计算机科学 ›› 2021, Vol. 48 ›› Issue (5): 328-333.doi: 10.11896/jsjkx.200300177

所属专题: 密码学 虚拟专题

• 信息安全 • 上一篇    下一篇

对抗网络上的可认证加密安全通信

吴少乾, 李西明   

  1. 华南农业大学数学与信息学院 广州510000
  • 收稿日期:2020-03-30 修回日期:2020-06-26 出版日期:2021-05-15 发布日期:2021-05-09
  • 通讯作者: 李西明(liximing@scau.edu.com)
  • 基金资助:
    国家自然科学基金(61872152);广东省特支计划科技创新青年拔尖人才项目(2015TQ01X79);2018年广东省农业厅省级乡村振兴战略专项项目(粤农计[2018]54号);广东省科技计划重大专项课题(2016B010110005)

Authenticable Encrypted Secure Communication Based on Adversarial Network

WU Shao-qian, LI Xi-ming   

  1. College of Mathematics and Informatics,South China Agricultural University,Guangzhou 510000,China
  • Received:2020-03-30 Revised:2020-06-26 Online:2021-05-15 Published:2021-05-09
  • About author:WU Shao-qian,born in 1994,postgra-duate,is a member of China Computer Federation.His main research interests include machine learning and information security.(wu_shaoqian@163.com)
    LI Xi-ming,born in 1974,Ph.D,asso-ciate professor,master supervisor,is a member of China Computer Federation.His main research interests include information security,intelligent image processing and machine learning.
  • Supported by:
    National Natural Science Foundation of China(61872152),Program for Special Support of Top-Notch Young Professionals of Guangdong Province (2015TQ01X79),Provincial Rural Revitalization Strategy Special Project of Guangdong Provincial Department of Agriculture of 2018(54) and Science and Technology Major Project of Guangdong Province of China(2016B010110005).

摘要: 生成对抗网络(Generative Adversarial Networks,GANs)自提出以来被广泛应用于各个领域。虽然在信息安全领域中对其的应用研究日益深入,但利用GANs实现公钥密码体制下的安全通信问题还未见公开报道。鉴于通信双方和敌手的对抗性质,文中利用GANs的对抗学习机制,在公钥密码体制场景下,将密钥生成器、通信双方的加解密和敌手的破译过程均作为神经网络,利用认证保密性来增强公私钥的联系,再利用对抗学习机制训练通信双方和敌手,以此实现通信双方在公开信道上的可认证加密安全通信(Authenticable Encrypted secure Communication based on Adversarial Network,AEC-AN)。实验采用了16 bit,32 bit,64 bit和128 bit长度的4种密钥进行训练,结果表明,Bob的正确率在91%~94%之间,Eve的错误率在43%~57%之间,该值接近Eve随机猜测的概率,从而证明了所提方法能够实现通信双方在敌手窃听环境下的安全通信。

关键词: 安全通信, 对抗网络, 公钥密码体制, 可认证加密

Abstract: Since GANs(Generative Adversarial Networks) has been put forward,it has been widely used in various fields,and its application in the field of information security is getting more and more deeply.However,using GANs to realize secure communication under public key cryptosystem has not been reported publicly.Therefore,in view of the adversarial nature of both communication sides and their adversary,this paper proposes an adversarial learning mechanism of GANs.In the public key cryptosystems scenarios,the key generator,encryption and decryption of both communication sides,and the decipher process of adversary are regarded as neural networks,then we use the certification confidentiality to strengthen public-private key linkage.Afterwards,by using the adversarial learning mechanism to train both communication sides and their adversary,we realize the authenticable encrypted secure communication (AEC-AN) between both communication sides on the open channel.In the experiment,4 keys with lengths of 16 bit,32 bit,64 bit and 128 bit have been used for training.The experiment result shows that Bob's accuracy rate is between 91%~94%,and Eve's error rate is between 43%~57%,which is close to the probability of Eve's random guess,thus proving that the proposed mechanism of GANs achieves the secure communication between both communication sides under the environment of adversary eavesdropping.

