2020
DOI: 10.1155/2020/8875864
|View full text |Cite
|
Sign up to set email alerts
|

Cryptosystem Identification Scheme Based on ASCII Code Statistics

Abstract: In the field of information security, block cipher is widely used in the protection of messages, and its safety naturally attracts people’s attention. The identification of the cryptosystem is the premise of encrypted data analysis. It belongs to the category of attack analysis in cryptanalysis and has important theoretical significance and application value. This paper focuses on the extraction of ciphertext features and the construction of cryptosystem identification classifiers. The main contents and innova… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(11 citation statements)
references
References 14 publications
(8 reference statements)
0
11
0
Order By: Relevance
“…In [11] also generative adversarial networks have been employed to break these traditional cryptosystems. Machine learning algorithms and classification skills have been used to detect cryptographic algorithms from cipher texts in the works of [12] and [13]. Classifiers were trained using known cipher texts produced by a collection of six widely used cryptographic methods.…”
Section: Related Work Of Use Machine Learning In Cryptanalysismentioning
confidence: 99%
See 1 more Smart Citation
“…In [11] also generative adversarial networks have been employed to break these traditional cryptosystems. Machine learning algorithms and classification skills have been used to detect cryptographic algorithms from cipher texts in the works of [12] and [13]. Classifiers were trained using known cipher texts produced by a collection of six widely used cryptographic methods.…”
Section: Related Work Of Use Machine Learning In Cryptanalysismentioning
confidence: 99%
“…Coupled map lattice [63], a dynamical system with discrete time and discrete space, is employed in the manner stated by (12). This system has a long enough period to be employed in crypto-systems, and its output is transformed to integer numbers using (13). The generated numbers are then used to conduct right cyclic shifts to the image's rows and up cyclic shifts to the image's columns.…”
Section: ) Coupled Map Lattice(cml)mentioning
confidence: 99%
“…One popular use case of machine learning is to distinguish or identify encryption algorithms based on ciphertext data. These approaches have been used to analyze data encrypted by popular block ciphers such as AES, 3DES, Blowfish and Camellia [14]- [17]. Cryptanalysts have also attempted to use machine learning in a straightforward manner -performing decryption of ciphertexts without knowledge of the secret key.…”
Section: Background a Related Workmentioning
confidence: 99%
“…Most of the studies on manual extraction of ciphertext features have extracted statistical features of ciphertext, such as letter frequency information of ciphertext [1], [2], entropy analysis of ciphertext [3], [4], and length analysis of ciphertext [5]. In addition to using statistical features, Dileep et al [6] attempted to use text classification to construct dictionaries as features using bag-of-words models.…”
Section: Introductionmentioning
confidence: 99%