Week 10: Analysis Underway
May 30, 2025
When I was working on my final paper, I reviewed the Literature Review section. The Literature Review section of my paper has sources that deal with the role of entropy, AI for security purposes and protecting information, and even how all of this would work in a post-quantum context. The Methodology section describes how I built and trained the GAN, the PyTorch code, the NIST tests, and how exactly I ran the experiments. It is also good to see how exactly these results compare to traditional keys such as AES. The Results section contains the chi-square results and graphs of the AI vs. traditional keys. There will also be a section for the Oracle of Entropy.
Traditional key generation relies on deterministic algorithms that are usually vulnerable to AI attacks, because of their lack of randomness. This project has explored how AI-based solutions can generate high-entropy keys (a lot of randomness) and then see how much better they are compared to traditional methods. I have addressed entropy’s role in the strength of cryptographic methods and whether GANs could be a potential alternative in the post-quantum world.
I have also worked on my results and discussion section. I am also reviewing and visualizing the output data (e.g., the entropy distributions, bit frequency, and p-values (the probability of obtaining test results at least as extreme as the result actually observed)). These results are being integrated into both the paper and the final presentation. Thanks to you all for reading!
Reader Interactions
Comments
Leave a Reply
You must be logged in to post a comment.

It’s interesting that using AI to create keys works better than traditional, more predictable methods to protect against AI attacks. It reminds me of how AI can be used to determine whether inputted writing is AI-generated, picking up on patterns a human might miss. I’m very excited to read your paper and learn more about your findings on AI, contrasting them with my own for self-publishing.
Victor, your analysis is profoundly impressive; it demonstrates a deep understanding of both the technical and pragmatic aspects of cryptographic security. Comparing GAN-generated keys to traditional standards like AES adds meaningful insight to the ever-evolving conversation on post-quantum security. Best of luck presenting this Friday!