5 research outputs found
ΠΠ΅ΡΠΎΠ΄ ΡΠΎΠΊΡΡΡΠΈΡ ΠΏΡΠΈΠ²Π°ΡΠ½ΡΡ Π΄Π°Π½Π½ΡΡ Π΄Π»Ρ Π±Π»ΠΎΠΊΡΠ΅ΠΉΠ½-ΡΠΈΡΡΠ΅ΠΌΡ ΠΏΡΠΎΠ²Π΅Π΄Π΅Π½ΠΈΡ ΡΠ΅Π½Π΄Π΅ΡΠΎΠ²
ΠΡΠ΅Π΄Π»ΠΎΠΆΠ΅Π½ Π½ΠΎΠ²ΡΠΉ ΠΌΠ΅ΡΠΎΠ΄, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠΉ ΡΠ΅ΡΠΈΡΡ ΠΏΡΠΎΠ±Π»Π΅ΠΌΡ ΠΏΡΠΈΠ²Π°ΡΠ½ΠΎΡΡΠΈ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΈ Π² ΠΎΡΠΊΡΡΡΡΡ
Π±Π»ΠΎΠΊΡΠ΅ΠΉΠ½-ΡΠΈΡΡΠ΅ΠΌΠ°Ρ
Ρ ΠΈΡΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°Π½ΠΈΠ΅ΠΌ ΠΊΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΠΈΡΠ΅ΡΠΊΠΎΠ³ΠΎ ΠΏΡΠΎΡΠΎΠΊΠΎΠ»Π° Π΄ΠΎΠΊΠ°Π·Π°ΡΠ΅Π»ΡΡΡΠ²Π° Ρ Π½ΡΠ»Π΅Π²ΡΠΌ ΡΠ°Π·Π³Π»Π°ΡΠ΅Π½ΠΈΠ΅ΠΌ zk-SNARK. ΠΠ΅ΡΠΎΠ΄ ΡΠ΅Π°Π»ΠΈΠ·ΠΎΠ²Π°Π½ Π² Π²ΠΈΠ΄Π΅ ΠΊΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΠΈΡΠ΅ΡΠΊΠΎΠΉ ΡΡ
Π΅ΠΌΡ Π½Π° ΠΎΡΠ½ΠΎΠ²Π΅ Π±ΠΈΠ±Π»ΠΈΠΎΡΠ΅ΠΊΠΈ libsnark ΠΈ ΠΈΠ½ΡΠ΅Π³ΡΠΈΡΠΎΠ²Π°Π½ Π² ΠΌΠΎΠ΄ΠΈΡΠΈΡΠΈΡΠΎΠ²Π°Π½Π½ΡΠΉ Ethereum Π‘++ ΠΊΠ»ΠΈΠ΅Π½Ρ
ΠΠ΅ΠΉΡΠΎΡΠ΅ΡΠ΅Π²Π°Ρ ΠΎΠ±ΡΡΡΠΊΠ°ΡΠΈΡ Π²ΡΡΠΈΡΠ»Π΅Π½ΠΈΠΉ Π½Π°Π΄ Π·Π°ΡΠΈΡΡΠΎΠ²Π°Π½Π½ΡΠΌΠΈ Π΄Π°Π½Π½ΡΠΌΠΈ
ΠΡΠ΅Π΄Π»ΠΎΠΆΠ΅Π½ ΠΏΠΎΠ΄Ρ
ΠΎΠ΄ ΠΏΠΎ Π½Π΅ΠΉΡΠΎΡΠ΅ΡΠ΅Π²ΠΎΠΉ ΠΊΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΠΈΡΠ΅ΡΠΊΠΎΠΉ ΠΎΠ±ΡΡΡΠΊΠ°ΡΠΈΠΈ Π²ΡΡΠΈΡΠ»Π΅Π½ΠΈΠΉ. ΠΠΏΠΈΡΠ°ΡΡΡ Π½Π° ΡΠ°Π½Π΅Π΅ ΠΏΠΎΠ»ΡΡΠ΅Π½Π½ΡΠ΅ ΡΠ΅Π·ΡΠ»ΡΡΠ°ΡΡ ΠΎ ΡΠ²ΠΎΠΉΡΡΠ²Π΅ ΡΡΡΠΎΠ³ΠΎΠΉ ΠΎΠ±ΡΡΡΠΊΠ°ΡΠΈΠΈ Π½Π΅ΡΠ°Π·Π»ΠΈΡΠΈΠΌΠΎΡΡΠΈ Π΄Π»Ρ Π½Π΅ΠΉΡΠΎΡΠ΅ΡΠ΅Π²ΠΎΠ³ΠΎ Π°ΠΏΠΏΡΠΎΠΊΡΠΈΠΌΠ°ΡΠΎΡΠ°, ΠΌΡ ΠΏΡΠ΅Π΄Π»Π°Π³Π°Π΅ΠΌ ΠΈΡΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°ΡΡ Π½Π΅ΠΉΡΠΎΡΠ΅ΡΠΈ Π΄Π»Ρ Π²ΡΠΏΠΎΠ»Π½Π΅Π½ΠΈΡ Π°ΡΠΈΡΠΌΠ΅ΡΠΈΡΠ΅ΡΠΊΠΈΡ
ΠΈ Π΄ΡΡΠ³ΠΈΡ
ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΉ Π½Π°Π΄ Π·Π°ΡΠΈΡΡΠΎΠ²Π°Π½Π½ΡΠΌΠΈ Π΄Π°Π½Π½ΡΠΌΠΈ, ΡΠ΅Π°Π»ΠΈΠ·ΡΡ ΡΠ°ΠΊΠΈΠΌ ΠΎΠ±ΡΠ°Π·ΠΎΠΌ ΠΈΠ΄Π΅Ρ ΠΏΡΠΈΠΌΠ΅Π½Π΅Π½ΠΈΡ Π³ΠΎΠΌΠΎΠΌΠΎΡΡΠ½ΠΎΠ³ΠΎ ΡΠΈΡΡΠΎΠ²Π°Π½ΠΈΡ Π΄Π»Ρ Π²ΡΠΏΠΎΠ»Π½Π΅Π½ΠΈΡ Π΄ΠΎΠ²Π΅ΡΠ΅Π½Π½ΡΡ
Π²ΡΡΠΈΡΠ»Π΅Π½ΠΈΠΉ Π² Π½Π΅Π΄ΠΎΠ²Π΅ΡΠ΅Π½Π½ΠΎΠΉ ΡΡΠ΅Π΄Π΅. ΠΡΠΎΠ²ΠΎΠ΄ΠΈΡΡΡ ΠΎΡΠ΅Π½ΠΊΠ° ΠΊΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΠΈΡΠ΅ΡΠΊΠΈΡ
ΡΠ²ΠΎΠΉΡΡΠ² ΠΏΡΠ΅Π΄Π»ΠΎΠΆΠ΅Π½Π½ΠΎΠ³ΠΎ ΠΌΠ΅Ρ
Π°Π½ΠΈΠ·ΠΌΠ° ΠΈ ΡΠΎΠΏΠΎΡΡΠ°Π²Π»Π΅Π½ΠΈΠ΅ Ρ ΡΡΠ°Π΄ΠΈΡΠΈΠΎΠ½Π½ΡΠΌΠΈ ΠΏΠΎΠ΄Ρ
ΠΎΠ΄Π°ΠΌΠΈ ΠΊ ΡΠΈΡΡΠΎΠ²Π°Π½ΠΈΡ Π½Π° ΠΎΡΠ½ΠΎΠ²Π΅ ΡΠ΅ΠΊΡΠ΅ΡΠ½ΠΎΠ³ΠΎ ΠΊΠ»ΡΡΠ°. ΠΠ±ΡΡΠΆΠ΄Π°ΡΡΡΡ Π΄ΠΎΡΡΠΎΠΈΠ½ΡΡΠ²Π° ΠΈ Π½Π΅Π΄ΠΎΡΡΠ°ΡΠΊΠΈ Π½Π΅ΠΉΡΠΎΠ½Π½ΡΡ
ΡΠ΅ΡΠ΅ΠΉ ΠΏΡΠΈΠΌΠ΅Π½ΠΈΡΠ΅Π»ΡΠ½ΠΎ ΠΊ Π·Π°Π΄Π°ΡΠ°ΠΌ ΠΎΠ±ΡΡΡΠΊΠ°ΡΠΈΠΈ ΠΈ ΠΎΠ±ΡΠ°Π±ΠΎΡΠΊΠΈ Π·Π°ΡΠΈΡΡΠΎΠ²Π°Π½Π½ΡΡ
Π΄Π°Π½Π½ΡΡ
Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography
Researches in Artificial Intelligence (AI) have achieved many important breakthroughs, especially in recent years. In some cases, AI learns alone from scratch and performs human tasks faster and better than humans. With the recent advances in AI, it is natural to wonder whether Artificial Neural Networks will be used to successfully create or break cryptographic algorithms. Bibliographic review shows the main approach to this problem have been addressed throughout complex Neural Networks, but without understanding or proving the security of the generated model. This paper presents an analysis of the security of cryptographic algorithms generated by a new technique called Adversarial Neural Cryptography (ANC). Using