Abstract
With the rapid development of information technology, data security issues have become increasingly prominent. As one of the most widely used symmetric encryption algorithms currently, AES (Advanced Encryption Standard) plays a crucial role in ensuring data confidentiality. However, with the improvement of computing power and the explosive growth of data volume, The traditional AES algorithm faces growing challenges in terms of performance and security. In scenarios where the resources of Internet of Things (IoT) devices are limited, the high computational complexity of AES encryption introduces latency in device response, making it difficult to meet real-time requirements. Meanwhile, the breakthrough of quantum computing technology threatens AES with fast decryption, and new side-channel attacks (e.g., power analysis attacks, electromagnetic radiation analysis attacks) jeopardize its security. This paper aims to explore the application of deep learning technology in the optimization of the AES encryption algorithm. By deeply analyzing the bottleneck problems of the AES algorithm in practical applications, targeted optimization schemes are proposed. Specifically, this paper utilizes the powerful learning ability and feature extraction ability of deep learning models to optimize the key generation, encryption round function and other key components of the AES algorithm, in order to solve the problems of low efficiency when the traditional AES algorithm processes large-scale data and its limited resistance to new attacks. Through the construction of optimization models based on Convolutional Neural Networks (CNN), Recurrent Neural Networks (RNN) and Generative Adversarial Networks (GAN), and a large number of simulation experiments and practical tests, the research results show that the deep learning-based optimization method can effectively improve the encryption speed of the AES algorithm, with the encryption efficiency increased by 35% on the ARM Cortex-M4 chip. At the same time, it significantly enhances its security, and the ability to resist differential attacks and linear attacks is increased by more than 40%, providing new ideas and methods for the further development of the AES algorithm in practical applications. Specifically, by introducing LSTM to model the AES key expansion process, the Shannon entropy of the round key is increased from 122.3 bits in the traditional algorithm to 145.6 bits, effectively enhancing the randomness of the key. In terms of resisting differential attacks, the differential characteristic probability of the optimized AES algorithm is reduced from 0.12 to 0.07, significantly improving the security of the algorithm.
References
B. Zhang, G. Ma, X. Lu and W. Xu, Study on Hybrid Encryption Technology of Power Gateway Based on AES and RSA Algorithm[C], 2022 14th International Conference on Signal Processing Systems (ICSPS), Jiangsu, China, 2022, pp. 640–644, https://doi.org/10.1109/ICSPS58776.2022.00118.
L. Liu, X. Li, Y. Chen, J. Huang, Y. Qi and Z. Wei, Analysis of WeChat Mini Program Data Encryption Algorithm Based on Computer Network Security: AES Symmetric Encryption Algorithm[C], 2024 International Conference on Image Processing, Computer Vision and Machine Learning (ICICML), Shenzhen, China, 2024, pp. 2004–2007, https://doi.org/10.1109/ICICML63543.2024.10957877.
K. Lata, P. Singh, S. Saini and L. R. Cenkeramaddi, Deep Learning-Based Brain Tumor Detection in Privacy-Preserving Smart Health Care Systems[J], in IEEE Access, vol. 12, pp. 140722–140733, 2024, https://doi.org/10.1109/ACCESS.2024.3456599.
I. Kasthuripitiya, J. Ariyawansha, T. Ranasinghe, M. Sandirigama and D. Jayasinghe, Machine Learning Based Enhanced Remote Power Analysis Attacks[C], 2025 5th International Conference on Advanced Research in Computing (ICARC), Belihuloya, Sri Lanka, 2025, pp. 1–6, https://doi.org/10.1109/ICARC64760.2025.10963016.
Yi, S., Li, H., Wang, X.(2016). Pedestrian Behavior Understanding and Prediction with Deep Neural Networks[C]. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds) Computer Vision – ECCV 2016. ECCV 2016. Lecture Notes in Computer Science, vol. 9905. Springer, Cham. https://doi.org/10.1007/978-3-319-46448-0_16.
Byeon H, Shabaz M, Surbakti H, et al. Deep learning and encryption algorithms based model for enhancing biometric security for artificial intelligence era[J]. Journal of Ambient Intelligence and Humanized Computing, 2024, (prepublish):1–14. https://doi.org/10.1007/S12652-024-04855-2.
