Classification of Encryption Algorithms Based on Ciphertext Using Pattern Recognition Techniques

3Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In digital era security in data communication is a challenging task. For secure data communication between the parties, encryption algorithms are being used. Recently many attacks have been reported for breaking ciphertext using various cryptanalytic techniques. Cryptanalysts are trying to break the cipher without knowing the key. Present day scenario an attacker may not know an encryption algorithm being used by communication entities. Identifying the algorithm itself is a challenging task. Once the encryption algorithm has identified, the cryptanalysts can analyzes the weakness of the encryption algorithm and be able to retrieve the plain text without knowledge of key. Here we present various pattern recognition techniques for identifying encryption algorithm which are used between two parties for communication of data using ciphertext. Thus, we consider the block cipher algorithms DES, IDEA, AES and RC operating in Electronic Code Book (ECB) mode. The classification techniques used are Support Vector Machine (SVM), Bagging (Ba), AdaBoostM1, Neural Network, Naïve Bayesian (NB), Instance Based Learning (IBL), Rotation Forest (RoFo) and Decision Trees to identify the right algorithm for the given ciphertext.

Cite

CITATION STYLE

APA

Kavitha, T., Rajitha, O., Thejaswi, K., & Muppalaneni, N. B. (2020). Classification of Encryption Algorithms Based on Ciphertext Using Pattern Recognition Techniques. In Lecture Notes on Data Engineering and Communications Technologies (Vol. 31, pp. 540–545). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-030-24643-3_64

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free