AI-Powered Encryption Revolutionizing Cybersecurity with Adaptive Cryptographic Algorithms

Main Article Content

Zainab Rustum Mohsin

Abstract

This paper proposes a state-of-the-art encryption technique that integrates artificial intelligence into a dynamic, content-aware security system. We introduce an AI-powered encryption framework that automatically adjusts cryptographic parameters based on message sensitivity, effectively balancing security requirements and computational efficiency. The system combines a DistilBERT-based neural network for real-time content sensitivity analysis with a flexible encryption mechanism that adapts key lengths, iteration counts, and entropy levels on the fly.


Our implementation demonstrates significant adaptability, with a correlation of 0.974 between content sensitivity and security parameters. The system distinguishes between different security requirements, using 32-byte keys with millions of iteration rounds for high-sensitivity content (sensitivity score of 8.64) and 16-byte keys with reduced iterations for low-sensitivity messages (sensitivity score of 3.10). The processing time scales linearly with security requirements, ranging from 300 ms for low-sensitivity content to 732 ms for high-security encryption.


Performance evaluation was highly effective, with the system achieving an overall score of 8.64/10, including 9.87/10 for adaptability and 9.12/10 for performance efficiency. The security level rated high at 7.37/10 while maintaining manageable computational overhead. The framework effectively handled different types of content without sacrificing encryption-decryption accuracy across all levels of sensitivity.


This work signifies a significant leap forward in the field of adaptive cryptography, demonstrating the capabilities of AI-driven security systems that can automate and optimize encryption parameters without compromising security standards. These results suggest that this approach may well represent the future of encrypted communications, providing scaled security appropriately without human intervention.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

Article Details

How to Cite
Mohsin, Z. R. . (2025). AI-Powered Encryption Revolutionizing Cybersecurity with Adaptive Cryptographic Algorithms. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 16(1), 44–62. https://doi.org/10.61841/turcomat.v16i1.14976
Section
Research Articles

References

. Benzaïd, C., & Taleb, T. (2020, November/December). AI for Beyond 5G Networks: A Cyber-Security Defense or Offense Enabler? IEEE Network, 34(6), 140–147. doi:10.1109/MNET.011.2000088

. Chakrabarty, S., & Engels, D. W. (2020). Secure Smart Cities Framework Using IoT and AI. 2020 IEEE Global Conference on Artificial Intelligence and Internet of Things (GCAIoT), Dubai, United Arab Emirates. 10.1109/GCAIoT51063.2020.9345912

. DhoniP.KumarR. (2023). Synergizing Generative AI and Cybersecurity: Roles of Generative AI Entities, Companies, Agencies, and Government in Enhancing Cybersecurity. TechRxiv.

. Haleem, A., Javaid, M., Singh, R. P., Rab, S., & Suman, R. (2022). Perspectives of cybersecurity for ameliorative Industry 4.0 era: A review-based framework. The Industrial Robot, 49(3), 582–597. doi:10.1108/IR-10-2021-0243

. Kadel, R., & Kadel, R. (2022). Impact of AI on Cyber Security. International Journal of Scientific Research and Engineering Development, 5(6)

. Pirbhulal, S., Abie, H., & Shukla, A. (2022). Towards a Novel Framework for Reinforcing Cybersecurity using Digital Twins in IoT-based Healthcare Applications. 2022 IEEE 95th Vehicular Technology Conference: (VTC2022-Spring). IEEE. 10.1109/VTC2022-Spring54318.2022.9860581

. C V Suresh BabuAndrew Simon P, "Adaptive AI for Dynamic Cybersecurity Systems: Enhancing Protection in a Rapidly Evolving Digital Landscap", December 2023 DOI: 10.4018/979-8-3693-0230-9.ch003

. Naresh Kshetri, Mir Mehedi Rahman, "algoTRIC: Symmetric and asymmetric encryption algorithms for Cryptography - A comparative analysis in AI era", Department of Cybersecurity, Rochester Institute of Technology, Rochester, New York, USA , IJACSA (December 2024) Journal

. Zarif Bin AkhtarAhmed Tajbiul Rawol, "Enhancing Cybersecurity through AI-Powered Security Mechanisms", October 2024IT JOURNAL RESEARCH AND DEVELOPMENT 9(1):50-67 DOI: 10.25299/itjrd.2024.16852

. Ahmad K. Al Hwaitat, Hussam N. Fakhouri , "Adaptive Cybersecurity Neural Networks: An Evolutionary Approach for Enhanced Attack Detection and Classification", Computer Science Department, King Abdullah II School of Information Technology, The University of Jordan, Amman 11942, Jordan, Appl. Sci. 2024, 14(19), 9142; https://doi.org/10.3390/app14199142

. Siriwardhana, Y., Porambage, P., Liyanage, M., & Ylianttila, M. (2021). AI and 6G Security: Opportunities and Challenges. 2021 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit), Porto, Portugal. 10.1109/EuCNC/6GSummit51104.2021.9482503

. Srivastava, V. (2023). Adaptive Cyber Defense: Leveraging Neuromorphic Computing for Advanced Threat Detection and Response. 2023 International Conference on Sustainable Computing and Smart Systems (ICSCSS), Coimbatore, India. 10.1109/ICSCSS57650.2023.10169393

. Suresh Babu, C. V., Abirami, S., & Manoj, S. (2023). AI-Based Carthage Administration Towards Smart City. In C. Chowdhary, B. Swain, & V. Kumar (Eds.), Investigations in Pattern Recognition and Computer Vision for Industry 4.0 (pp. 1–17). IGI Global. doi:10.4018/978-1-6684-8602-3.ch001

. Suresh Babu, C. V., & Srisakthi, S. (2023). Cyber Physical Systems and Network Security: The Present Scenarios and Its Applications. In R. Thanigaivelan, S. Kaliappan, & C. Jegadheesan (Eds.), CyberPhysical Systems and Supporting Technologies for Industrial Automation (pp. 104–130). IGI Global.

. Suresh Babu, C. V., & Yadav, S. (2023). Cyber Physical Systems Design Challenges in the Areas of Mobility, Healthcare, Energy, and Manufacturing. In R. Thanigaivelan, S. Kaliappan, & C. Jegadheesan (Eds.), Cyber-Physical Systems and Supporting Technologies for Industrial Automation (pp. 131–151). IGI Global.

. Thomas, G., & Sule, M.-J. (2023). A service lens on cybersecurity continuity and management for organizations’ subsistence and growth. Organizational Cybersecurity Journal: Practice, Process and People, 3(1), 18–40. doi:10.1108/OCJ-09-2021-0025

. Negabi, I., El Asri, S. A., El Adib, S., & Raissouni, N. (2023). Convolutional neural network based key generation for security of data through encryption with advanced encryption standard. International Journal of Electrical & Computer Engineering (2088-8708), 13(3).

. Rehan, H. (2024). AI-Driven Cloud Security: The Future of Safeguarding Sensitive Data in the Digital Age. Journal of Artificial Intelligence General science (JAIGS) ISSN: 3006-4023, 1(1), 132-151.

. Rangaraju, S. (2023). Ai sentry: Reinventing cybersecurity through intelligent threat detection. EPH-International Journal of Science And Engineering, 9(3), 30-35.

. Saha, A., Pathak, C., & Saha, S. (2021). A Study of Machine Learning Techniques in Cryptography for Cybersecurity. American Journal of Electronics & Communication, 1(4), 22-26.

. Yanamala, A. K. Y., & Suryadevara, S. (2023). Advances in Data Protection and Artificial Intelligence: Trends and Challenges. International Journal of Advanced Engineering Technologies and Innovations, 1(01), 294-319.