Intelligent Identification of Cryptographic Ciphers using Machine Learning Techniques

PDF (1875KB), PP.20-39

Views: 0 Downloads: 0

Author(s)

Subinoy Sikdar 1,* Malay Kule 1

1. Department of Computer Science and Technology, Indian Institute of Engineering Science and Technology, Shibpur, Howrah, 711103, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijisa.2024.06.02

Received: 17 Jan. 2024 / Revised: 24 Jul. 2024 / Accepted: 20 Sep. 2024 / Published: 8 Dec. 2024

Index Terms

Cryptanalysis, Ciphertext, Punched Tape, CNN, Transformers, BERT

Abstract

This research work demonstrates cipher-type identification methods using machine learning algorithms. Cipher-type identification is a recent research interest to do better cryptanalysis of an encryption algorithm in a minimal time. Along with the increased security issues, obfuscation is being used with encryption algorithms to keep them hidden. This is when the ciphertext identification challenge came into play. The ciphertext classification challenge was performed using both image processing and natural language processing methods. For image processing purposes, CNN was utilized; whereas text-CNN, transformers and BERT models were used as natural language processing tools. In order to train the proposed machine learning based classification models, two types of datasets were generated: image data and text data. This study compares the experimental outcomes derived from various architectural CNN, Transformer, and BERT models. We also present a comparative study of our research work with another research works which are done in the recent past. The proposed BERT model is found to be the most efficient model for the correct classification of ciphertext over other transformer and CNN-based classification models. This work will surely help the cryptanalyst to perform cryptanalysis of an encryption algorithm in a minimal time.

Cite This Paper

Subinoy Sikdar, Malay Kule, "Intelligent Identification of Cryptographic Ciphers using Machine Learning Techniques", International Journal of Intelligent Systems and Applications(IJISA), Vol.16, No.6, pp.20-39, 2024. DOI:10.5815/ijisa.2024.06.02