Soniya Rohhila, Amit Kumar Singh. Deep learning-based encryption for secure transmission digital images: A survey[J]. Computers and Electrical Engineering, Vol. 116, 2024, 109236. https://doi.org/10.1016/J.COMPELECENG.2024.109236.
Zhu T, Wang C, Cao W. Reversible watermarking algorithm with chaos and zuc encryption based on deep learning in healthcare[J]. Journal of Mechanics in Medicine and Biology, 2023, 24(03). https://doi.org/10.1142/S0219519423500422.
Qiang G, Huifeng Y, Xingru L. Optimization of a Deep Learning Algorithm for Security Protection of Big Data from Video Images[J]. Computational intelligence and neuroscience, 2022, 20223394475–3394475. https://doi.org/10.1155/2022/3394475.
Kim D, Kim H, Jang K, et al. Deep-Learning-Based Neural Distinguisher for Format-Preserving Encryption Schemes FF1 and FF3[J]. Electronics, 2024, 13(7). https://doi.org/10.3390/ELECTRONICS13071196.
Jin B, Lei R, Liu L. Deep learning and chaotic system based image encryption algorithm for secondary user system[J]. Nonlinear Dynamics, 2024, (prepublish):1–25. https://doi.org/10.1007/S11071-024-10143-7.
Hameed S S M, V. A, Vishwanadham M, et al. Security enhancement and attack detection using optimized hybrid deep learning and improved encryption algorithm over Internet of Things[J]. Measurement: Sensors, 2023, 30. https://doi.org/10.1016/J.MEASEN.2023.100917.
S. Rai, M. C. Lohani, K. R. Singh, S. Ghumman, S. B. Patil and M. V, Improving 6G Network Safety, Privacy, and Resource Efficiency via the Application of Machine Learning and Network Data Analytics[C], 2024 Global Conference on Communications and Information Technologies (GCCIT), BANGALORE, India, 2024, pp. 1–6, https://doi.org/10.1109/GCCIT63234.2024.10862744.
Kunihiro K, Yuta F, Kota Y, et al. Practical aspects on non-profiled deep-learning side-channel attacks against AES software implementation with two types of masking countermeasures including RSM[J]. Journal of Cryptographic Engineering, 2023, 13(4):427–442. http://doi.org/10.1007/S13389-023-00312-6.
Yuta F, Kota Y, Hisashi H, et al. Profiling Deep Learning Side-channel Attacks using Multi-label against AES circuits with RSM Countermeasure[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2022, advpub(0). https://doi.org/10.1587/TRANSFUN.2022CIP0015.
Zhang, Y. Application and Optimization of Deep Learning in Image Recognition[C]. 2024 International Seminar on Artificial Intelligence, Computer Technology and Control Engineering (ACTCE), IEEE, 2024, pp. 438–442. https://doi.org/10.1109/ACTCE65085.2024.00095.
Huanyu W, Elena D. Tandem Deep Learning Side-Channel Attack on FPGA Implementation of AES[J]. SN Computer Science, 2021, 2(5). https://doi.org/10.1007/S42979-021-00755-W.
Negabi I, Asri E A S, Adib E S, et al. Beyond encryption: How deep learning can break microcontroller security through power analysis[J]. e-Prime – Advances in Electrical Engineering, Electronics and Energy, 2025, 11100947–100947. https://doi.org/10.1016/J.PRIME.2025.100947.
Zhang R, Mo Y, Pan Z, et al. Intra-class CutMix data augmentation based deep learning side channel attacks[J]. Integration, 2025, 102102373–102373. https://doi.org/10.1016/J.VLSI.2025.102373.
Rezaeezade A, Batina L. Regularizers to the rescue: fighting overfitting in deep learning-based side-channel analysis[J]. Journal of Cryptographic Engineering, 2024, (prepublish):1–21. https://doi.org/10.1007/S13389-024-00361-5.
Soroor G, Samaneh G, Sara T. Deep K-TSVM: A Novel Profiled Power Side-Channel Attack on AES-128[J]. IEEE ACCESS, 2021, 9136448–136458. https://doi.org/10.1109/ACCESS.2021.3117761.

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Copyright (c) 2025 Journal of Cyber Security and Mobility
