Skip to Main Content
PCMag editors select and review products independently. If you buy through affiliate links, we may earn commissions, which help support our testing.

Google Researchers Create AI That Builds Its Own Encryption

Two AI algorithms successfully communicated without a third being able to overhear.

By Tom Brant
October 28, 2016
Best Encryption Software

Alice and Bob have figured out a way to have a conversation without Eve being able to overhear, no matter how hard she tries.

But Alice and Bob aren't humans who can whisper. They're artificial intelligence algorithms created by Google engineers, and their ability to create an encryption protocol that Eve (also an AI algorithm) can't hack is being hailed as an important advance in machine learning and cryptography.

The researchers, Martin Abadi and David G. Andersen, explained in a paper published this week that their experiment is intended to find out if neural networks—the building blocks of AI—can learn to communicate secretly.

"Neural networks are generally not meant to be great at cryptography," the engineers wrote. So they created multiple versions of Alice and Bob to see which ones were best at keeping their transmissions hidden from Eve. That would be easy if Alice and Bob were given a human-created encryption protocol to run, but what about one that they had to create themselves?

As the Abadi and Anderson wrote, "instead of training each of Alice and Bob separately to implement some known cryptosystem, we train Alice and Bob jointly to communicate successfully and to defeat Eve without a pre-specified notion of what cryptosystem they may discover for this purpose."

After multiple experiments powered by a computer with a single GPU (Abadi and Anderson explain that the type of hardware used is not important) Eve was not able to understand anything about Bob and Alice's transmissions.

The engineers acknowledge that their experiment simply proves that neural networks can create their own encryption, not that they're necessarily good at it. "While it seems improbable that neural networks would become great at cryptanalysis, they may be quite effective in making sense of metadata and in traffic analysis," they wrote.

Like What You're Reading?

Sign up for SecurityWatch newsletter for our top privacy and security stories delivered right to your inbox.

This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Use and Privacy Policy. You may unsubscribe from the newsletters at any time.


Thanks for signing up!

Your subscription has been confirmed. Keep an eye on your inbox!

Sign up for other newsletters

TRENDING

About Tom Brant

Deputy Managing Editor

I’m the deputy managing editor of the hardware team at PCMag.com. Reading this during the day? Then you've caught me testing gear and editing reviews of laptops, desktop PCs, and tons of other personal tech. (Reading this at night? Then I’m probably dreaming about all those cool products.) I’ve covered the consumer tech world as an editor, reporter, and analyst since 2015.

I’ve evaluated the performance, value, and features of hundreds of personal tech devices and services, from laptops to Wi-Fi hotspots and everything in between. I’ve also covered the launches of dozens of groundbreaking technologies, from hyperloop test tracks in the desert to the latest silicon from Apple and Intel.

I've appeared on CBS News, in USA Today, and at many other outlets to offer analysis on breaking technology news.

Before I joined the tech-journalism ranks, I wrote on topics as diverse as Borneo's rain forests, Middle Eastern airlines, and Big Data's role in presidential elections. A graduate of Middlebury College, I also have a master's degree in journalism and French Studies from New York University.

Read Tom's full bio

Read the latest from Tom Brant