличимости для нСйросСтСвого аппроксиматора, ΠΌΡ‹ ΠΏΡ€Π΅Π΄Π»Π°Π³Π°Π΅ΠΌ ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΠΎΠ²Π°Ρ‚ΡŒ нСйросСти для выполнСния арифмСтичСских ΠΈ Π΄Ρ€ΡƒΠ³ΠΈΡ… ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΉ Π½Π°Π΄ Π·Π°ΡˆΠΈΡ„Ρ€ΠΎΠ²Π°Π½Π½Ρ‹ΠΌΠΈ Π΄Π°Π½Π½Ρ‹ΠΌΠΈ, рСализуя Ρ‚Π°ΠΊΠΈΠΌ ΠΎΠ±Ρ€Π°Π·ΠΎΠΌ идСю примСнСния Π³ΠΎΠΌΠΎΠΌΠΎΡ€Ρ„Π½ΠΎΠ³ΠΎ ΡˆΠΈΡ„Ρ€ΠΎΠ²Π°Π½ΠΈΡ для выполнСния Π΄ΠΎΠ²Π΅Ρ€Π΅Π½Π½Ρ‹Ρ… вычислСний Π² Π½Π΅Π΄ΠΎΠ²Π΅Ρ€Π΅Π½Π½ΠΎΠΉ срСдС. ΠŸΡ€ΠΎΠ²ΠΎΠ΄ΠΈΡ‚ΡΡ ΠΎΡ†Π΅Π½ΠΊΠ° криптографичСских свойств ΠΏΡ€Π΅Π΄Π»ΠΎΠΆΠ΅Π½Π½ΠΎΠ³ΠΎ ΠΌΠ΅Ρ…Π°Π½ΠΈΠ·ΠΌΠ° ΠΈ сопоставлСниС с Ρ‚Ρ€Π°Π΄ΠΈΡ†ΠΈΠΎΠ½Π½Ρ‹ΠΌΠΈ ΠΏΠΎΠ΄Ρ…ΠΎΠ΄Π°ΠΌΠΈ ΠΊ ΡˆΠΈΡ„Ρ€ΠΎΠ²Π°Π½ΠΈΡŽ Π½Π° основС сСкрСтного ΠΊΠ»ΡŽΡ‡Π°. ΠžΠ±ΡΡƒΠΆΠ΄Π°ΡŽΡ‚ΡΡ достоинства ΠΈ нСдостатки Π½Π΅ΠΉΡ€ΠΎΠ½Π½Ρ‹Ρ… сСтСй ΠΏΡ€ΠΈΠΌΠ΅Π½ΠΈΡ‚Π΅Π»ΡŒΠ½ΠΎ ΠΊ Π·Π°Π΄Π°Ρ‡Π°ΠΌ обфускации ΠΈ ΠΎΠ±Ρ€Π°Π±ΠΎΡ‚ΠΊΠΈ Π·Π°ΡˆΠΈΡ„Ρ€ΠΎΠ²Π°Π½Π½Ρ‹Ρ… Π΄Π°Π½Π½Ρ‹Ρ…

    Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography

    Get PDF
    Researches in Artificial Intelligence (AI) have achieved many important breakthroughs, especially in recent years. In some cases, AI learns alone from scratch and performs human tasks faster and better than humans. With the recent advances in AI, it is natural to wonder whether Artificial Neural Networks will be used to successfully create or break cryptographic algorithms. Bibliographic review shows the main approach to this problem have been addressed throughout complex Neural Networks, but without understanding or proving the security of the generated model. This paper presents an analysis of the security of cryptographic algorithms generated by a new technique called Adversarial