Reference

[1]Forouzan, B.A.: Cryptography and Network Security. Tata McGraw-Hill, New Delhi (2007).
[2]Atul Kahate, “Cryptography and Network Security,” McGraw Hill Education (India) Private Limited (2017).
[3]William Stallings, “Cryptography and Network Security: Principles and Practice,” Pearson (2017).
[4]Gustavus J. Simmons, "Cryptanalysis: A Survey of Recent Results," in Contemporary Cryptology: The Science of Information Integrity, IEEE, pp.501-540, 1992.
[5]Feng-Tse Lin and Cheng-Yan Kao, "A genetic algorithm for ciphertext-only attack in cryptanalysis," 1995 IEEE International Conference on Systems, Man and Cybernetics. Intelligent Systems for the 21st Century, Vancouver, BC, Canada, pp. 650-654 vol.1, 1995. DOI:10.1109/ICSMC.1995.537837
[6]D. Gautam, C. Agrawal, P. Sharma, M. Mehta and P. Saini, "An Enhanced Cipher Technique Using Vigenere and Modified Caesar Cipher," 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI), Tirunelveli, India, pp. 1-9, 2018. DOI:10.1109/ICOEI.2018.8553910
[7]Banerjee, A., Hasan, M., Kafle, H., Secure Cryptosystem Using Randomized Rail Fence Cipher for Mobile Devices. In: Arai, K., Bhatia, R., Kapoor, S. (eds) Intelligent Computing. Advances in Intelligent Systems and Computing, vol 998. pp.737-750, Springer, Cham, 2019. DOI: 10.1007/978-3-030-22868-2_52
[8]M. F. Uddin and A. M. Youssef, "Cryptanalysis of Simple Substitution Ciphers Using Particle Swarm Optimization," IEEE International Conference on Evolutionary Computation, Vancouver, BC, Canada, pp. 677-680, 2006. DOI: 10.1109/CEC.2006.1688376
[9]E. Ahmadzadeh, H. Kim, O. Jeong, N. Kim and I. Moon, "A Deep Bidirectional LSTM-GRU Network Model for Automated Ciphertext Classification," in IEEE Access, vol. 10, pp. 3228-3237, 2022. DOI: 10.1109/ACCESS.2022.3140342
[10]Abd, Ahmed J. and Al-Janabi, Sufyan, “Classification and Identification of Classical Cipher Type Using Artificial Neural Networks”, Journal of Engineering and Applied Sciences, Vol. 14, No. 11, pp. 3549-3556, 2019.
[11]S. O. Sharif, L. I. Kuncheva and S. P. Mansoor, "Classifying encryption algorithms using pattern recognition techniques", IEEE International Conference on Information Theory and Information Security, pp. 1168-1172, 2010. DOI: 10.1109/ICITIS.2010.5689769
[12]Y. Chuxuan, "Cryptosystem Recognition Scheme Based on Convolution Features", International Conference on Artificial Intelligence, Big Data and Algorithms (CAIBDA), pp. 229-232, 2021. DOI: 10.1109/CAIBDA53561.2021.00055
[13]Leierzopf, E., Mikhalev, V., Kopal, N., Esslinger, B., Lampesberger, H., Hermann, E., “Detection of Classical Cipher Types with Feature-Learning Approaches”, Communications in Computer and Information Science, vol 1504. Springer, Singapore, 2021. DOI: 10.1007/978-981-16-8531-6_11
[14]Kopal, Nils. "Of ciphers and neurons–detecting the type of ciphers using artificial neural networks." In Proceedings of the 3rd International Conference on Historical Cryptology HistoCrypt, no. 171, pp. 77-86. 2020.
[15]Mantin, I., Shamir, A., “A Practical Attack on Broadcast RC4”, In: Matsui, M. (eds) Fast Software Encryption. FSE, Lecture Notes in Computer Science, vol 2355. Springer, Berlin, Heidelberg, 2002. DOI: 10.1007/3-540-45473-X_13
[16]Simon Heron, Advanced Encryption Standard (AES), Network Security, Volume 2009, Issue 12, Pages 8-12, ISSN 1353-4858, 2009. DOI: 10.1016/S1353-4858(10)70006-4
[17]Sikdar Subinoy, and Malay Kule. "A New Technique of Cipher Type Identification Using Convolutional Neural Networks." In International Conference on Computational Intelligence in Pattern Recognition, pp. 1-16. Singapore: Springer Nature Singapore, 2022. DOI:10.1007/978-981-99-3734-9_1
[18]Nielsen, Michael A. Neural networks and deep learning. Vol. 25. San Francisco, CA, USA: Determination press, 2015.
[19]Maxfield, Clive., "How it was: Paper tapes and punched cards". EE Times, 13 October 2011.
[20]"Tale of the Tape". National Security Agency Central Security Service. 3 May 2016. Retrieved 16 June 2014.
[21]Shannon, C.E., "Communication Theory of Secrecy Systems", Bell System Technical Journal, 28 (4): 656–715, October 1949.
[22]M. Sandler, A. Howard, M. Zhu, A. Zhmoginov and L. -C. Chen, "MobileNetV2: Inverted Residuals and Linear Bottlenecks", IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 4510-4520, 2018. DOI: 10.1109/CVPR.2018.00474
[23]Khan, Salman, Muzammal Naseer, Munawar Hayat, Syed Waqas Zamir, Fahad Shahbaz Khan, and Mubarak Shah. "Transformers in vision: A survey." ACM computing surveys (CSUR) vol. 54, issue. 10s, pp. 1-41. DOI: 10.1145/3505244
[24]Lin, Tianyang, Yuxin Wang, Xiangyang Liu, and Xipeng Qiu. "A survey of transformers." AI Open, vol. 3, pp. 111-132, 2022. DOI: 10.1016/j.aiopen.2022.10.001
[25]Vaswani, A., Shazeer, N., Parmar, N., Uszkoreit, J., Jones, L., Gomez, A.N., Kaiser, L., Polosukhin, I.: “Attention is all you need”, 2017.
[26]Alammary, Ali Saleh. "BERT models for Arabic text classification: a systematic review." Applied Sciences 12, no. 11: 5720, 2022. DOI: 10.3390/app12115720
[27]Yu, Shanshan, Jindian Su, and Da Luo. "Improving bert-based text classification with auxiliary sentence and domain knowledge", IEEE Access, vol.  7, pp. 176600-176612, 2019. DOI: 10.1109/ACCESS.2019.2953990