Chinese Journal of Network and Information Security ›› 2023, Vol. 9 ›› Issue (3): 79-89.doi: 10.11959/j.issn.2096-109x.2023040
• Papers • Previous Articles Next Articles
Ruiqi XIA, Manman LI, Shaozhen CHEN
Revised:
2022-06-09
Online:
2023-06-25
Published:
2023-06-01
Supported by:
CLC Number:
Ruiqi XIA, Manman LI, Shaozhen CHEN. Identification on the structures of block ciphers using machine learning[J]. Chinese Journal of Network and Information Security, 2023, 9(3): 79-89.
[1] | RIVEST R L . Cryptography and machine learning[C]// The International Conference on the Theory and Application of Cryptology. 1991: 427-439. |
[2] | RAMZAN Z . On using neural networks to break cryptosystems[J]. Manuscript, 1998. |
[3] | POOJA M . Classification of ciphers[R]. Indian Institute of Technology,Kanpur, 2001. |
[4] | DILEEP A D , SEKHAR C C . Identification of block ciphers using support vector machines[C]// The 2006 IEEE International Joint Conference on Neural Network Proceedings. 2006: 2696-2701. |
[5] | MANJULA R , ANITHA R . Identification of encryption algorithm using decision tree[C]// International Conference on Computer Science and Information Technology. 2011: 237-246. |
[6] | MISHRA S , BHATTACHARJYA A . Pattern analysis of cipher text:a combined approach[C]// 2013 International Conference on Recent Trends in Information Technology (ICRTIT). 2013: 393-398. |
[7] | BARBOSA F , VIDAL A , MELLO F . Machine learning for cryptographic algorithm identification[J]. Journal of Information Security and Cryptography (Enigma), 2016,3(1): 3-8. |
[8] | CHOU J W , LIN S D , CHENG C M . On the effectiveness of using state-of-the-art machine learning techniques to launch cryptographic distinguishing attacks[C]// Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence. 2012: 105-110. |
[9] | 赵志诚 . 基于机器学习的密码体制识别研究[D]. 郑州:信息工程大学, 2018. |
ZHAO Z C . The Research of Cryptosystem Recognition Scheme Based on Machine Learning[D]. Zhengzhou:Information Engineering University, 2018. | |
[10] | 李洪超 . 基于密文特征的密码算法识别研究[D]. 西安:西安电子科技大学, 2018. |
LI H C . Cipher-text features based cipher system recognition[D]. Xi’an:Xidian University, 2018. | |
[11] | SOUZA W A R , TOMLINSON A . A distinguishing attack with a neural network[C]// 2013 IEEE 13th International Conference on Data Mining Workshops. 2013: 154-161. |
[12] | PAMIDIPARTHI S , VELAMPALLI S . Cryptographic algorithm identification using deep learning techniques[M]// Evolution in Computational Intelligence. 2021: 785-793. |
[13] | 曹莉茹 . 基于深度学习的密码算法识别研究[D]. 成都:电子科技大学, 2021. |
CAO L R . A research of cryptographic algorithm recognition scheme based on machine learning[D]. Chengdu:University of Electronic Science and Technology of China, 2021. | |
[14] | ZAMAN J , GHOSH R . Review on fifteen statistical tests proposed by NIST[J]. Journal of Theoretical Physics and Cryptography, 2012,1: 18-31. |
[15] | HOFFSTEIN J , SILVERMAN J H . Random small hamming weight products with applications to cryptography[J]. Discrete Applied Mathematics, 2003,130(1): 37-49. |
[16] | WU C K , FENG D . Boolean function representation of S-boxes and boolean permutations[M]// Boolean Functions and Their Applications in Cryptography. 2016: 217-241. |
[17] | COVER T M , THOMAS J A . Entropy,relative entropy and mutual information[J]. Elements of Information Theory, 1991,2(1): 12-13. |
[18] | BIAU G , SCORNET E . A random forest guided tour[J]. Test, 2016,25(2): 197-227. |
[19] | YING C , QI GUANG M , JIA Chen L ,et al. Advance and prospects of AdaBoost algorithm[J]. Acta Automatica Sinica, 2013,39(6): 745-758. |
[20] | AKKAR M L , GIRAUD C . An implementation of DES and AES,secure against some attacks[C]// International Workshop on Cryptographic Hardware and Embedded Systems. 2001: 309-318. |
[21] | BIHAM E , ANDERSON R , KNUDSEN L . Serpent:a new block cipher proposal[C]// International Workshop on Fast Software Encryption. 1998: 222-238. |
[22] | LIU G , GHOSH M , SONG L . Security analysis of SKINNY under related-tweakey settings[J]. Cryptology ePrint Archive, 2016. |
[23] | BOGDANOV A , KNUDSEN L R , LEANDER G ,et al. PRESENT:an ultra-lightweight block cipher[C]// International Workshop on Cryptographic Hardware and Embedded Systems. 2007: 450-466. |
