{"id":64448,"date":"2025-01-20T08:39:35","date_gmt":"2025-01-20T13:39:35","guid":{"rendered":"https:\/\/blogarchive.utc.edu\/news\/?p=64448"},"modified":"2025-01-31T16:49:55","modified_gmt":"2025-01-31T21:49:55","slug":"revolutionary-research-utc-doctoral-candidate-develops-self-encrypting-ai","status":"publish","type":"post","link":"https:\/\/blogarchive.utc.edu\/news\/2025\/01\/revolutionary-research-utc-doctoral-candidate-develops-self-encrypting-ai\/","title":{"rendered":"Revolutionary research: UTC doctoral candidate develops self-encrypting AI"},"content":{"rendered":"<div id=\"attachment_64450\" class=\"wp-caption alignnone\" ><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"896\" data-attachment-id=\"64450\" data-permalink=\"https:\/\/blogarchive.utc.edu\/news\/2025\/01\/revolutionary-research-utc-doctoral-candidate-develops-self-encrypting-ai\/students-outdoors-22-17\/\" data-orig-file=\"https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/Josh-Tyler-22-3710.jpg\" data-orig-size=\"1200,896\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;5.6&quot;,&quot;credit&quot;:&quot;Angela Foster\/University of Tennessee at Chattanooga&quot;,&quot;camera&quot;:&quot;NIKON Z 6&quot;,&quot;caption&quot;:&quot;Monday, April 25, 2022&quot;,&quot;created_timestamp&quot;:&quot;1650877805&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;31&quot;,&quot;iso&quot;:&quot;50&quot;,&quot;shutter_speed&quot;:&quot;0.00625&quot;,&quot;title&quot;:&quot;Students Outdoors-22&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Students Outdoors-22\" data-image-description=\"\" data-image-caption=\"&lt;p&gt;Monday, April 25, 2022&lt;\/p&gt;\n\" data-large-file=\"https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/Josh-Tyler-22-3710-1024x765.jpg\" class=\"wp-image-64450 size-full\" src=\"https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/Josh-Tyler-22-3710.jpg\" alt=\"Joshua Tyler, who is on track to receive his third UTC degree in May 2025, has developed the world\u2019s first usable Artificial Intelligence (AI) network that can learn how to encrypt itself. Photo by Angela Foster.\" style=\"max-width: 100%;\"style=\"max-width: 100%;\" srcset=\"https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/Josh-Tyler-22-3710.jpg 1200w, https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/Josh-Tyler-22-3710-1024x765.jpg 1024w, https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/Josh-Tyler-22-3710-768x573.jpg 768w, https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/Josh-Tyler-22-3710-800x597.jpg 800w, https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/Josh-Tyler-22-3710-580x433.jpg 580w, https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/Josh-Tyler-22-3710-610x455.jpg 610w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><p class=\"wp-caption-text\">Joshua Tyler, who is on track to receive his third UTC degree in May, has developed the world\u2019s first usable Artificial Intelligence (AI) network that can learn how to encrypt itself. Photo by Angela Foster.<\/p><\/div>\n<p>In a world where data security is an ever-growing concern, Joshua Tyler\u2014a computational engineering doctoral candidate and electrical engineering research associate at the University of Tennessee at Chattanooga\u2014has broken new ground.<\/p>\n<p>Tyler, who is on track to receive his third UTC degree in May, has developed the world\u2019s first usable Artificial Intelligence network that can learn how to encrypt itself. This AI network, he said, can provide nearly unbreakable cryptography\u2014significantly improving the security of communications.<\/p>\n<p>Tyler and his faculty mentor, Dr. Don Reising, a Guerry and UC Foundation associate professor of electrical engineering, have uploaded a draft of their publication to arXiv\u2014an open-access repository for scholarly papers. They have already submitted their invention disclosure to the University of Tennessee Research Foundation for a provisional patent.