An Adaptive Cryptography Using OpenAI API: Dynamic Key Management Using Self Learning AI

An Adaptive Cryptography Using OpenAI API: Dynamic Key Management Using Self Learning AI

R. Valarmathi, R. Uma, P. Ramkumar, Srivatsan Venkatesh
Copyright: © 2024 |Pages: 20
DOI: 10.4018/979-8-3693-1642-9.ch004
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Security functions which are present now, such as the SHA series of hash functions, other brute force prevention protocols, and much more, are keeping our cyber fields safe from any script-kiddies and professional hackers. But the recent study shows that penetration tools are optimised in numerous ways, enabling the hackers to take in a big advantage over our key logging and brute forcing prevention tactics, allowing them to make a clean hit over the fragile databases. Many of the existing domains now are optimised with the added benefit of artificial intelligence support. Specifically, the OpenAI API market has grown plentiful of their uses, and the password hash automation now has a time to get upgraded.
Chapter Preview
Top

2. Background

Cybersecurity is the most required field of division in this modern era, which solely runs on the digital media for data transfer and usage. In this day and age, thieves may not require your wallet to get your identification, but may readily steal it from the systems you are trusting. This unfolds the term “cyber-crime”. Traditional security measures face challenges due to evolving hacking techniques, including the use of script bots and AIs (Pearce et al., 2023), rendering manual penetration avoidance and security measures less effective.

Notably, the advent of AI has introduced new complexities, such as spear-phishing using GPT (Khan et al., 2021), overpowering some network-based intrusion detection systems (Gala et al., 2023). Researchers like Joshi et al. (2022), explored automatic penetration methods like SQL Injections, influencing our project's scope. Gallus et al. (2023) investigated how Generative Neural Networks, akin to DALL-E and ChatGPT, can serve as web application penetration testing tools, leveraging Large Language Models (LLM) and Generative Neural Networks.

Research by Li and Oprea (2016), on breach detection using security logs in an enterprise, inspired our AI-IDS to detect breaches through security logs. Memos and Psannis (2020) highlighted the use of AI in honeypots for botnet detection, a crucial component in countering Distributed Denial of Service (DDoS) attacks. Prasad et al. (2023), emphasized the role of GPT models in the cybersecurity domain, guiding our project's direction.

Complete Chapter List

Search this Book:
Reset