Open Access
ARTICLE
Secure Text Mail Encryption with Generative Adversarial Networks
1 Constructor University, Bremen gGmbH, Campus Ring 1, Bremen, 28759, Germany
2IU Internationale Hochschule, Juri-Gagarin-Ring 152, Erfurt, D-99084, Germany
* Corresponding Author: Alexej Schelle. Email:
Journal of Information Hiding and Privacy Protection 2025, 7, 33-44. https://doi.org/10.32604/jihpp.2025.067510
Received 06 May 2025; Accepted 07 July 2025; Issue published 31 July 2025
Abstract
This work presents an encryption model based on Generative Adversarial Networks (GANs). Encryption of RTF-8 data is realized by dynamically generating decimal numbers that lead to the encryption and decryption of alphabetic strings in integer representation by simple addition rules, the modulus of the dimension of the considered alphabet. The binary numbers for the private dynamic keys correspond to the binary numbers of public reference keys, as defined by a specific GAN configuration. For reversible encryption with a bijective mapping between dynamic and reference keys, as defined by the GAN encryptor, secure text encryption can be achieved by transferring a GAN-encrypted public key along with the encrypted text from a sender to a receiver. Using the technique described above, secure text mail transfer can be realized through component-wise encryption and decryption of text mail strings, with total key sizes of up to bits that define random decimal numbers generated by the GAN. From the present model, we assert that encrypted texts can be transmitted more efficiently and securely than with RSA encryption, given an additional security component that users of the specific configuration of the GAN encryption model are unaware of the GAN encryptor circuit and configuration, respectively.Keywords
Cite This Article
Copyright © 2025 The Author(s). Published by Tech Science Press.This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


Submit a Paper
Propose a Special lssue
View Full Text
Download PDF
Downloads
Citation Tools