<\/p>\n<div id=\"attachment_64452\" class=\"wp-caption alignright\" ><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" data-attachment-id=\"64452\" data-permalink=\"https:\/\/blogarchive.utc.edu\/news\/2025\/01\/revolutionary-research-utc-doctoral-candidate-develops-self-encrypting-ai\/students-outdoors-22-19\/\" data-orig-file=\"https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/Josh-Tyler-22-3767-e1734199664123.jpg\" data-orig-size=\"904,902\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;4&quot;,&quot;credit&quot;:&quot;Angela Foster\/University of Tennessee at Chattanooga&quot;,&quot;camera&quot;:&quot;NIKON Z 6&quot;,&quot;caption&quot;:&quot;Monday, April 25, 2022&quot;,&quot;created_timestamp&quot;:&quot;1650878457&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;125&quot;,&quot;iso&quot;:&quot;50&quot;,&quot;shutter_speed&quot;:&quot;0.005&quot;,&quot;title&quot;:&quot;Students Outdoors-22&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Students Outdoors-22\" data-image-description=\"\" data-image-caption=\"&lt;p&gt;Monday, April 25, 2022&lt;\/p&gt;\n\" data-large-file=\"https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/Josh-Tyler-22-3767-1024x770.jpg\" class=\"wp-image-64452 size-medium\" src=\"https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/Josh-Tyler-22-3767-e1734199664123-300x300.jpg\" alt=\"Joshua Tyler\" style=\"max-width: 100%;\"style=\"max-width: 100%;\" srcset=\"https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/Josh-Tyler-22-3767-e1734199664123-300x300.jpg 300w, https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/Josh-Tyler-22-3767-e1734199664123-150x150.jpg 150w, https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/Josh-Tyler-22-3767-e1734199664123-768x766.jpg 768w, https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/Josh-Tyler-22-3767-e1734199664123-800x798.jpg 800w, https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/Josh-Tyler-22-3767-e1734199664123-580x579.jpg 580w, https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/Josh-Tyler-22-3767-e1734199664123-610x609.jpg 610w, https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/Josh-Tyler-22-3767-e1734199664123-600x600.jpg 600w, https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/Josh-Tyler-22-3767-e1734199664123-75x75.jpg 75w, https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/Josh-Tyler-22-3767-e1734199664123.jpg 904w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><p class=\"wp-caption-text\">Joshua Tyler<\/p><\/div>\n<p>Tyler\u2019s AI network, he explained, learns to encrypt data \u201cby transforming an encryption key onto the original unencrypted data. The goal is to ensure that the encrypted message is unique to the key while the original message is still recoverable on the other end.\u201d<\/p>\n<p>\u201cThis ensures that when deployed, each encryption is unique and significantly extends the network\u2019s lifespan,\u201d said Tyler, who received a bachelor\u2019s degree in electrical engineering in 2020 and a master\u2019s degree in 2022.<\/p>\n<p>The research builds on a concept initially proposed by Google, known as Adversarial Neural Cryptography. While Google demonstrated the potential for AI-driven cryptography, its approach faced significant limitations\u2014particularly in ensuring the encryption key\u2019s influence on the encrypted message and additional communication overhead.<\/p>\n<p>\u201cI copied over Google\u2019s setup and trained their network on my side,\u201d he said. \u201cThe network was encrypting the information, but we found out that there wasn\u2019t a lot of uniqueness on the encrypted side when we were switching keys, so that makes the overall life of the network shorter. You\u2019d only get to encrypt one message per network.\u201d<\/p>\n<p>Reising, who has worked with Tyler for more than six years, said he \u201cbasically challenged Josh to go and find a way to get this thing to generate a unique code or a unique encoded message.\u201d<\/p>\n<p>\u201cAnd that\u2019s what he did,\u201d Reising said. \u201cHe went off and worked on developing his own technique.\u201d<\/p>\n<div id=\"attachment_64453\" class=\"wp-caption alignright\" ><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" data-attachment-id=\"64453\" data-permalink=\"https:\/\/blogarchive.utc.edu\/news\/2025\/01\/revolutionary-research-utc-doctoral-candidate-develops-self-encrypting-ai\/donald-reising-23-6\/\" data-orig-file=\"https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/Donald-Reising-23-381-e1734199804963.jpg\" data-orig-size=\"748,694\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;5&quot;,&quot;credit&quot;:&quot;Angela Foster\/University of Tennessee at Chattanooga&quot;,&quot;camera&quot;:&quot;NIKON Z 6_2&quot;,&quot;caption&quot;:&quot;Donald Reising, Thursday, April 27, 2023 in the Engineering and Computer Science Building.