An AI-Driven Hybrid Cryptographic Model for Intelligent Data Security
DOI:
https://doi.org/10.22399/ijcesen.1748Keywords:
AI-driven encryption, Cryptography, Machine learning, Dynamic key generation, Hybrid encryption, CybersecurityAbstract
With the increasing digitization of sensitive information, ensuring robust data security has become a critical challenge. Traditional encryption methods, such as AES and RSA, provide strong protection but face limitations in computational efficiency, adaptability, and resistance to emerging cyber threats, including quantum computing attacks. Existing encryption models rely on static key generation and predefined security protocols, which can be vulnerable to sophisticated attacks. In this paper, we propose a novel Hybrid AI-Driven Encryption and Decryption Method that integrates artificial intelligence (AI) with cryptographic techniques to enhance security, adaptability, and robustness. Unlike conventional approaches, the proposed method employs machine learning for dynamic key generation, anomaly detection, and adaptive encryption strength adjustments based on real-time threat analysis. A generative adversarial network (GAN) is utilized for unpredictable key generation, ensuring high randomness and security. Additionally, AI-based anomaly detection monitors decryption processes to prevent unauthorized access attempts. Experimental results demonstrate the effectiveness of our approach, achieving a 30\% improvement in decryption anomalies, and enhanced resistance to brute-force attacks. By integrating AI into encryption, this method not only strengthens data security but also optimizes computational resources, making it a viable solution for future cybersecurity applications. The proposed hybrid AI-cryptographic model represents a significant advancement in secure communication, paving the way for quantum-resistant and self-learning security frameworks.
References
[1] Usman, M. (2024, November). AI-enhanced cybersecurity: Leveraging neural networks for proactive threat detection and prevention.
[2] Akhtar, Z. B., & Rawol, A. T. (2024, October). Enhancing cybersecurity through AI-powered security mechanisms. IT Journal Research and Development.
[3] Garcia, J. L. C., Udechukwu, I. P., & Ibrahim, I. B. (2024, June). Securing AI systems: A comprehensive overview of cryptographic techniques for enhanced confidentiality and integrity.
[4] Peneti, S., Supraja, T., & Mahalakshmi, M. (2024, October). Machine learning-driven cryptography: Automating the design of robust encryption algorithms. Communications on Applied Nonlinear Analysis.
[5] Niyasudeen, F., & Mohan, M. (2023, December). Fuzzy-enhanced adaptive multi-layered cloud security framework leveraging artificial intelligence, quantum-resistant cryptography, and fuzzy systems for robust protection.
[6] Kshetri, N., Rahman, M. M., & Rana, M. M. (2024, December). algoTRIC: Symmetric and asymmetric encryption algorithms for cryptography—A comparative analysis in AI era.
[7] Maram, B., Mandale-Jadhav, A., & Pilli, R. (2024, September). Enhancing cryptographic security through recurrent neural networks.
[8] Budhewar, A., Bhumgara, S., & Tekavade, A. (2024, April). Enhancing data security through the synergy of AI and AES encryption: A comprehensive study and implementation.
[9] Saini, A., & Sehrawat, R. (2024, June). Enhancing data security through machine learning-based key generation and encryption. Engineering, Technology & Applied Science Research.
[10] Al Shibli, M. (2020, January). Hybrid artificially intelligent multi-layer blockchain and Bitcoin cryptology (AI-MLBBC): Anti-crime-theft smart wall defense.
[11] Dintakurthy, Y., Innmuri, R. K., Vanteru, A., & Thotakuri, A. (2025). Emerging applications of artificial intelligence in edge computing: A comprehensive review. Journal of Modern Technology, 1(2), 175–185. https://review.journal-of-modern-technology.com/index.php/jmt/article/view/31
[12] Aazad, S. K., Saini, T., Ajad, A., Chaudhary, K., & Elsayed, E. E. (2024). Deciphering blood cells – Method for blood cell analysis using microscopic images. Journal of Modern Technology, 1(1), 9–18. https://review.journal-of-modern-technology.com/index.php/jmt/article/view/4
[13] Anakal, S., Krishna Prasad, K., Uppin, C., & Kumar, M. D. (2025). Diagnosis, visualisation and analysis of COVID-19 using machine learning. International Journal of Computational and Experimental Science and Engineering, 11(1). https://doi.org/10.22399/ijcesen.826
[14] Mishkhal, I., Abdullah, N., Ruhaiyem, N. I. R., & Hassan, F. H. (2025). Facial swap detection based on deep learning: Comprehensive analysis and evaluation. Iraqi Journal for Computer Science and Mathematics, 6(1), 8. https://doi.org/10.52866/2788-7421.1229
[15] Ayad, J., & Jalil, M. A. (2024). Robust color image encryption using 3D chaotic maps and S-box algorithms. Babylonian Journal of Networking, 2024, 148–161. https://doi.org/10.58496/BJN/2024/015
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 International Journal of Computational and Experimental Science and Engineering

This work is licensed under a Creative Commons Attribution 4.0 International License.