2010 IEEE 4th International Symposium on Advanced Networks and Telecommunication Systems 2010
DOI: 10.1109/ants.2010.5983530
|View full text |Cite
|
Sign up to set email alerts
|

Cipher-text classification with data mining

Abstract: Cryptography plays an important role in information technology. With the explosive growth of Internet, the importance of information and network security is increased. The principle goal of cryptography is information hiding and block-cipher algorithms achieve this goal through information recoding. However, various kinds of information have distinctive features, which are employed in classification tasks. If these features are transformed to the cipher-text, cipher-texts may be classified to their original cl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…According to Khadivi, P and Momtazpour, [1], cryptography is essential building block for information and network security and needs advancement with increasing growth in internet. They used block cipher generation algorithm by information recording techniques.…”
Section: Exploration Of Other Approaches In Literaturementioning
confidence: 99%
See 1 more Smart Citation
“…According to Khadivi, P and Momtazpour, [1], cryptography is essential building block for information and network security and needs advancement with increasing growth in internet. They used block cipher generation algorithm by information recording techniques.…”
Section: Exploration Of Other Approaches In Literaturementioning
confidence: 99%
“…Recently IOT is also gaining pace, here system and Internet is connected to the physical world via ubiquitous sensors". Following research questions are yet to be answered: (1). What are the scopes of AVK approaches of ensuring efficiency in IOT ?…”
Section: Avk Based Cryptosystem and Iotmentioning
confidence: 99%
“…In cryptanalysis, the attacker tries to recover the original form of a secured message by analyzing hidden patterns in data or finding the secret key. One of the main ways to attack the cryptosystem is to analyze the hidden data patterns to reveal the main information of the ciphertext [1], [6], [7]. This is referred to as building a structured knowledge representation by extracting the features from the ciphertext normally using machine learning algorithms to process the information The associate editor coordinating the review of this manuscript and approving it for publication was Davide Patti .…”
Section: Introductionmentioning
confidence: 99%
“…In [1], a cryptosystem has been presented that records cipher generated using information recording techniques. Then, features from this information can be extracted to distinguish one cipher from others.…”
Section: Review Of Literaturementioning
confidence: 99%