2016
DOI: 10.1109/tla.2016.7795833
|View full text |Cite
|
Sign up to set email alerts
|

Cryptographic Algorithm Identification Using Machine Learning and Massive Processing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…Recently, Mishra, et. al [6,7] applied PART, C4.5 to the ciphers identification and the accuracy reached over 80%.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, Mishra, et. al [6,7] applied PART, C4.5 to the ciphers identification and the accuracy reached over 80%.…”
Section: Related Workmentioning
confidence: 99%
“…Meanwhile, the block ciphers are encrypted in CBC (Cipher Block Chaining) mode for safety. Compared with [6,7], the conditions of our experiments are far more strict, which make our work more meaningful.…”
Section: Public Keys Ciphersmentioning
confidence: 99%
“…That is, the average distance between any two nodes in the network, where n is the node size in the network. However, for the actual large-scale network, its connectivity is often not guaranteed, that is, there may not be a path between a pair of nodes [11][12]. In order to avoid the divergence of the calculation results, the harmonic average of the distance between nodes in the network is usually defined as the average path length L:…”
Section: Basic Nature Of Networkmentioning
confidence: 99%
“…(1) Machine learning classifier models are the foundation of the majority of identification schemes. For example, Mello and Xexeo use a single support vector machine classifier identification scheme to identify cryptographic algorithms [12]. Fan and Zhao used multiple classification models of random forest, logistic regression, and support vector machine to identify eight block cipher schemes [13].…”
Section: Introductionmentioning
confidence: 99%