Learn more >
Get this model
By IBM Developer Staff | Updated September 21, 2018 - Published March 20, 2018
Artificial intelligenceDeep learningSecurity
This model enables adversarial training to learn trivial encryption functions. The model is based on the TensorFlow implementation and the 2016 paper “Learning to Protect Communications with Adversarial Neural Cryptography” by Abadi and Andersen.
This model creates and trains three neural networks, termed Alice, Bob, and Eve. Alice takes inputs in_m (message), in_k (key) and outputs the ciphertext as a string. Bob takes inputs in_k, ciphertext and tries to reconstruct the message. Eve is an adversarial network that takes the ciphertext as its input and also tries to reconstruct the message. The main function attempts to train these networks and then evaluates them, all on random plaintext and key values.
in_m (message), in_k (key)
Deploy model-serving microservices from the Model Asset Exchange on Red Hat OpenShift.
Artificial intelligenceData science+
See how a fictional health care company uses cloud technology to access data stored on z/OS systems.
Take a look at the AI Explainability 360 toolkit, a collection of algorithms that can help explain AI and machine…
Artificial intelligenceDeep learning+
Back to top