Key words: Adversarial network, Authenticable encrypted, Public key cryptosystem, Secure communication

中图分类号: 

  • TP183
[1]GOODFELLOW I J,POUGET-ABADIE J,MIRA M,et al.Generative Adversarial Networks[C]//Advances in Neural Information Processing Systems 2014.MIT Press Boston,2014:2672-2680.
[2]ABADI M,ANDERSEN D G.Learning to Protect Communications with Adversarial Neural Cryptography[EB/OL].(2016-10-21) [2020-03-20].https://arxiv.org/abs/1610.06918.
[3]COUTINHO M,ALBUQUERQUE R D O,BORGES F,et al.Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography[J].Sensors,2018,18(5):1306.
[4]GOMEZ A N,HUANG S C,ZHANG I,et al.Unsupervised Cipher Cracking Using Discrete GANs[EB/OL].(2018-1-15) [2020-03-20].https://arxiv.org/abs/1801.04883.
[5]ZHU J Y,PARK T,ISOLA P,et al.Unpaired image-to-imagetranslation using cycle-consistent adversarial networks[C]//Proceedings of the 2017 IEEE International Conference on Computer Vision.IEEE New Jersey Piscataway,2017:2242-2251.
[6]CIPHER A D,BRIAN J W.Cryptanalysis of Shift Stream Ge-nerated Stream Cipher Systems-Book Review[J].Cryptologia,1984,8(4):360-363.
[7]SUCHITA D,FABIO D T,MARK S.Vigenère scores for malware detection[J].Computer Virology and Hacking Techniques,2018,14(2):157-165.
[8]HITAJ B,GASTI P,ATENIESE G,et al.PassGAN:A DeepLearning Approach for Password Guessing[C]//Applied Cryptography and Network Security-17th International Conference.Springer Berlin Heidelberg,2019:217-237.
[9]LI X M,WU J R,WU S Q,et al.Study on fuzzy key encryption based on GAN[J].Application Research of Computers,2020,37(6):1779-1781,1793.
[10]LI X M,WU J R,WU S Q,et al.Study on adversarial encryption based on generative adversarial networks[J].Computer Engineering and Applications:2020,56(10):69-74.
[11]ZHENG W C C,CHUAH C W,JANAKA A.Review on Lea-kage Resilient Key Exchange Security Model.[J].IJCNIS,2019,11(1):119.
[12]YANG X B,BOUSSAKTA S.A New Development of Symme-tric Key Cryptosystem[C]//Proceedings of IEEE International Conference on Communications.IEEE New Jersey Piscataway,2008:1546-1550.
[13]DIFFIE W,HELLMAN M E.New directions in cryptography[J].IEEE,1976,22(6):644-654.
[14]WANG C J,XU X L,LI Y,et al.Integrating Ciphertext-Policy Attribute-Based Encryption with Identity-Based Ring Signature to Enhance Security and Privacy in Wireless Body Area Networks[C]//Information Security and Cryptology—10th International Conference.Springer Berlin Heidelberg,2014:424-442.
[15]GULRAJANI I,AHMED F,ARJOVSKY M,et al.ImprovedTraining of Wasserstein GANs[C]//In Advances in Neural Information Processing Systems 30:Annual Conference on Neural Information Processing Systems 2017.MIT Press Boston,2017:5769-5779.
[16]ZOU D M,BALAN R,SINGH M.On Lipschitz Bounds of Ge-neral Convolutional Neural Networks[J].IEEE Transactions on Information Theory,2020,66(3):1738-1759.
[17]RADFORF A,METZ L,CHINTALA S.Unsupervised Repre-sentation Learning with Deep Convolutional Generative Adversarial Networks[EB/OL].(2016-01-07) [2020-03-20].https://arxiv.org/abs/1511.06434 .
[18]YASUTAKA F,KAZUSHI I.ResNet and Batch-normalization Improve Data Separability.[C]//Proceedings of the 11th Asian Conference on Machine Learning.JMLR,2019:94-108.
