Computer Science ›› 2021, Vol. 48 ›› Issue (5): 328-333.doi: 10.11896/jsjkx.200300177

;

• Information Security • Previous Articles     Next Articles

Authenticable Encrypted Secure Communication Based on Adversarial Network

WU Shao-qian, LI Xi-ming   

  1. College of Mathematics and Informatics,South China Agricultural University,Guangzhou 510000,China
  • Received:2020-03-30 Revised:2020-06-26 Online:2021-05-15 Published:2021-05-09
  • About author:WU Shao-qian,born in 1994,postgra-duate,is a member of China Computer Federation.His main research interests include machine learning and information security.(wu_shaoqian@163.com)
    LI Xi-ming,born in 1974,Ph.D,asso-ciate professor,master supervisor,is a member of China Computer Federation.His main research interests include information security,intelligent image processing and machine learning.
  • Supported by:
    National Natural Science Foundation of China(61872152),Program for Special Support of Top-Notch Young Professionals of Guangdong Province (2015TQ01X79),Provincial Rural Revitalization Strategy Special Project of Guangdong Provincial Department of Agriculture of 2018(54) and Science and Technology Major Project of Guangdong Province of China(2016B010110005).

Abstract: Since GANs(Generative Adversarial Networks) has been put forward,it has been widely used in various fields,and its application in the field of information security is getting more and more deeply.However,using GANs to realize secure communication under public key cryptosystem has not been reported publicly.Therefore,in view of the adversarial nature of both communication sides and their adversary,this paper proposes an adversarial learning mechanism of GANs.In the public key cryptosystems scenarios,the key generator,encryption and decryption of both communication sides,and the decipher process of adversary are regarded as neural networks,then we use the certification confidentiality to strengthen public-private key linkage.Afterwards,by using the adversarial learning mechanism to train both communication sides and their adversary,we realize the authenticable encrypted secure communication (AEC-AN) between both communication sides on the open channel.In the experiment,4 keys with lengths of 16 bit,32 bit,64 bit and 128 bit have been used for training.The experiment result shows that Bob's accuracy rate is between 91%~94%,and Eve's error rate is between 43%~57%,which is close to the probability of Eve's random guess,thus proving that the proposed mechanism of GANs achieves the secure communication between both communication sides under the environment of adversary eavesdropping.

Key words: Adversarial network, Authenticable encrypted, Public key cryptosystem, Secure communication

CLC Number: 

