Get this model
By IBM Developer Staff | Updated September 21, 2018 - Published March 20, 2018
This model enables adversarial training to learn trivial encryption functions. The model is based on the TensorFlow implementation and the 2016 paper “Learning to Protect Communications with Adversarial Neural Cryptography” by Abadi and Andersen.
This model creates and trains three neural networks, termed Alice, Bob, and Eve. Alice takes inputs in_m (message), in_k (key) and outputs the ciphertext as a string. Bob takes inputs in_k, ciphertext and tries to reconstruct the message. Eve is an adversarial network that takes the ciphertext as its input and also tries to reconstruct the message. The main function attempts to train these networks and then evaluates them, all on random plaintext and key values.
in_m (message), in_k (key)
March 20, 2019
March 26, 2019
Artificial intelligenceKnowledge Discovery+
March 27, 2019
Back to top