[19]HENK C A V T,SUSHIL J.Encyclopedia of Cryptography and Security(2nd Edition)[M].Berlin:Springer,2011:675.
[20]GAO J Q,LI B Y,LIAO H K,et al.Research and performance analysis of advanced encryption AES algorithm[J].Network Security Technology & Application,2019(10):28-30.
[1] 张佳, 董守斌.
基于评论方面级用户偏好迁移的跨领域推荐算法
Cross-domain Recommendation Based on Review Aspect-level User Preference Transfer
计算机科学, 2022, 49(9): 41-47. https://doi.org/10.11896/jsjkx.220200131
[2] 孙奇, 吉根林, 张杰.
基于非局部注意力生成对抗网络的视频异常事件检测方法
Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection
计算机科学, 2022, 49(8): 172-177. https://doi.org/10.11896/jsjkx.210600061
[3] 戴朝霞, 李锦欣, 张向东, 徐旭, 梅林, 张亮.
基于DNGAN的磁共振图像超分辨率重建算法
Super-resolution Reconstruction of MRI Based on DNGAN
计算机科学, 2022, 49(7): 113-119. https://doi.org/10.11896/jsjkx.210600105
[4] 徐国宁, 陈奕芃, 陈一鸣, 陈晋音, 温浩.
基于约束优化生成式对抗网络的数据去偏方法
Data Debiasing Method Based on Constrained Optimized Generative Adversarial Networks
计算机科学, 2022, 49(6A): 184-190. https://doi.org/10.11896/jsjkx.210400234
[5] 尹文兵, 高戈, 曾邦, 王霄, 陈怡.
基于时频域生成对抗网络的语音增强算法
Speech Enhancement Based on Time-Frequency Domain GAN
计算机科学, 2022, 49(6): 187-192. https://doi.org/10.11896/jsjkx.210500114
[6] 徐辉, 康金梦, 张加万.
基于特征感知的数字壁画复原方法
Digital Mural Inpainting Method Based on Feature Perception
计算机科学, 2022, 49(6): 217-223. https://doi.org/10.11896/jsjkx.210500105
[7] 高志宇, 王天荆, 汪悦, 沈航, 白光伟.
基于生成对抗网络的5G网络流量预测方法
Traffic Prediction Method for 5G Network Based on Generative Adversarial Network
计算机科学, 2022, 49(4): 321-328. https://doi.org/10.11896/jsjkx.210300240
[8] 黎思泉, 万永菁, 蒋翠玲.
基于生成对抗网络去影像的多基频估计算法
Multiple Fundamental Frequency Estimation Algorithm Based on Generative Adversarial Networks for Image Removal
计算机科学, 2022, 49(3): 179-184. https://doi.org/10.11896/jsjkx.201200081
[9] 石达, 芦天亮, 杜彦辉, 张建岭, 暴雨轩.
基于改进CycleGAN的人脸性别伪造图像生成模型
Generation Model of Gender-forged Face Image Based on Improved CycleGAN
计算机科学, 2022, 49(2): 31-39. https://doi.org/10.11896/jsjkx.210600012
[10] 唐雨潇, 王斌君.
基于深度生成模型的人脸编辑研究进展
Research Progress of Face Editing Based on Deep Generative Model
计算机科学, 2022, 49(2): 51-61. https://doi.org/10.11896/jsjkx.210400108
[11] 李建, 郭延明, 于天元, 武与伦, 王翔汉, 老松杨.
基于生成对抗网络的多目标类别对抗样本生成算法
Multi-target Category Adversarial Example Generating Algorithm Based on GAN
计算机科学, 2022, 49(2): 83-91. https://doi.org/10.11896/jsjkx.210800130
[12] 谈馨悦, 何小海, 王正勇, 罗晓东, 卿粼波.
基于Transformer交叉注意力的文本生成图像技术
Text-to-Image Generation Technology Based on Transformer Cross Attention
计算机科学, 2022, 49(2): 107-115. https://doi.org/10.11896/jsjkx.210600085
[13] 陈贵强, 何军.
自然场景下遥感图像超分辨率重建算法研究
Study on Super-resolution Reconstruction Algorithm of Remote Sensing Images in Natural Scene
计算机科学, 2022, 49(2): 116-122. https://doi.org/10.11896/jsjkx.210700095
[14] 蒋宗礼, 樊珂, 张津丽.
基于生成对抗网络和元路径的异质网络表示学习
Generative Adversarial Network and Meta-path Based Heterogeneous Network Representation Learning
计算机科学, 2022, 49(1): 133-139. https://doi.org/10.11896/jsjkx.201000179
[15] 张玮琪, 汤轶丰, 李林燕, 胡伏原.
基于场景图的段落生成序列图像方法
Image Stream From Paragraph Method Based on Scene Graph
计算机科学, 2022, 49(1): 233-240. https://doi.org/10.11896/jsjkx.201100207
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!