  • TP183
[1]GOODFELLOW I J,POUGET-ABADIE J,MIRA M,et al.Generative Adversarial Networks[C]//Advances in Neural Information Processing Systems 2014.MIT Press Boston,2014:2672-2680.
[2]ABADI M,ANDERSEN D G.Learning to Protect Communications with Adversarial Neural Cryptography[EB/OL].(2016-10-21) [2020-03-20].https://arxiv.org/abs/1610.06918.
[3]COUTINHO M,ALBUQUERQUE R D O,BORGES F,et al.Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography[J].Sensors,2018,18(5):1306.
[4]GOMEZ A N,HUANG S C,ZHANG I,et al.Unsupervised Cipher Cracking Using Discrete GANs[EB/OL].(2018-1-15) [2020-03-20].https://arxiv.org/abs/1801.04883.
[5]ZHU J Y,PARK T,ISOLA P,et al.Unpaired image-to-imagetranslation using cycle-consistent adversarial networks[C]//Proceedings of the 2017 IEEE International Conference on Computer Vision.IEEE New Jersey Piscataway,2017:2242-2251.
[6]CIPHER A D,BRIAN J W.Cryptanalysis of Shift Stream Ge-nerated Stream Cipher Systems-Book Review[J].Cryptologia,1984,8(4):360-363.
[7]SUCHITA D,FABIO D T,MARK S.Vigenère scores for malware detection[J].Computer Virology and Hacking Techniques,2018,14(2):157-165.
[8]HITAJ B,GASTI P,ATENIESE G,et al.PassGAN:A DeepLearning Approach for Password Guessing[C]//Applied Cryptography and Network Security-17th International Conference.Springer Berlin Heidelberg,2019:217-237.
[9]LI X M,WU J R,WU S Q,et al.Study on fuzzy key encryption based on GAN[J].Application Research of Computers,2020,37(6):1779-1781,1793.
[10]LI X M,WU J R,WU S Q,et al.Study on adversarial encryption based on generative adversarial networks[J].Computer Engineering and Applications:2020,56(10):69-74.
[11]ZHENG W C C,CHUAH C W,JANAKA A.Review on Lea-kage Resilient Key Exchange Security Model.[J].IJCNIS,2019,11(1):119.
[12]YANG X B,BOUSSAKTA S.A New Development of Symme-tric Key Cryptosystem[C]//Proceedings of IEEE International Conference on Communications.IEEE New Jersey Piscataway,2008:1546-1550.
[13]DIFFIE W,HELLMAN M E.New directions in cryptography[J].IEEE,1976,22(6):644-654.
[14]WANG C J,XU X L,LI Y,et al.Integrating Ciphertext-Policy Attribute-Based Encryption with Identity-Based Ring Signature to Enhance Security and Privacy in Wireless Body Area Networks[C]//Information Security and Cryptology—10th International Conference.Springer Berlin Heidelberg,2014:424-442.
[15]GULRAJANI I,AHMED F,ARJOVSKY M,et al.ImprovedTraining of Wasserstein GANs[C]//In Advances in Neural Information Processing Systems 30:Annual Conference on Neural Information Processing Systems 2017.MIT Press Boston,2017:5769-5779.
[16]ZOU D M,BALAN R,SINGH M.On Lipschitz Bounds of Ge-neral Convolutional Neural Networks[J].IEEE Transactions on Information Theory,2020,66(3):1738-1759.
[17]RADFORF A,METZ L,CHINTALA S.Unsupervised Repre-sentation Learning with Deep Convolutional Generative Adversarial Networks[EB/OL].(2016-01-07) [2020-03-20].https://arxiv.org/abs/1511.06434 .
[18]YASUTAKA F,KAZUSHI I.ResNet and Batch-normalization Improve Data Separability.[C]//Proceedings of the 11th Asian Conference on Machine Learning.JMLR,2019:94-108.
[19]HENK C A V T,SUSHIL J.Encyclopedia of Cryptography and Security(2nd Edition)[M].Berlin:Springer,2011:675.
[20]GAO J Q,LI B Y,LIAO H K,et al.Research and performance analysis of advanced encryption AES algorithm[J].Network Security Technology & Application,2019(10):28-30.
[1] ZHANG Jia, DONG Shou-bin. Cross-domain Recommendation Based on Review Aspect-level User Preference Transfer [J]. Computer Science, 2022, 49(9): 41-47.
[2] SUN Qi, JI Gen-lin, ZHANG Jie. Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection [J]. Computer Science, 2022, 49(8): 172-177.
[3] DAI Zhao-xia, LI Jin-xin, ZHANG Xiang-dong, XU Xu, MEI Lin, ZHANG Liang. Super-resolution Reconstruction of MRI Based on DNGAN [J]. Computer Science, 2022, 49(7): 113-119.
[4] XU Guo-ning, CHEN Yi-peng, CHEN Yi-ming, CHEN Jin-yin, WEN Hao. Data Debiasing Method Based on Constrained Optimized Generative Adversarial Networks [J]. Computer Science, 2022, 49(6A): 184-190.
[5] YIN Wen-bing, GAO Ge, ZENG Bang, WANG Xiao, CHEN Yi. Speech Enhancement Based on Time-Frequency Domain GAN [J]. Computer Science, 2022, 49(6): 187-192.
[6] XU Hui, KANG Jin-meng, ZHANG Jia-wan. Digital Mural Inpainting Method Based on Feature Perception [J]. Computer Science, 2022, 49(6): 217-223.
[7] GAO Zhi-yu, WANG Tian-jing, WANG Yue, SHEN Hang, BAI Guang-wei. Traffic Prediction Method for 5G Network Based on Generative Adversarial Network [J]. Computer Science, 2022, 49(4): 321-328.
[8] DOU Zhi, WANG Ning, WANG Shi-jie, WANG Zhi-hui, LI Hao-jie. Sketch Colorization Method with Drawing Prior [J]. Computer Science, 2022, 49(4): 195-202.
[9] LI Si-quan, WAN Yong-jing, JIANG Cui-ling. Multiple Fundamental Frequency Estimation Algorithm Based on Generative Adversarial Networks for Image Removal [J]. Computer Science, 2022, 49(3): 179-184.
[10] SHI Da, LU Tian-liang, DU Yan-hui, ZHANG Jian-ling, BAO Yu-xuan. Generation Model of Gender-forged Face Image Based on Improved CycleGAN [J]. Computer Science, 2022, 49(2): 31-39.
[11] LI Jian, GUO Yan-ming, YU Tian-yuan, WU Yu-lun, WANG Xiang-han, LAO Song-yang. Multi-target Category Adversarial Example Generating Algorithm Based on GAN [J]. Computer Science, 2022, 49(2): 83-91.
[12] TAN Xin-yue, HE Xiao-hai, WANG Zheng-yong, LUO Xiao-dong, QING Lin-bo. Text-to-Image Generation Technology Based on Transformer Cross Attention [J]. Computer Science, 2022, 49(2): 107-115.
[13] CHEN Gui-qiang, HE Jun. Study on Super-resolution Reconstruction Algorithm of Remote Sensing Images in Natural Scene [J]. Computer Science, 2022, 49(2): 116-122.
[14] ZHANG Wei-qi, TANG Yi-feng, LI Lin-yan, HU Fu-yuan. Image Stream From Paragraph Method Based on Scene Graph [J]. Computer Science, 2022, 49(1): 233-240.
[15] JIANG Zong-li, FAN Ke, ZHANG Jin-li. Generative Adversarial Network and Meta-path Based Heterogeneous Network Representation Learning [J]. Computer Science, 2022, 49(1): 133-139.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!