Work place: Department of Computer Science and Technology, Indian Institute of Engineering Science and Technology, Shibpur, Howrah, 711103, India
E-mail: subinoysikdar.jume2019@gmail.com
Website:
Research Interests:
Biography
Subinoy Sikdar received his B.E. degree in Information Technology from University Institute of Technology, Burdwan University, India in 2018 and M.E. degree in Information Technology from Jadavpur University, India in 2021. He is currently pursuing PhD at the Department of Computer Science and Technology, Indian Institute of Engineering Science and Technology, Shibpur, India. His areas of interest are cryptology, cryptanalysis, machine learning and soft computing.
DOI: https://doi.org/10.5815/ijisa.2024.06.02, Pub. Date: 8 Dec. 2024
This research work demonstrates cipher-type identification methods using machine learning algorithms. Cipher-type identification is a recent research interest to do better cryptanalysis of an encryption algorithm in a minimal time. Along with the increased security issues, obfuscation is being used with encryption algorithms to keep them hidden. This is when the ciphertext identification challenge came into play. The ciphertext classification challenge was performed using both image processing and natural language processing methods. For image processing purposes, CNN was utilized; whereas text-CNN, transformers and BERT models were used as natural language processing tools. In order to train the proposed machine learning based classification models, two types of datasets were generated: image data and text data. This study compares the experimental outcomes derived from various architectural CNN, Transformer, and BERT models. We also present a comparative study of our research work with another research works which are done in the recent past. The proposed BERT model is found to be the most efficient model for the correct classification of ciphertext over other transformer and CNN-based classification models. This work will surely help the cryptanalyst to perform cryptanalysis of an encryption algorithm in a minimal time.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals