2015
DOI: 10.14569/ijacsa.2015.060808
|View full text |Cite
|
Sign up to set email alerts
|

Cryptic Mining in Light of Artificial Intelligence

Abstract: Abstract-"The analysis of cryptic text is hard problem", and there is no fixed algorithm for generating plain-text from cipher text. Human brains do this intelligently. The intelligent cryptic analysis process needs learning algorithms, co-operative effort of cryptanalyst and mechanism of knowledge based inference engine. This information of knowledge base will be useful for mining data(plain-text, key or cipher text plain-text relationships), classification of cipher text based on enciphering algorithms, key … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 13 publications
0
1
0
Order By: Relevance
“…In [18], the cryptic algorithm developed from Fibonacci-Q matrix [10,14,15] under various situations say hacker is interested to mine future keys, future key sequences, and probable steady state situation using Markov process. The stochastic analysis and future recommendations for ensuring security is presented in [18,20].…”
Section: Related Work For Avk Cryptosystemmentioning
confidence: 99%
“…In [18], the cryptic algorithm developed from Fibonacci-Q matrix [10,14,15] under various situations say hacker is interested to mine future keys, future key sequences, and probable steady state situation using Markov process. The stochastic analysis and future recommendations for ensuring security is presented in [18,20].…”
Section: Related Work For Avk Cryptosystemmentioning
confidence: 99%