the proposed network, we show limitations and directions to improve the current approach of ANC. Training the proposed Artificial Neural Network with the improved model of ANC, we show that artificially intelligent agents can learn the unbreakable One-Time Pad (OTP) algorithm, without human knowledge, to communicate securely through an insecure communication channel. This paper shows in which conditions an AI agent can learn a secure encryption scheme. However, it also shows that, without a stronger adversary, it is more likely to obtain an insecure one
ΠΠ»Π³ΠΎΡΠΈΡΠΌΡΡΠ½ΠΎ-ΠΏΡΠΎΠ³ΡΠ°ΠΌΠ½ΠΈΠΉ ΠΌΠ΅ΡΠΎΠ΄ ΡΠΈΡΡΡΠ²Π°Π½Π½Ρ Π΄Π°Π½ΠΈΡ Π· Π²ΠΈΠΊΠΎΡΠΈΡΡΠ°Π½Π½ΡΠΌ Π½Π΅ΠΉΡΠΎΠ½Π½ΠΈΡ ΠΌΠ΅ΡΠ΅ΠΆ
ΠΠ°Π½Π° ΠΌΠ°Π³ΡΡΡΠ΅ΡΡΡΠΊΠ° Π΄ΠΈΡΠ΅ΡΡΠ°ΡΡΡ ΠΏΡΠΈΡΠ²ΡΡΠ΅Π½Π° ΡΠΎΠ·ΡΠΎΠ±Π»Π΅Π½Π½Ρ Π°Π»Π³ΠΎΡΠΈΡΠΌΡΡΠ½ΠΎ-ΠΏΡΠΎΠ³ΡΠ°ΠΌΠ½ΠΎΠ³ΠΎ ΠΌΠ΅ΡΠΎΠ΄Ρ ΡΠΈΡΡΡΠ²Π°Π½Π½Ρ Π΄Π°Π½ΠΈΡ
Π· Π²ΠΈΠΊΠΎΡΠΈΡΡΠ°Π½Π½ΡΠΌ Π½Π΅ΠΉΡΠΎΠ½Π½ΠΈΡ
ΠΌΠ΅ΡΠ΅ΠΆ.
Π£ ΡΠΎΠ±ΠΎΡΡ Π·Π΄ΡΠΉΡΠ½Π΅Π½ΠΎ ΠΏΠΎΡΡΠ²Π½ΡΠ»ΡΠ½ΠΈΠΉ Π°Π½Π°Π»ΡΠ· ΠΌΠ΅ΡΠΎΠ΄ΡΠ² Π·Π°Ρ
ΠΈΡΡΡ ΠΏΡΠΈΠ²Π°ΡΠ½ΠΈΡ
Π½Π°Π±ΠΎΡΡΠ² Π΄Π°Π½ΠΈΡ
, ΡΠΊΡ ΠΌΠΎΠΆΡΡΡ Π±ΡΡΠΈ Π²ΠΈΠΊΠΎΡΠΈΡΡΠ°Π½Ρ ΠΏΡΠΈ ΠΏΠΎΠ±ΡΠ΄ΠΎΠ²Ρ ΡΠΈΡΡΠ΅ΠΌ Π°Π½Π°Π»ΡΠ·Ρ Π΄Π°Π½ΠΈΡ
Ρ ΡΡΡΡΠ½ΠΎΠ³ΠΎ ΡΠ½ΡΠ΅Π»Π΅ΠΊΡΡ, Π° ΡΠ°ΠΊΠΎΠΆ ΠΏΡΠΎΠ²Π΅Π΄Π΅Π½ΠΎ Π΄ΠΎΠΊΠ»Π°Π΄Π½ΠΈΠΉ Π°Π½Π°Π»ΡΠ· ΠΌΠΎΠ΄Π΅Π»Ρ ΡΠΈΡΡΡΠ²Π°Π½Π½Ρ, ΡΠΊΠ° Π²ΠΈΠΊΠΎΡΠΈΡΡΠΎΠ²ΡΡ Π³Π΅Π½Π΅ΡΠ°ΡΠΈΠ²Π½Ρ ΠΊΠΎΠ½ΠΊΡΡΡΡΡΡ Π½Π΅ΠΉΡΠΎΠ½Π½Ρ ΠΌΠ΅ΡΠ΅ΠΆΡ: Π΄ΠΎΡΠ»ΡΠ΄ΠΆΠ΅Π½ΠΎ ΡΡ Π°ΡΡ
ΡΡΠ΅ΠΊΡΡΡΡ, ΡΡΠ½ΠΊΡΡΡ Π²ΡΡΠ°Ρ ΡΠ° Π³ΡΠΏΠ΅ΡΠΏΠ°ΡΠ°ΠΌΠ΅ΡΡΠΈ ΠΌΠΎΠ΄Π΅Π»Ρ. ΠΠ°ΠΏΡΠΎΠΏΠΎΠ½ΠΎΠ²Π°Π½ΠΎ ΠΌΠ΅ΡΠΎΠ΄ ΡΠΈΡΡΡΠ²Π°Π½Π½Ρ Π½Π°Π±ΠΎΡΡΠ² Π΄Π°Π½ΠΈΡ
Π· Π²ΠΈΠΊΠΎΡΠΈΡΡΠ°Π½Π½ΡΠΌ Π½Π΅ΠΉΡΠΎΠ½Π½ΠΈΡ
ΠΌΠ΅ΡΠ΅ΠΆ ΡΠ° ΠΌΠΎΠ΄ΠΈΡΡΠΊΠ°ΡΡΡ ΠΌΠΎΠ΄Π΅Π»Ρ ΡΠΈΡΡΡΠ²Π°Π½Π½Ρ. Π ΠΎΠ·ΡΠΎΠ±Π»Π΅Π½ΠΎ ΠΏΡΠΎΠ³ΡΠ°ΠΌΠ½Ρ ΡΠΈΡΡΠ΅ΠΌΡ, ΡΠΊΠ° ΡΠ΅Π°Π»ΡΠ·ΡΡ Π·Π°ΠΏΡΠΎΠΏΠΎΠ½ΠΎΠ²Π°Π½ΠΈΠΉ ΠΌΠ΅ΡΠΎΠ΄ ΡΠΈΡΡΡΠ²Π°Π½Π½Ρ Π΄Π°Π½ΠΈΡ
, Ρ Π΄ΠΎΠ·Π²ΠΎΠ»ΡΡ Π·Π΄ΡΠΉΡΠ½ΡΠ²Π°ΡΠΈ ΠΊΠ»Π°ΡΠΈΡΡΠΊΠ°ΡΡΡ ΡΠΊ ΠΎΡΠΈΠ³ΡΠ½Π°Π»ΡΠ½ΠΈΡ
, ΡΠ°ΠΊ Ρ Π·Π°ΡΠΈΡΡΠΎΠ²Π°Π½ΠΈΡ
Π΄Π°Π½ΠΈΡ
.
Π£ ΡΠΎΠ±ΠΎΡΡ Π±ΡΠ»ΠΎ ΠΎΡΡΠΈΠΌΠ°Π½ΠΎ Π΅ΠΊΡΠΏΠ΅ΡΠΈΠΌΠ΅Π½ΡΠ°Π»ΡΠ½Ρ ΡΠ΅Π·ΡΠ»ΡΡΠ°ΡΠΈ ΡΠΎΠ±ΠΎΡΠΈ Π·Π°ΠΏΡΠΎΠΏΠΎΠ½ΠΎΠ²Π°Π½ΠΎΠ³ΠΎ ΠΌΠ΅ΡΠΎΠ΄Ρ ΠΉ ΠΌΠΎΠ΄ΠΈΡΡΠΊΠΎΠ²Π°Π½ΠΎΡ ΠΌΠΎΠ΄Π΅Π»Ρ ΡΠΈΡΡΡΠ²Π°Π½Π½Ρ Π΄Π°Π½ΠΈΡ
, Π° ΡΠ°ΠΊΠΎΠΆ ΠΊΠ»Π°ΡΠΈΡΡΠΊΠ°ΡΡΡ ΠΎΡΠΈΠ³ΡΠ½Π°Π»ΡΠ½ΠΈΡ
ΡΠ° Π·Π°ΡΠΈΡΡΠΎΠ²Π°Π½ΠΈΡ
Π΄Π°Π½ΠΈΡ
.This master's thesis is devoted to the development of algorithmic-software method of data encryption using neural networks.
The paper compares the methods of protection of private data sets that can be used in the construction of data analysis and artificial intelligence systems, as well as a detailed analysis of the encryption model that uses generative adversarial neural networks: its architecture, loss functions and hyperparameters of the model. A method of encrypting datasets using neural networks and a modification of the encryption model are proposed. A software system is developed that implements the proposed data encryption method and allows the classification of both original and encrypted data.
The experimental results of the proposed method and the modified model of data encryption, as well as the classification of original and encrypted data were obtained