Neural Cryptography (ANC). Using the proposed network, we show limitations and directions to improve the current approach of ANC. Training the proposed Artificial Neural Network with the improved model of ANC, we show that artificially intelligent agents can learn the unbreakable One-Time Pad (OTP) algorithm, without human knowledge, to communicate securely through an insecure communication channel. This paper shows in which conditions an AI agent can learn a secure encryption scheme. However, it also shows that, without a stronger adversary, it is more likely to obtain an insecure one

    Алгоритмічно-ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌΠ½ΠΈΠΉ ΠΌΠ΅Ρ‚ΠΎΠ΄ ΡˆΠΈΡ„Ρ€ΡƒΠ²Π°Π½Π½Ρ Π΄Π°Π½ΠΈΡ… Π· використанням Π½Π΅ΠΉΡ€ΠΎΠ½Π½ΠΈΡ… ΠΌΠ΅Ρ€Π΅ΠΆ

    Get PDF
    Π”Π°Π½Π° ΠΌΠ°Π³Ρ–ΡΡ‚Π΅Ρ€ΡΡŒΠΊΠ° дисСртація присвячСна Ρ€ΠΎΠ·Ρ€ΠΎΠ±Π»Π΅Π½Π½ΡŽ Π°Π»Π³ΠΎΡ€ΠΈΡ‚ΠΌΡ–Ρ‡Π½ΠΎ-ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌΠ½ΠΎΠ³ΠΎ ΠΌΠ΅Ρ‚ΠΎΠ΄Ρƒ ΡˆΠΈΡ„Ρ€ΡƒΠ²Π°Π½Π½Ρ Π΄Π°Π½ΠΈΡ… Π· використанням Π½Π΅ΠΉΡ€ΠΎΠ½Π½ΠΈΡ… ΠΌΠ΅Ρ€Π΅ΠΆ. Π£ Ρ€ΠΎΠ±ΠΎΡ‚Ρ– здійснСно ΠΏΠΎΡ€Ρ–Π²Π½ΡΠ»ΡŒΠ½ΠΈΠΉ Π°Π½Π°Π»Ρ–Π· ΠΌΠ΅Ρ‚ΠΎΠ΄Ρ–Π² захисту ΠΏΡ€ΠΈΠ²Π°Ρ‚Π½ΠΈΡ… Π½Π°Π±ΠΎΡ€Ρ–Π² Π΄Π°Π½ΠΈΡ…, які ΠΌΠΎΠΆΡƒΡ‚ΡŒ Π±ΡƒΡ‚ΠΈ використані ΠΏΡ€ΠΈ ΠΏΠΎΠ±ΡƒΠ΄ΠΎΠ²Ρ– систСм Π°Π½Π°Π»Ρ–Π·Ρƒ Π΄Π°Π½ΠΈΡ… Ρ– ΡˆΡ‚ΡƒΡ‡Π½ΠΎΠ³ΠΎ Ρ–Π½Ρ‚Π΅Π»Π΅ΠΊΡ‚Ρƒ, Π° Ρ‚Π°ΠΊΠΎΠΆ ΠΏΡ€ΠΎΠ²Π΅Π΄Π΅Π½ΠΎ Π΄ΠΎΠΊΠ»Π°Π΄Π½ΠΈΠΉ Π°Π½Π°Π»Ρ–Π· ΠΌΠΎΠ΄Π΅Π»Ρ– ΡˆΠΈΡ„Ρ€ΡƒΠ²Π°Π½Π½Ρ, яка використовує Π³Π΅Π½Π΅Ρ€Π°Ρ‚ΠΈΠ²Π½Ρ– ΠΊΠΎΠ½ΠΊΡƒΡ€ΡƒΡŽΡ‡Ρ– Π½Π΅ΠΉΡ€ΠΎΠ½Π½Ρ– ΠΌΠ΅Ρ€Π΅ΠΆΡ–: дослідТСно Ρ—Ρ— Π°Ρ€Ρ…Ρ–Ρ‚Π΅ΠΊΡ‚ΡƒΡ€Ρƒ, Ρ„ΡƒΠ½ΠΊΡ†Ρ–Ρ— Π²Ρ‚Ρ€Π°Ρ‚ Ρ‚Π° Π³Ρ–ΠΏΠ΅Ρ€ΠΏΠ°Ρ€Π°ΠΌΠ΅Ρ‚Ρ€ΠΈ ΠΌΠΎΠ΄Π΅Π»Ρ–. Π—Π°ΠΏΡ€ΠΎΠΏΠΎΠ½ΠΎΠ²Π°Π½ΠΎ ΠΌΠ΅Ρ‚ΠΎΠ΄ ΡˆΠΈΡ„Ρ€ΡƒΠ²Π°Π½Π½Ρ Π½Π°Π±ΠΎΡ€Ρ–Π² Π΄Π°Π½ΠΈΡ… Π· використанням Π½Π΅ΠΉΡ€ΠΎΠ½Π½ΠΈΡ… ΠΌΠ΅Ρ€Π΅ΠΆ Ρ‚Π° ΠΌΠΎΠ΄ΠΈΡ„Ρ–ΠΊΠ°Ρ†Ρ–ΡŽ ΠΌΠΎΠ΄Π΅Π»Ρ– ΡˆΠΈΡ„Ρ€ΡƒΠ²Π°Π½Π½Ρ. Π ΠΎΠ·Ρ€ΠΎΠ±Π»Π΅Π½ΠΎ ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌΠ½Ρƒ систСму, яка Ρ€Π΅Π°Π»Ρ–Π·ΡƒΡ” Π·Π°ΠΏΡ€ΠΎΠΏΠΎΠ½ΠΎΠ²Π°Π½ΠΈΠΉ ΠΌΠ΅Ρ‚ΠΎΠ΄ ΡˆΠΈΡ„Ρ€ΡƒΠ²Π°Π½Π½Ρ Π΄Π°Π½ΠΈΡ…, Ρ– дозволяє Π·Π΄Ρ–ΠΉΡΠ½ΡŽΠ²Π°Ρ‚ΠΈ ΠΊΠ»Π°ΡΠΈΡ„Ρ–ΠΊΠ°Ρ†Ρ–ΡŽ як ΠΎΡ€ΠΈΠ³Ρ–Π½Π°Π»ΡŒΠ½ΠΈΡ…, Ρ‚Π°ΠΊ Ρ– Π·Π°ΡˆΠΈΡ„Ρ€ΠΎΠ²Π°Π½ΠΈΡ… Π΄Π°Π½ΠΈΡ…. Π£ Ρ€ΠΎΠ±ΠΎΡ‚Ρ– Π±ΡƒΠ»ΠΎ ΠΎΡ‚Ρ€ΠΈΠΌΠ°Π½ΠΎ Π΅ΠΊΡΠΏΠ΅Ρ€ΠΈΠΌΠ΅Π½Ρ‚Π°Π»ΡŒΠ½Ρ– Ρ€Π΅Π·ΡƒΠ»ΡŒΡ‚Π°Ρ‚ΠΈ Ρ€ΠΎΠ±ΠΎΡ‚ΠΈ Π·Π°ΠΏΡ€ΠΎΠΏΠΎΠ½ΠΎΠ²Π°Π½ΠΎΠ³ΠΎ ΠΌΠ΅Ρ‚ΠΎΠ΄Ρƒ ΠΉ ΠΌΠΎΠ΄ΠΈΡ„Ρ–ΠΊΠΎΠ²Π°Π½ΠΎΡ— ΠΌΠΎΠ΄Π΅Π»Ρ– ΡˆΠΈΡ„Ρ€ΡƒΠ²Π°Π½Π½Ρ Π΄Π°Π½ΠΈΡ…, Π° Ρ‚Π°ΠΊΠΎΠΆ класифікації ΠΎΡ€ΠΈΠ³Ρ–Π½Π°Π»ΡŒΠ½ΠΈΡ… Ρ‚Π° Π·Π°ΡˆΠΈΡ„Ρ€ΠΎΠ²Π°Π½ΠΈΡ… Π΄Π°Π½ΠΈΡ….This master's thesis is devoted to the development of algorithmic-software method of data encryption using neural networks. The paper compares the methods of protection of private data sets that can be used in the construction of data analysis and artificial intelligence systems, as well as a detailed analysis of the encryption model that uses generative adversarial neural networks: its architecture, loss functions and hyperparameters of the model. A method of encrypting datasets using neural networks and a modification of the encryption model are proposed. A software system is developed that implements the proposed data encryption method and allows the classification of both original and encrypted data. The experimental results of the proposed method and the modified model of data encryption, as well as the classification of original and encrypted data were obtained
    corecore