&quot;,&quot;created_timestamp&quot;:&quot;1682610371&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;33&quot;,&quot;iso&quot;:&quot;400&quot;,&quot;shutter_speed&quot;:&quot;0.005&quot;,&quot;title&quot;:&quot;Donald Reising-23&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Donald Reising-23\" data-image-description=\"\" data-image-caption=\"&lt;p&gt;Donald Reising, Thursday, April 27, 2023 in the Engineering and Computer Science Building.&lt;\/p&gt;\n\" data-large-file=\"https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/Donald-Reising-23-381-1024x627.jpg\" class=\"wp-image-64453 size-medium\" src=\"https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/Donald-Reising-23-381-e1734199804963-300x300.jpg\" alt=\"Dr. Don Reising\" style=\"max-width: 100%;\"style=\"max-width: 100%;\" srcset=\"https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/Donald-Reising-23-381-e1734199804963-300x300.jpg 300w, https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/Donald-Reising-23-381-e1734199804963-150x150.jpg 150w, https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/Donald-Reising-23-381-e1734199804963-600x600.jpg 600w, https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/Donald-Reising-23-381-e1734199804963-75x75.jpg 75w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><p class=\"wp-caption-text\">Dr. Don Reising<\/p><\/div>\n<p>Reising recalled a pivotal moment during the process.<\/p>\n<p>\u201cI asked him, \u2018What architecture are you using? Are you using CNN? Are you using an LSTM? What are you using?\u2019<\/p>\n<p>\u201cAnd he\u2019s like, \u2018No, I\u2019m not using any of those. I made my own.\u2019<\/p>\n<p>\u201cI said, \u2018What do you mean you made your own?\u2019<\/p>\n<p>\u201cHe said, \u2018I made my own and it\u2019s a deep learning network.\u2019 That was crazy and it was pretty awesome.\u201d<\/p>\n<p>By rethinking the structure of AI networks, Tyler developed a \u201cnovel neural network architecture\u201d that addresses these challenges.<\/p>\n<p>The result is a network that offers nearly unbreakable encryption and unparalleled adaptability in safeguarding sensitive data.<\/p>\n<p>\u201cI changed the network architecture so that the influence of the key was still maintained through the entire structure of the network,\u201d he said.<\/p>\n<p>A crucial feature of Tyler\u2019s system is its rapid adaptability, which allows it to retrain itself in seconds to produce entirely new cryptographic algorithms. This new architecture ensures that each encryption remains unique, effectively overcoming the limitations of previous methods.<\/p>\n<p>\u201cEvery time you retrain the network, you get a different cryptographic algorithm,\u201d Tyler said. \u201cSo then, even if you use the same key across two differently trained networks, you\u2019ll get a new encryption scheme.\u201d<\/p>\n<p>\u201cThese things train really fast so that we can have a new cryptographic algorithm in about 16 seconds.\u201d<\/p>\n<div id=\"attachment_65137\" class=\"wp-caption alignnone\" ><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"1034\" data-attachment-id=\"65137\" data-permalink=\"https:\/\/blogarchive.utc.edu\/news\/2025\/01\/revolutionary-research-utc-doctoral-candidate-develops-self-encrypting-ai\/joshua-tyler-figure-final\/\" data-orig-file=\"https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/joshua-tyler-figure-final.png\" data-orig-size=\"1280,1034\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"joshua-tyler-figure-final\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/joshua-tyler-figure-final-1024x827.png\" class=\"wp-image-65137 size-full\" src=\"https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/joshua-tyler-figure-final.png\" alt=\"Illustration of the AI network putting a &quot;lock&quot; on the bits.&quot; Illustration by Holley Beeland.\" style=\"max-width: 100%;\"style=\"max-width: 100%;\" srcset=\"https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/joshua-tyler-figure-final.png 1280w, https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/joshua-tyler-figure-final-1024x827.png 1024w, https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/joshua-tyler-figure-final-768x621.png 768w, https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/joshua-tyler-figure-final-800x646.png 800w, https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/joshua-tyler-figure-final-580x469.png 580w, https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/joshua-tyler-figure-final-610x493.png 610w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><p class=\"wp-caption-text\">Illustration of the AI network putting a &#8220;lock&#8221; on the bits.