<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
  <front>
    <journal-meta>
      <journal-id journal-id-type="nlm-ta">REA Press</journal-id>
      <journal-id journal-id-type="publisher-id">Null</journal-id>
      <journal-title>REA Press</journal-title><issn pub-type="ppub">3042-0180</issn><issn pub-type="epub">3042-0180</issn><publisher>
      	<publisher-name>REA Press</publisher-name>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">https://doi.org/10.22105/scfa.v1i4.59</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Research Article</subject>
        </subj-group>
        <subj-group><subject>Artificial intelligence, Cryptography, Cybersecurity, Post-quantum cryptography, Artificial intelligence security, Cryptanalysis, Privacy-enhancing technologies.</subject></subj-group>
      </article-categories>
      <title-group>
        <article-title>Bridging AI and Cryptography for Robust Security</article-title><subtitle>Bridging AI and Cryptography for Robust Security</subtitle></title-group>
      <contrib-group><contrib contrib-type="author">
	<name name-style="western">
	<surname>Awasthi</surname>
		<given-names>Archit </given-names>
	</name>
	<aff>Computer Science and Engineering (Data Science) (Pranveer Singh Institute of Technology).</aff>
	</contrib><contrib contrib-type="author">
	<name name-style="western">
	<surname>Kumar Singh</surname>
		<given-names>Pradeep </given-names>
	</name>
	<aff>Computer Science and Engineering (Data Science) (Pranveer Singh Institute of Technology).</aff>
	</contrib><contrib contrib-type="author">
	<name name-style="western">
	<surname>Pratap Shukla</surname>
		<given-names>Akhand </given-names>
	</name>
	<aff>Computer Science and Engineering (Data Science) (Pranveer Singh Institute of Technology).</aff>
	</contrib></contrib-group>		
      <pub-date pub-type="ppub">
        <month>10</month>
        <year>2024</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>23</day>
        <month>10</month>
        <year>2024</year>
      </pub-date>
      <volume>1</volume>
      <issue>4</issue>
      <permissions>
        <copyright-statement>© 2024 REA Press</copyright-statement>
        <copyright-year>2024</copyright-year>
        <license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/2.5/"><p>This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</p></license>
      </permissions>
      <related-article related-article-type="companion" vol="2" page="e235" id="RA1" ext-link-type="pmc">
			<article-title>Bridging AI and Cryptography for Robust Security</article-title>
      </related-article>
	  <abstract abstract-type="toc">
		<p>
			Cryptography is under mounting pressure from computational requirements, advanced attacks (Notably Artificial Intelligence (AI)-based Side-Channel Analysis (SCA)), and the looming threat of quantum computing to today's standards, such as Rivest–Shamir–Adleman (RSA)/Elliptic Curve Cryptography (ECC). AI has a double-edged potential: It provides potent tools for improving cryptographic design (e.g., S-Box optimization), protocol optimization (e.g., Quantum Key Distribution (QKD)), and security analysis automation, while at the same time empowering intense cryptanalysis. Most importantly, securing AI systems themselves is now a priority [1], quite frequently requiring cryptographic answers like Homomorphic Encryption (HE) and Federated Learning (FL). This paper thoroughly examines the multi-aspect intersection of AI and cryptography. We discuss using various AI methods (Machine Learning (ML), Deep Learning (DL), Evolutionary Algorithms (EAs)) for such constructive and analytical purposes. In addition, we analyze the intensifying threat landscape where AI acts as both threat actors (e.g., advanced malware creation, exploitation of vulnerabilities) and as defenders [2], [3], taking into account the impact of changing regulatory regimes. Emphasizing recent research directions pointing to expansion in areas such as HE and quantum-based cryptography [4], we underscore the vital significance and inherent difficulty of protecting AI systems, solving model resilience, formal verification challenges, explainability requirements (XAI), and implementing secure development methodologies (SecMLOps) [1], [5]. Future research directions need to focus on the creation of AI-resilient cryptographic protocols, quantum-conscious AI security policies, and the general development of reliable AI integration into security-critical applications.	
		</p>
		</abstract>
    </article-meta>
  </front>
  <body></body>
  <back>
    <ack>
      <p>Null</p>
    </ack>
  </back>
</article>