2018
DOI: 10.1007/978-3-030-00015-8_1
|View full text |Cite
|
Sign up to set email alerts
|

The Research of Cryptosystem Recognition Based on Randomness Test’s Return Value

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…The first approach achieves an accuracy of 100% with a text length of 200, the second 71% with a text length of 155 and the third 100% with a text length of 155. Zhao et al (2018) extracted 54 features from 15 different NIST 800-22 (Rukhin et al, 2010) randomness tests. The efficiency was tested in several 10-fold-cross-validation SVM one-to-one classifiers for six modern block ciphers (AES, Blowfish, Camellia, DES, 3DES and IDEA).…”
Section: Related Workmentioning
confidence: 99%
“…The first approach achieves an accuracy of 100% with a text length of 200, the second 71% with a text length of 155 and the third 100% with a text length of 155. Zhao et al (2018) extracted 54 features from 15 different NIST 800-22 (Rukhin et al, 2010) randomness tests. The efficiency was tested in several 10-fold-cross-validation SVM one-to-one classifiers for six modern block ciphers (AES, Blowfish, Camellia, DES, 3DES and IDEA).…”
Section: Related Workmentioning
confidence: 99%
“…In 2018, Mello and Jam found that the proposed algorithm can almost completely identify all selected ciphers by analysing ciphertext files encrypted by seven cipher algorithms, ARC4, Blowfish, DES, Rijdael, RSA, Serpent and Twofish under the two modes of ECB and CBC, indicating that the ECB mode has higher identification accuracy than CBC [9]. In 2019, Zhao et al proposed a cryptographic algorithm identification scheme based on randomness detection [10], which proved that randomness detection can effectively extract ciphertext features. In the same year, Arvind and Ram proposed a method for identifying and isolating image-encrypted communication traffic using bit-plane image features and fuzzy decision criteria that use the same key encryption [?…”
Section: Introductionmentioning
confidence: 99%
“…Related work Other works propose to distinguish between random numbers generated with block ciphers [2,9,11,14,15,25,29] of which a vast majority extract features coming from the statistical tests proposed by NIST (NIST STS) [5] and use them as inputs of ML algorithms. While the documen-tation provided by the NIST does not provide any formal security analysis [13], Woodgate et al [28] carry out an indepth security review.…”
Section: Introductionmentioning
confidence: 99%
“…To extract features from NIST STS to distinguish between random data generated from block ciphers, Zhao et al [29] use (SVM). They use OpenSSL to generate ciphertexts from AES, Camellia, Blowfish, DES, IDEA and TDEA algorithms.…”
Section: Introductionmentioning
confidence: 99%