Skip to content

msokoloff1/Adversarial-Neural-Cryptography

Folders and files

NameName
Last commit message
Last commit date

Latest commit

1e56c8b · Mar 31, 2017

History

22 Commits
Feb 15, 2017
Mar 31, 2017
Mar 2, 2017

Repository files navigation

Adversarial-Neural-Cryptography

-This project is based on the paper Learning to Protect Communications with Adversarial Neural Cryptography. The overall concept is that there are two individuals attempting to securely communicate while a third individual attempts to listen Each of the parties previously described is represented by a neural network. The networks attempting to have a private conversation seek to maximize the reconstruction of the original message for the destination network. At the same time, they attempt to minimize the original message's reconstruction by the eavesdropping network. The eavesdropping network's objective is to maximize its reconstruction of the original message. Since these objectives conflict (hence adversarial), the objective becomes harder as the networks become better.

The networks are named after the classic scenario used to introduce the concept of cryptography (diagram below):

  • Alice is the network sending the secure message.
  • Bob is the network that is the intended recipient for the secure message
  • Eve is the network that attempts to eavesdrop on the message

  • The code achieves the same results as in the paper
    • To Run:
      1. Clone the repository
      2. python3 Main.py
    
    * For additional options:
    

python3 Main.py -h

  • In progress:
  • Exploring additional improvements and use cases
  • Performing analysis on results

######Dependencies:

* Tensorflow 0.12
* Numpy
* Python 3

About

Explores adversarial networks for cryptography

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published