An AI-Driven Hybrid Cryptographic Model for Intelligent Data Security

Authors

  • Manjulabai Bhadrashetty Department of Computer Science, Government Women’s First Grade College Jewargi Colony, Kalaburagi -585 102, Karnataka, India
  • Bharati S Pochal
  • Megha Rani Raigonda
  • Shilpa B. Kodli
  • Swaroopa Shastri

DOI:

https://doi.org/10.22399/ijcesen.1748

Keywords:

AI-driven encryption, Cryptography, Machine learning, Dynamic key generation, Hybrid encryption, Cybersecurity

Abstract

With the increasing digitization of sensitive information, ensuring robust data security has become a critical challenge. Traditional encryption methods, such as AES and RSA, provide strong protection but face limitations in computational efficiency, adaptability, and resistance to emerging cyber threats, including quantum computing attacks. Existing encryption models rely on static key generation and predefined security protocols, which can be vulnerable to sophisticated attacks. In this paper, we propose a novel Hybrid AI-Driven Encryption and Decryption Method that integrates artificial intelligence (AI) with cryptographic techniques to enhance security, adaptability, and robustness. Unlike conventional approaches, the proposed method employs machine learning for dynamic key generation, anomaly detection, and adaptive encryption strength adjustments based on real-time threat analysis. A generative adversarial network (GAN) is utilized for unpredictable key generation, ensuring high randomness and security. Additionally, AI-based anomaly detection monitors decryption processes to prevent unauthorized access attempts. Experimental results demonstrate the effectiveness of our approach, achieving a 30\% improvement in decryption anomalies, and enhanced resistance to brute-force attacks. By integrating AI into encryption, this method not only strengthens data security but also optimizes computational resources, making it a viable solution for future cybersecurity applications. The proposed hybrid AI-cryptographic model represents a significant advancement in secure communication, paving the way for quantum-resistant and self-learning security frameworks.

References

[1] Usman, M. (2024, November). AI-enhanced cybersecurity: Leveraging neural networks for proactive threat detection and prevention.

[2] Akhtar, Z. B., & Rawol, A. T. (2024, October). Enhancing cybersecurity through AI-powered security mechanisms. IT Journal Research and Development.

[3] Garcia, J. L. C., Udechukwu, I. P., & Ibrahim, I. B. (2024, June). Securing AI systems: A comprehensive overview of cryptographic techniques for enhanced confidentiality and integrity.

[4] Peneti, S., Supraja, T., & Mahalakshmi, M. (2024, October). Machine learning-driven cryptography: Automating the design of robust encryption algorithms. Communications on Applied Nonlinear Analysis.

[5] Niyasudeen, F., & Mohan, M. (2023, December). Fuzzy-enhanced adaptive multi-layered cloud security framework leveraging artificial intelligence, quantum-resistant cryptography, and fuzzy systems for robust protection.

[6] Kshetri, N., Rahman, M. M., & Rana, M. M. (2024, December). algoTRIC: Symmetric and asymmetric encryption algorithms for cryptography—A comparative analysis in AI era.

[7] Maram, B., Mandale-Jadhav, A., & Pilli, R. (2024, September). Enhancing cryptographic security through recurrent neural networks.

[8] Budhewar, A., Bhumgara, S., & Tekavade, A. (2024, April). Enhancing data security through the synergy of AI and AES encryption: A comprehensive study and implementation.

[9] Saini, A., & Sehrawat, R. (2024, June). Enhancing data security through machine learning-based key generation and encryption. Engineering, Technology & Applied Science Research.

[10] Al Shibli, M. (2020, January). Hybrid artificially intelligent multi-layer blockchain and Bitcoin cryptology (AI-MLBBC): Anti-crime-theft smart wall defense.

[11] Dintakurthy, Y., Innmuri, R. K., Vanteru, A., & Thotakuri, A. (2025). Emerging applications of artificial intelligence in edge computing: A comprehensive review. Journal of Modern Technology, 1(2), 175–185. https://review.journal-of-modern-technology.com/index.php/jmt/article/view/31

[12] Aazad, S. K., Saini, T., Ajad, A., Chaudhary, K., & Elsayed, E. E. (2024). Deciphering blood cells – Method for blood cell analysis using microscopic images. Journal of Modern Technology, 1(1), 9–18. https://review.journal-of-modern-technology.com/index.php/jmt/article/view/4

[13] Anakal, S., Krishna Prasad, K., Uppin, C., & Kumar, M. D. (2025). Diagnosis, visualisation and analysis of COVID-19 using machine learning. International Journal of Computational and Experimental Science and Engineering, 11(1). https://doi.org/10.22399/ijcesen.826

[14] Mishkhal, I., Abdullah, N., Ruhaiyem, N. I. R., & Hassan, F. H. (2025). Facial swap detection based on deep learning: Comprehensive analysis and evaluation. Iraqi Journal for Computer Science and Mathematics, 6(1), 8. https://doi.org/10.52866/2788-7421.1229

[15] Ayad, J., & Jalil, M. A. (2024). Robust color image encryption using 3D chaotic maps and S-box algorithms. Babylonian Journal of Networking, 2024, 148–161. https://doi.org/10.58496/BJN/2024/015

Downloads

Published

2025-06-07

How to Cite

Bhadrashetty, M., Bharati S Pochal, Megha Rani Raigonda, Shilpa B. Kodli, & Swaroopa Shastri. (2025). An AI-Driven Hybrid Cryptographic Model for Intelligent Data Security. International Journal of Computational and Experimental Science and Engineering, 11(3). https://doi.org/10.22399/ijcesen.1748

Issue

Section

Research Article