Strengthening Cryptographic Systems with AI-Enhanced Analytical Techniques
DOI:
https://doi.org/10.14419/fh79gr07Keywords:
Cryptography, Artificial Intelligence, Encryption, Security, AI-Enhanced TechniquesAbstract
This study paper uses advanced Artificial Intelligence (AI) analytical tools to enhance cryptographic systems and counter evolving security threats. The proposed approach integrates traditional cryptographic techniques with Machine Learning (ML) to improve key management, encryption algorithms, and overall system security. This methodology is further strengthened by integrating the Cyber-Kill Chain (CKC) and the National Institute of Standards and Technology (NIST ) Cybersecurity Framework. In CKC’s stage model, Reconnaissance, Weaponization, and Exploitation are related to the NIST phases of Identifying, Protecting, Detecting, Responding, and Recovering as a comprehensive cybersecurity plan. Bayesian networks, Markov Decision Processes, and Partial Differential Equations (PDE) are referenced for threat detection, temporal modeling of vulnerabilities, and mathematical correctness, respectively. Introducing such optimizations promoted by AI into the CKC and NIST frameworks helps the proposed system achieve better flexibility, robustness, and extensibility. Additionally, reinforcement learning is explored to dynamically adjust security measures based on real-time threats. Experimental validation supports the efficiency of integrating AI-driven analytics into cryptographic frameworks. In this context, the work suggests a forward-looking plan for cybersecurity in contemporary society, mapping between theory development and applications that produce sound and secure cryptographic systems that neutralize cutting-edge security risks.
References
- P. W. Shor, ”Algorithms for quantum computation: Discrete logarithms and factoring,” in Proceedings of the 35th Annual Symposium on Foundations of
- Computer Science, Santa Fe, NM, USA, 1994, pp. 124–134. [Online]. Available at: https://doi.org/10.1109/SFCS.1994.365700
- M. Mohammad, ”Artificial intelligence for cryptographic security in the post-quantum world,” Journal of Cryptography Research, vol. 45, no. 3, pp.
- –227, 2019. [Online]. Available at: https://doi.org/10.1007/s00145-019-9279-8
- R. Salinas, ”Enhancing encryption with machine learning: A step forward in post-quantum cryptography,” AI and Cybersecurity, vol. 10, no. 1, pp.
- –47, 2020. [Online]. Available at : https://doi.org/10.1145/3338903
- K. Gai, ”Neural networks in cryptographic algorithm optimization,” Neural Computing and Applications, vol. 17, no. 5, pp. 515–522, 2008. [Online].
- Available at: https://doi.org/10.1007/s00542-008-0530-3
- O. Regev, ”Lattice-based cryptography and its applications,” in Proceedings of the 50th Annual IEEE Symposium on Foundations of Computer Science,
- , pp. 1–9. [Online]. Available at : https://doi.org/10.1109/FOCS.2009.38
- D. Cai, ”AI-optimized lattice-based cryptographic protocols,” Journal of Cryptography, vol. 58, no. 1, pp. 49–67, 2021. [Online]. Available at :
- https://doi.org/10.1007/s00145-020-00325-w
- T. Cross et al., ”Qiskit: An open-source quantum computing software development framework,” IBM Journal of Research and Development, vol. 61, no.
- , pp. 1–10, 2017. [Online]. Available at: https://doi.org/10.1147/JRD.2017.2673310
- M. Mosca, ”Cybersecurity in an era with quantum computers: Will we be ready?,” IEEE Security and Privacy, vol. 16, no. 5, pp. 38–41, 2018. [Online].
- Available at: https://doi.org/10.1109/MSP.2018.3761723
- J. Hoffstein, ”Lattice-based cryptography and its role in quantum-safe security,” Advances in Cryptography, vol. 6, no. 4, pp. 135–148, 1998.
