Please use this identifier to cite or link to this item:
https://hdl.handle.net/10356/165952
Title: | Learn cryptography encryption and decryption by building convolutional neural networks (CNNs) | Authors: | Cai, Yu | Keywords: | Engineering::Computer science and engineering | Issue Date: | 2023 | Publisher: | Nanyang Technological University | Source: | Cai, Y. (2023). Learn cryptography encryption and decryption by building convolutional neural networks (CNNs). Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/165952 | Project: | PSCSE21-0031 | Abstract: | In this fast-paced world, digitalization has provided convenience to everyone in all aspects. The trend of research focusing on the implementation of Artificial Intelligence (AI) based cryptography existed thirty years ago. The revolution and the advent of AI and Information and Communication Technology (ICT) have led to a brand-new era of digital reality. New technology is altering the world, with the raising concerns of personal data privacy. Protecting the privacy of everyone’s data is a digital war that should not negligent about. Data security issues are needed to be overcome to prevent personal information from being stolen and misused. The need and demand for more innovative, reliable and usable methods of strengthening cybersecurity are growing, as a result, more research is conducted and in progress. Implementing Convolutional Neural Networks (CNN) in cryptography is widely explored in this decade. Despite the advancements in cryptography, encryption of sensitive data is still a challenging task to fully complete. Most of the recent studies have focused on using neural networks for cryptanalysis and classification accuracy. For this project, the primary objective is to explore the usability of CNN to be implemented in cryptographic operations, which is inclusive of encryption, decryption, and verification. On top of that, achieving a workable, deliverable, and successful algorithm. The results have shown that it is achievable and with huge potential in data protection. | URI: | https://hdl.handle.net/10356/165952 | Schools: | School of Computer Science and Engineering | Fulltext Permission: | restricted | Fulltext Availability: | With Fulltext |
Appears in Collections: | SCSE Student Reports (FYP/IA/PA/PI) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Learn Cryptography Encryption and Decryption Final.pdf Restricted Access | FYP Report | 3.33 MB | Adobe PDF | View/Open |
Page view(s)
217
Updated on May 7, 2025
Download(s) 50
29
Updated on May 7, 2025
Google ScholarTM
Check
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.