&#8221;<\/p><\/div>\n<p>Tyler said it took several months of trying to get it to work with the traditional architectures, \u201cjust trying different training scenarios and different metrics that the network would use to update itself.\u201d<\/p>\n<p>\u201cWhen it finally worked,\u201d he said, \u201cit was surprising because you go through two or three months of it not working\u2014and then you try something completely new that you invented and it suddenly works. That\u2019s where the real fun starts because then you get to make sure that it really works.\u201d<\/p>\n<p>Tyler admitted he felt a \u201cslight bit of disbelief\u201d when he realized his discovery was\u2014indeed\u2014a discovery. \u201cWhen you get it to work that first time, you\u2019re like, \u2018Was that a lucky guess?\u2019 I think it was a little bit lucky\u2014but it was also hard work to map it out mentally, write the code to run the algorithms, and then see how well it holds up against what\u2019s already out there.\u201d<\/p>\n<p>The implications of Tyler\u2019s discovery extend across industries\u2014including defense, health care and finance.<\/p>\n<p>\u201cIn the military, they want to do a lot of unmanned vehicles, and a really big consideration is communications,\u201d he said. New aircraft are being designed to be unmanned because it costs a lot of money to put a human pilot in the cockpit.<\/p>\n<p>\u201cYou have to have life support systems, you have to have G-force and you have to pay to train that pilot\u2014and that takes millions of dollars,\u201d he continued. \u201cIf you have an unmanned vehicle, you can go faster and you don\u2019t risk the pilot\u2019s life every time they go out on a mission or do training\u2014but that requires coordination between the operating base and the unmanned vehicle. It has to communicate a lot of information, but we don\u2019t want that information to be gleaned by any adversary.\u201d<\/p>\n<p>He described a real-world incident in which an unmanned vehicle operated by a drone pilot lacked encrypted communications. An adversary intercepted the data, resulting in the loss of the aircraft.<\/p>\n<p>\u201cThey reverse-engineered it,\u201d he said, \u201cso we lost that capability because we weren\u2019t encrypting our communications to the drone.\u201d<\/p>\n<p>In other areas, such as health care, the technology could secure sensitive information transmitted between devices.<\/p>\n<p>\u201cIn a hospital, you have the vitals being read in the patient\u2019s room\u2014and that\u2019s being fed to the nurse\u2019s station to where they can monitor that,\u201d Tyler said. \u201cThere may be someone that wants to intercept that information for some reason. So, we would prevent them from being able to intercept a patient\u2019s vitals.\u201d<\/p>\n<p>With a draft already published on arXiv, Tyler and Reising are preparing to submit the work for peer-reviewed publication.<\/p>\n<p>\u201cPart of it is we submit the paper and hopefully get that published,\u201d Reising said, \u201cand look to see what the application space is. Who\u2019s interested in it? Is it something that people would license?\u201d<\/p>\n<p>As Tyler\u2019s mentor, Reising has taken great pride in watching his prot\u00e9g\u00e9\u2019s career growth. Mentors, he said, are meant to guide.<\/p>\n<p>\u201cMy job is not to impede, not to hinder and not to stymie. It\u2019s to move obstacles and enable,\u201d he said. \u201cWhen something like this happens, it tells me two things: I\u2019m getting to work with somebody really special who really can do some really great things\u2014and I\u2019m doing something right in terms of the mentorship.<\/p>\n<p>\u201cI\u2019m enabling the student to achieve those things and put them in a place so that they can follow their passion, solve problems and push the paradigm of what we know and understand\u2014which is really cool, really exciting and rewarding as a professor.\u201d<\/p>\n<h4>Learn more<\/h4>\n<p><a href=\"https:\/\/www.utc.edu\/enrollment-management-and-student-affairs\/admissions\/visit\">Visit UTC<\/a><\/p>\n<p><a href=\"https:\/\/www.utc.edu\/engineering-and-computer-science\">UTC College of Engineering and Computer Science<\/a><\/p>\n<p><a href=\"https:\/\/www.utc.edu\/engineering-and-computer-science\/academic-programs\/electrical-engineering\">Electrical Engineering<\/a><\/p>\n<p><a href=\"https:\/\/www.utc.edu\/apply\">How to apply<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a world where data security is an ever-growing concern, Joshua Tyler\u2014a computational engineering doctoral candidate and electrical engineering research associate at UTC\u2014has broken new ground. Tyler, who is on track to receive his third UTC degree in May, has developed the world\u2019s first usable Artificial Intelligence (AI) network that can learn how to encrypt itself.