[24] | BANIK S , BOGDANOV A , ISOBE T ,et al. Midori:a block cipher for low energy[C]// International Conference on the Theory and Application of Cryptology and Information Security. 2015: 411-436. |
[25] | PARK J , YUN Y , KIM Y D ,et al. Design and implementation of ARIA cryptic algorithm[J]. Journal of the Institute of Electronics Engineers of Korea SD, 2005,42(4): 29-36. |
[26] | SCHNEIER B . The Twofish encryption algorithm[J]. Dr.Dobb's Journal:Software Tools for the Professional Programmer, 1998,23(12): 30-34. |
[27] | BEAULIEU R , SHORS D , SMITH J ,et al. The SIMON and SPECK lightweight block ciphers[C]// Proceedings of the 52nd Annual Design Automation Conference. 2015: 1-6. |
[28] | HALAGALI B P , DESAI V V . Implementation of chaos based cryptography in kasumi block cipher[C]// 2018 International Conference on Communication and Signal Processing (ICCSP). 2018: 165-169. |
[29] | SUZAKI T , MINEMATSU K , MORIOKA S ,et al. Twine:a lightweight,versatile block cipher[C]// ECRYPT Workshop on Lightweight Cryptography. 2011, 2011. |
[30] | THAKUR J , KUMAR N . DES,AES and blowfish:symmetric key cryptography algorithms simulation based performance analysis[J]. International Journal of Emerging Technology and Advanced Engineering, 2011,1(2): 6-12. |
[1] | Nan WEI, Lihua YIN, Hong NING, Binxing FANG. Preliminary study on the reform of machine learning teaching [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 182-189. |
[2] | Cheng HUANG, Mingxu SUN, Renyu DUAN, Susheng WU, Bin CHEN. Vulnerability identification technology research based on project version difference [J]. Chinese Journal of Network and Information Security, 2022, 8(1): 52-62. |
[3] | Yingjun ZHANG,Ushangqi LI,Mu YANG,Haixia ZHANG,Kezhen HUANG. Survey on anomaly detection technology based on logs [J]. Chinese Journal of Network and Information Security, 2020, 6(6): 1-12. |
[4] | Xi FU,Hui LI,Xingwen ZHAO. Survey on phishing detection research [J]. Chinese Journal of Network and Information Security, 2020, 6(5): 1-10. |
[5] | Kang HE,Yuefei ZHU,Long LIU,Bin LU,Bin LIU. Improve the robustness of algorithm under adversarial environment by moving target defense [J]. Chinese Journal of Network and Information Security, 2020, 6(4): 67-76. |
[6] | Fuxiang YUAN,Fenlin LIU,Chong LIU,Yan LIU,Xiangyang LUO. MLAR:large-scale network alias resolution for IP geolocation [J]. Chinese Journal of Network and Information Security, 2020, 6(4): 77-94. |
[7] | Ziming LUO,Shubin XU,Xiaodong LIU. Scheme for identifying malware traffic with TLS data based on machine learning [J]. Chinese Journal of Network and Information Security, 2020, 6(1): 77-83. |
[8] | Wei HUANG,Cuncai LIU,Sibo QI. LSTM network traffic prediction and link congestion warning scheme for single port and single link [J]. Chinese Journal of Network and Information Security, 2019, 5(6): 50-57. |
[9] | Lei SONG, Chunguang MA, Guanghan DUAN. Machine learning security and privacy:a survey [J]. Chinese Journal of Network and Information Security, 2018, 4(8): 1-11. |
[10] | Tuosiyu MING, Hongchang CHEN. Research progress and trend of text summarization [J]. Chinese Journal of Network and Information Security, 2018, 4(6): 1-10. |
[11] | Zheng-qi WANG,Xiao-bing FENG,Chi ZHANG. Study of high-speed malicious Web page detection system based on two-step classifier [J]. Chinese Journal of Network and Information Security, 2017, 3(8): 44-60. |
[12] | Xi ZHANG,Zhi-wei YAN,Hong-tao LI,Guang-gang GENG. Research of phishing detection technology [J]. Chinese Journal of Network and Information Security, 2017, 3(7): 7-24. |
[13] | Dong ZHANG,Yao ZHANG,Gang LIU,Gui-xiang SONG. Research on host malcode detection using machine learning [J]. Chinese Journal of Network and Information Security, 2017, 3(7): 25-32. |
[14] | Bo-wen SUN,Yan-yi HUANG,Qiao-kun WEN,Bin TIAN,Peng WU,Qi LI. Malware classification method based on static multiple-feature fusion [J]. Chinese Journal of Network and Information Security, 2017, 3(11): 68-76. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|