- C. Gentry, ”Fully homomorphic encryption using ideal lattices,” in Proceedings of the 41st Annual ACM Symposium on Theory of Computing, Bethesda,
- MD, USA, 2009, pp. 169–178. [Online]. Available at: https://doi.org/10.1145/1536414.1536440
- D. Boneh and R. J. Lipton, ”Quantum cryptanalysis of hidden linear functions,” in Advances in Cryptology-CRYPTO ’95, Proceedings of the
- th Annual International Cryptology Conference, Santa Barbara, CA, USA, Aug. 27–31, 1995, vol. 963, pp. 424–437. [Online]. Available at :
- https://doi.org/10.1007/3-540-44750-4 34
- D. J. Bernstein, J. Buchmann, and E. Dahmen, Eds., Post-Quantum Cryptography. Berlin, : Springer, 2009. [Online]. Available at: https://doi.org/10.
- /978-3-540-88702-7
- M. A. Nielsen and I. L. Chuang, Quantum Computation and Quantum Information. Cambridge, UK: Cambridge University Press, 2000.
- L. Chen, S. Jordan, Y.-K. Liu, D. Moody, R. Peralta, R. Perlner, and D. Smith-Tone, ”Report on post-quantum cryptography,” National Institute of
- Standards and Technology, Gaithersburg, MD, USA, NISTIR 8105, 2016. [Online]. Available at: https://doi.org/10.6028/NIST.IR.8105
- C. Peikert, ”A decade of lattice cryptography,” Foundations and Trends in Theoretical Computer Science, vol. 10, no. 4, pp. 283–424, 2016. [Online].
- Available at: https://doi.org/10.1561/0400000074
- G. Alagic, D. Apon, J. Cooper, Q. Dang, J. Kelsey, C. Miller, R. Peralta, R. Perlner, and D. Smith-Tone, ”Status report on the second round of the NIST
- post-quantum cryptography standardization process,” National Institute of Standards and Technology, Gaithersburg, MD, USA, NISTIR 8309, 2020.
- [Online]. Available at: https://doi.org/10.6028/NIST.IR.8309
- D. Gottesman, ”The Heisenberg representation of quantum computers,” in Proceedings of the 22nd International Colloquium on Group Theoretical
- Methods in Physics, 1998, pp. 32–43. [Online]. Available at: https://doi.org/10.1063/1.532707
- J. Xu, ”Advances in quantum-safe cryptographic algorithms,” IEEE Transactions on Information Theory, vol. 67, no. 5, pp. 3309–3324, 2021.
- T. Zhang and H. Li, ”Post-quantum cryptography: Recent developments and future challenges,” Journal of Cryptographic Engineering, vol. 10, no. 3,
- pp. 185–199, 2020.
- P. Wang, ”Machine learning methods in post-quantum cryptography,” IEEE Access, vol. 7, pp. 24068–24079, 2019.
- M. A. Khan, F. Afghah, and M. A. Abu-Shareha, ”An Improvised Certificate-Based Proxy Signature Using Hyperelliptic Curve Cryptography for
- Secure UAV Communications,” IEEE Transactions on Intelligent Transportation Systems, vol. 26, no. 1, pp. 123–135, Jan. 2025.
- I. Mustafa, A. Akhunzada, and S. Zeadally, ”Post-Quantum Cryptographic Communication Protocol,” U.S. Patent 10,581,604, Mar. 3, 2020. [Online].
- Available at: https://patents.google.com/patent/US20190116035A1/en
- A. Akhunzada, A. S. Al-Shamayleh, S. Zeadally, A. A. Abu-Shareha, and A. Almogren, ”Design and Performance of an AI-Enabled Threat Intelligence
- Framework for IoT-Enabled Autonomous Vehicles,” Computers and Electrical Engineering, vol. 119, p. 109609, Nov. 2024. [Online]. Available at:
- https://doi.org/10.1016/j.compeleceng.2024.109609
Downloads
How to Cite
Received date: March 27, 2025
Accepted date: April 14, 2025
Published date: April 24, 2025