<\/p>\n<p class=\"more-link-wrap\"><span><a class=\"more-link button text\" href=\"https:\/\/blogarchive.utc.edu\/news\/2025\/01\/revolutionary-research-utc-doctoral-candidate-develops-self-encrypting-ai\/\"><span>Continue Reading <\/a><\/span><\/p>\n","protected":false},"author":1493,"featured_media":64450,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","_ef_editorial_meta_date_first-draft-date":"","_ef_editorial_meta_paragraph_assignment":"","_ef_editorial_meta_checkbox_needs-photo":"","_ef_editorial_meta_number_word-count":"","_ef_editorial_meta_checkbox_slider":"","_ef_editorial_meta_checkbox_featurette":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[48048,70,123864,123753,15,59,3,7712,52,64,48007,661],"tags":[123827,123826,117127,119175,123828,124776,123829],"class_list":{"0":"post-64448","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-academics","8":"category-advancement-and-alumni","9":"category-artificial-intelligence","10":"category-campus","11":"category-college-of-engineering-and-computer-science","12":"category-community","13":"category-electrical-engineering","14":"category-faculty-and-staff","15":"category-graduate-school","16":"category-news","17":"category-research-academics","18":"category-students","19":"tag-creating-the-mocs-experience","20":"tag-cultivating-a-culture-of-innovation","21":"tag-donald-reising","22":"tag-joshua-tyler","23":"tag-leveraging-our-special-place-as-chattanoogas-university","24":"tag-mocs-learn-mocs-do-mocs-lead","25":"tag-operating-with-excellence","26":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Revolutionary research: UTC doctoral candidate develops self-encrypting AI | UTC News Archive: Jul 2007 - Oct 2025<\/title>\n<meta name=\"description\" content=\"In a world where data security is an ever-growing concern, Joshua Tyler\u2014a computational engineering doctoral candidate and electrical engineering research associate at UTC\u2014has broken new ground. Tyler, who is on track to receive his third UTC degree in May, has developed the world\u2019s first usable Artificial Intelligence (AI) network that can learn how to encrypt itself.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Revolutionary research: UTC doctoral candidate develops self-encrypting AI | UTC News Archive: Jul 2007 - Oct 2025\" \/>\n<meta property=\"og:description\" content=\"In a world where data security is an ever-growing concern, Joshua Tyler\u2014a computational engineering doctoral candidate and electrical engineering research associate at UTC\u2014has broken new ground. Tyler, who is on track to receive his third UTC degree in May, has developed the world\u2019s first usable Artificial Intelligence (AI) network that can learn how to encrypt itself.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blogarchive.utc.edu\/news\/2025\/01\/revolutionary-research-utc-doctoral-candidate-develops-self-encrypting-ai\/\" \/>\n<meta property=\"og:site_name\" content=\"UTC News Archive: Jul 2007 - Oct 2025\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/UTChattanooga\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-20T13:39:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-31T21:49:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/Josh-Tyler-22-3710.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"896\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chuck Wasserstrom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@UTChattanooga\" \/>\n<meta name=\"twitter:site\" content=\"@UTChattanooga\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chuck Wasserstrom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blogarchive.utc.edu\\\/news\\\/2025\\\/01\\\/revolutionary-research-utc-doctoral-candidate-develops-self-encrypting-ai\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blogarchive.utc.edu\\\/news\\\/2025\\\/01\\\/revolutionary-research-utc-doctoral-candidate-develops-self-encrypting-ai\\\/\"},\"author\":{\"name\":\"Chuck Wasserstrom\",\"@id\":\"https:\\\/\\\/blogarchive.utc.edu\\\/news\\\/#\\\/schema\\\/person\\\/ba12ddef664be78c31809fda10eae4e5\"},\"headline\":\"Revolutionary research: UTC doctoral candidate develops self-encrypting