Applications of artificial intelligence for cryptographic and security purpose
Închide
Articolul precedent
Articolul urmator
198 1
Ultima descărcare din IBN:
2024-02-18 17:40
SM ISO690:2012
CRETU, Cristian, SCHIPSCHI, Daniil, NEGAI, Marin. Applications of artificial intelligence for cryptographic and security purpose. In: Conferinţa tehnico-ştiinţifică a studenţilor, masteranzilor şi doctoranzilor, 5-7 aprilie 2023, Chișinău. Chișinău, Republica Moldova: Tehnica-UTM, 2023, Vol.2, pp. 14-17. ISBN 978-9975-45-956-3..
EXPORT metadate:
Google Scholar
Crossref
CERIF

DataCite
Dublin Core
Conferinţa tehnico-ştiinţifică a studenţilor, masteranzilor şi doctoranzilor
Vol.2, 2023
Conferința "Conferinţa tehnico-ştiinţifică a studenţilor, masteranzilor şi doctoranzilor"
Chișinău, Moldova, 5-7 aprilie 2023

Applications of artificial intelligence for cryptographic and security purpose


Pag. 14-17

Cretu Cristian, Schipschi Daniil, Negai Marin
 
Technical University of Moldova
 
 
Disponibil în IBN: 6 octombrie 2023


Rezumat

The use of artificial intelligence (AI) in cryptography and security is a rapidly growing field. In security, AI is used to detect potential threats and weaknesses within a system by identifying "safe" versus "malicious" behaviors. AI security tools are able to process large amounts of data and create activity profiles that can reveal malicious behavior, mimicking the threat-detection capability of human analysts. AI is also used to automate tasks, prioritize alerts, predict breach risks, and respond to security incidents. In cryptography, AI is used to develop and improve existing encryption algorithms. However, the use of AI in cybersecurity is not without its challenges. As AI becomes more widely used in the cybersecurity field, companies need to take precautions to protect themselves from potential adverse effects. Hackers can try to exploit security algorithms by targeting the AI system itself. The use of AI in cybersecurity creates a dilemma known as the "AI/cybersecurity conundrum," where AI can be used for both good and bad purposes

Cuvinte-cheie
machine learning, protection, hash algorithms, Malice, safety