AI\",\"datePublished\":\"2025-01-20T13:39:35+00:00\",\"dateModified\":\"2025-01-31T21:49:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blogarchive.utc.edu\\\/news\\\/2025\\\/01\\\/revolutionary-research-utc-doctoral-candidate-develops-self-encrypting-ai\\\/\"},\"wordCount\":1322,\"image\":{\"@id\":\"https:\\\/\\\/blogarchive.utc.edu\\\/news\\\/2025\\\/01\\\/revolutionary-research-utc-doctoral-candidate-develops-self-encrypting-ai\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blogarchive.utc.edu\\\/news\\\/files\\\/2024\\\/12\\\/Josh-Tyler-22-3710.jpg\",\"keywords\":[\"Creating the Mocs Experience\",\"Cultivating a Culture of Innovation\",\"Donald Reising\",\"joshua tyler\",\"Leveraging Our Special Place as Chattanooga\u2019s University\",\"Mocs Learn Mocs Do Mocs Lead\",\"Operating with Excellence\"],\"articleSection\":[\"Academics\",\"Advancement and Alumni\",\"Artificial Intelligence\",\"Campus\",\"College of Engineering and Computer Science\",\"Community\",\"Electrical Engineering\",\"Faculty and Staff\",\"Graduate School\",\"News\",\"Research\",\"Students\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blogarchive.utc.edu\\\/news\\\/2025\\\/01\\\/revolutionary-research-utc-doctoral-candidate-develops-self-encrypting-ai\\\/\",\"url\":\"https:\\\/\\\/blogarchive.utc.edu\\\/news\\\/2025\\\/01\\\/revolutionary-research-utc-doctoral-candidate-develops-self-encrypting-ai\\\/\",\"name\":\"Revolutionary research: UTC doctoral candidate develops self-encrypting AI | UTC News Archive: Jul 2007 - Oct 2025\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blogarchive.utc.edu\\\/news\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blogarchive.utc.edu\\\/news\\\/2025\\\/01\\\/revolutionary-research-utc-doctoral-candidate-develops-self-encrypting-ai\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blogarchive.utc.edu\\\/news\\\/2025\\\/01\\\/revolutionary-research-utc-doctoral-candidate-develops-self-encrypting-ai\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blogarchive.utc.edu\\\/news\\\/files\\\/2024\\\/12\\\/Josh-Tyler-22-3710.jpg\",\"datePublished\":\"2025-01-20T13:39:35+00:00\",\"dateModified\":\"2025-01-31T21:49:55+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blogarchive.utc.edu\\\/news\\\/#\\\/schema\\\/person\\\/ba12ddef664be78c31809fda10eae4e5\"},\"description\":\"In a world where data security is an ever-growing concern, Joshua Tyler\u2014a computational engineering doctoral candidate and electrical engineering research associate at UTC\u2014has broken new ground. Tyler, who is on track to receive his third UTC degree in May, has developed the world\u2019s first usable Artificial Intelligence (AI) network that can learn how to encrypt itself.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blogarchive.utc.edu\\\/news\\\/2025\\\/01\\\/revolutionary-research-utc-doctoral-candidate-develops-self-encrypting-ai\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blogarchive.utc.edu\\\/news\\\/2025\\\/01\\\/revolutionary-research-utc-doctoral-candidate-develops-self-encrypting-ai\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogarchive.utc.edu\\\/news\\\/2025\\\/01\\\/revolutionary-research-utc-doctoral-candidate-develops-self-encrypting-ai\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blogarchive.utc.edu\\\/news\\\/files\\\/2024\\\/12\\\/Josh-Tyler-22-3710.jpg\",\"contentUrl\":\"https:\\\/\\\/blogarchive.utc.edu\\\/news\\\/files\\\/2024\\\/12\\\/Josh-Tyler-22-3710.jpg\",\"width\":1200,\"height\":896,\"caption\":\"Monday, April 25, 2022\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blogarchive.utc.edu\\\/news\\\/2025\\\/01\\\/revolutionary-research-utc-doctoral-candidate-develops-self-encrypting-ai\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blogarchive.utc.edu\\\/news\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Revolutionary research: UTC doctoral candidate develops self-encrypting AI\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blogarchive.utc.edu\\\/news\\\/#website\",\"url\":\"https:\\\/\\\/blogarchive.utc.edu\\\/news\\\/\",\"name\":\"UTC News Archive: Jul 2007 - Oct 2025\",\"description\":\"Official news releases of the University of Tennessee at Chattanooga\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blogarchive.utc.edu\\\/news\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blogarchive.utc.edu\\\/news\\\/#\\\/schema\\\/person\\\/ba12ddef664be78c31809fda10eae4e5\",\"name\":\"Chuck Wasserstrom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/adff2964e628ba03f65fe21e0b0b94ca0667bdce5def0433d41884758501f284?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/adff2964e628ba03f65fe21e0b0b94ca0667bdce5def0433d41884758501f284?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/adff2964e628ba03f65fe21e0b0b94ca0667bdce5def0433d41884758501f284?s=96&d=mm&r=g\",\"caption\":\"Chuck Wasserstrom\"},\"description\":\"Chuck Wasserstrom is the director of communications in the UTC Division of Communications and Marketing.\",\"url\":\"https:\\\/\\\/blogarchive.utc.edu\\\/news\\\/author\\\/wyf557\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Revolutionary research: UTC doctoral candidate develops self-encrypting AI | UTC News Archive: Jul 2007 - Oct 2025","description":"In a world where data security is an ever-growing concern, Joshua Tyler\u2014a computational engineering doctoral candidate and electrical engineering research associate at UTC\u2014has broken new ground. Tyler, who is on track to receive his third UTC degree in May, has developed the world\u2019s first usable Artificial Intelligence (AI) network that can learn how to encrypt itself.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Revolutionary research: UTC doctoral candidate develops self-encrypting AI | UTC News Archive: Jul 2007 - Oct 2025","og_description":"In a world where data security is an ever-growing concern, Joshua Tyler\u2014a computational engineering doctoral candidate and electrical engineering research associate at UTC\u2014has broken new ground. Tyler, who is on track to receive his third UTC degree in May, has developed the world\u2019s first usable Artificial Intelligence (AI) network that can learn how to encrypt itself.","og_url":"https:\/\/blogarchive.utc.edu\/news\/2025\/01\/revolutionary-research-utc-doctoral-candidate-develops-self-encrypting-ai\/","og_site_name":"UTC News Archive: Jul 2007 - Oct 2025","article_publisher":"https:\/\/www.facebook.com\/UTChattanooga","article_published_time":"2025-01-20T13:39:35+00:00","article_modified_time":"2025-01-31T21:49:55+00:00","og_image":[{"width":1200,"height":896,"url":"https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/Josh-Tyler-22-3710.jpg","type":"image\/jpeg"}],"author":"Chuck Wasserstrom","twitter_card":"summary_large_image","twitter_creator":"@UTChattanooga","twitter_site":"@UTChattanooga","twitter_misc":{"Written by":"Chuck Wasserstrom","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blogarchive.utc.edu\/news\/2025\/01\/revolutionary-research-utc-doctoral-candidate-develops-self-encrypting-ai\/#article","isPartOf":{"@id":"https:\/\/blogarchive.utc.edu\/news\/2025\/01\/revolutionary-research-utc-doctoral-candidate-develops-self-encrypting-ai\/"},"author":{"name":"Chuck Wasserstrom","@id":"https:\/\/blogarchive.utc.edu\/news\/#\/schema\/person\/ba12ddef664be78c31809fda10eae4e5"},"headline":"Revolutionary research: UTC doctoral candidate develops self-encrypting AI","datePublished":"2025-01-20T13:39:35+00:00","dateModified":"2025-01-31T21:49:55+00:00","mainEntityOfPage":{"@id":"https:\/\/blogarchive.utc.edu\/news\/2025\/01\/revolutionary-research-utc-doctoral-candidate-develops-self-encrypting-ai\/"},"wordCount":1322,"image":{"@id":"https:\/\/blogarchive.utc.edu\/news\/2025\/01\/revolutionary-research-utc-doctoral-candidate-develops-self-encrypting-ai\/#primaryimage"},"thumbnailUrl":"https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/Josh-Tyler-22-3710.jpg","keywords":["Creating the Mocs Experience","Cultivating a Culture of Innovation","Donald Reising","joshua tyler","Leveraging Our Special Place as Chattanooga\u2019s University","Mocs Learn Mocs Do Mocs Lead","Operating with Excellence"],"articleSection":["Academics","Advancement and Alumni","Artificial Intelligence","Campus","College of Engineering and Computer Science","Community","Electrical Engineering","Faculty and Staff","Graduate School","News","Research","Students"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blogarchive.utc.edu\/news\/2025\/01\/revolutionary-research-utc-doctoral-candidate-develops-self-encrypting-ai\/","url":"https:\/\/blogarchive.utc.edu\/news\/2025\/01\/revolutionary-research-utc-doctoral-candidate-develops-self-encrypting-ai\/","name":"Revolutionary research: UTC doctoral candidate develops self-encrypting AI | UTC News Archive: Jul 2007 - Oct 2025","isPartOf":{"@id":"https:\/\/blogarchive.utc.edu\/news\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blogarchive.utc.edu\/news\/2025\/01\/revolutionary-research-utc-doctoral-candidate-develops-self-encrypting-ai\/#primaryimage"},"image":{"@id":"https:\/\/blogarchive.utc.edu\/news\/2025\/01\/revolutionary-research-utc-doctoral-candidate-develops-self-encrypting-ai\/#primaryimage"},"thumbnailUrl":"https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/Josh-Tyler-22-3710.jpg","datePublished":"2025-01-20T13:39:35+00:00","dateModified":"2025-01-31T21:49:55+00:00","author":{"@id":"https:\/\/blogarchive.utc.edu\/news\/#\/schema\/person\/ba12ddef664be78c31809fda10eae4e5"},"description":"In a world where data security is an ever-growing concern, Joshua Tyler\u2014a computational engineering doctoral candidate and electrical engineering research associate at UTC\u2014has broken new ground. Tyler, who is on track to receive his third UTC degree in May, has developed the world\u2019s first usable Artificial Intelligence (AI) network that can learn how to encrypt itself.","breadcrumb":{"@id":"https:\/\/blogarchive.utc.edu\/news\/2025\/01\/revolutionary-research-utc-doctoral-candidate-develops-self-encrypting-ai\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blogarchive.utc.edu\/news\/2025\/01\/revolutionary-research-utc-doctoral-candidate-develops-self-encrypting-ai\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogarchive.utc.edu\/news\/2025\/01\/revolutionary-research-utc-doctoral-candidate-develops-self-encrypting-ai\/#primaryimage","url":"https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/Josh-Tyler-22-3710.jpg","contentUrl":"https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/Josh-Tyler-22-3710.jpg","width":1200,"height":896,"caption":"Monday, April 25, 2022"},{"@type":"BreadcrumbList","@id":"https:\/\/blogarchive.utc.edu\/news\/2025\/01\/revolutionary-research-utc-doctoral-candidate-develops-self-encrypting-ai\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blogarchive.utc.edu\/news\/"},{"@type":"ListItem","position":2,"name":"Revolutionary research: UTC doctoral candidate develops self-encrypting AI"}]},{"@type":"WebSite","@id":"https:\/\/blogarchive.utc.edu\/news\/#website","url":"https:\/\/blogarchive.utc.edu\/news\/","name":"UTC News Archive: Jul 2007 - Oct 2025","description":"Official news releases of the University of Tennessee at Chattanooga","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blogarchive.utc.edu\/news\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blogarchive.utc.edu\/news\/#\/schema\/person\/ba12ddef664be78c31809fda10eae4e5","name":"Chuck Wasserstrom","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/adff2964e628ba03f65fe21e0b0b94ca0667bdce5def0433d41884758501f284?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/adff2964e628ba03f65fe21e0b0b94ca0667bdce5def0433d41884758501f284?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/adff2964e628ba03f65fe21e0b0b94ca0667bdce5def0433d41884758501f284?s=96&d=mm&r=g","caption":"Chuck Wasserstrom"},"description":"Chuck Wasserstrom is the director of communications in the UTC Division of Communications and Marketing.","url":"https:\/\/blogarchive.utc.edu\/news\/author\/wyf557\/"}]}},"featured_image_src":"https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/Josh-Tyler-22-3710.jpg","featured_image_src_square":"https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/Josh-Tyler-22-3710.jpg","author_info":{"display_name":"Chuck Wasserstrom","author_link":"https:\/\/blogarchive.utc.edu\/news\/author\/wyf557\/"},"jetpack_featured_media_url":"https:\/\/blogarchive.utc.edu\/news\/files\/2024\/12\/Josh-Tyler-22-3710.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blogarchive.utc.edu\/news\/wp-json\/wp\/v2\/posts\/64448","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogarchive.utc.edu\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogarchive.utc.edu\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogarchive.utc.edu\/news\/wp-json\/wp\/v2\/users\/1493"}],"replies":[{"embeddable":true,"href":"https:\/\/blogarchive.utc.edu\/news\/wp-json\/wp\/v2\/comments?post=64448"}],"version-history":[{"count":5,"href":"https:\/\/blogarchive.utc.edu\/news\/wp-json\/wp\/v2\/posts\/64448\/revisions"}],"predecessor-version":[{"id":65223,"href":"https:\/\/blogarchive.utc.edu\/news\/wp-json\/wp\/v2\/posts\/64448\/revisions\/65223"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogarchive.utc.edu\/news\/wp-json\/wp\/v2\/media\/64450"}],"wp:attachment":[{"href":"https:\/\/blogarchive.utc.edu\/news\/wp-json\/wp\/v2\/media?parent=64448"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogarchive.utc.edu\/news\/wp-json\/wp\/v2\/categories?post=64448"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogarchive.utc.edu\/news\/wp-json\/wp\/v2\/tags?post=64448"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}