Identifying traffic of same keys in cryptographic communications using fuzzy decision criteria and bit-plane measures

Abstract

The use of same keys for different messages is not safe in cryptography to secure cryptographic communications even if encryption algorithm is strong enough and possesses good cryptographic properties. Such communications can be analyzed to find meaningful information by cryptanalysts or adversaries. Use of same keys may happens if keys are not managed in cipher systems appropriately by customers. One should evaluate ciphers thoroughly and assure for non-repetition of keys prior to its usage for secure communications. The paper presents a methodology to identify and segregate traffic of cryptographic communications of images encrypted with same keys by exploiting bit-plane image characteristics and applying Fuzzy decision criteria. Results presented in the paper shows that the proposed Fuzzy classification method is able to identify images encrypted with same keys successfully and it seems very useful to consider for various pattern recognition and image analysis problems.

This is a preview of subscription content, access via your institution.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

References

  1. Asthana R, Sharma A, Ratan R, Verma N (2015) Classification of error-correcting coded data using multidimensional feature vectors. Adv Intell Syst Comput 336:303–312

    Google Scholar 

  2. Bezdek JC, Keller J, Krisnapuram R, Pal NR (2005) Fuzzy models and algorithms for pattern recognition and image processing, Rev edn. Springer, New York

    MATH  Google Scholar 

  3. Bouyer P et al (2011) Quantitative analysis of real-time systems. J Commn ACM 54(9):78–87

    Article  Google Scholar 

  4. Cusick TW, Stanica P (2009) Cryptographic Boolean functions and applications. Academic Press, Cambridge,

    MATH  Google Scholar 

  5. Din M, Ratan R, Bhateja AK, Bhateja A (2012) Multimedia classification using ANN approach. Adv Intell Syst Comput 236:905–910

    Google Scholar 

  6. Doane DP, Seward LE (2011) Measuring Skewness: a forgotten statistics. J Stat Educ 19(2):1–18

    Article  Google Scholar 

  7. George AG, Prabavathy AK (2013) A survey on different approaches used in image quality assessment. Int J Emerg Technol Adv Eng 3(2):197–203

    Google Scholar 

  8. Haddon JF, Boyce JF (1993) Co-occurrence matrices for image analysis. IEEE Electron Commun Eng J 5(2):71–83

    Article  Google Scholar 

  9. Huber P, Ronchetti E (2009) Robust statistics. Wiley, Hoboken

    Book  Google Scholar 

  10. Jain AK (1995) Fundamentals of digital image processing. Prentice Hall, Englewood Cliffs

    MATH  Google Scholar 

  11. Katzenbeisser S, Petitcolas FAP (2000) Information hiding techniques for steganography and digital watermarking. Artech House, Norwood

    Google Scholar 

  12. Keelan BW (2002) Handbook of image quality. Marcel Dekker Inc., New York

    Book  Google Scholar 

  13. Keerthi SS, Chapelle O, DeCoste D (2006) Building support vector machines with reduced classifier complexity. J Mach Learn Res 7:1493–1515

    MathSciNet  MATH  Google Scholar 

  14. Klein A (2013) Stream ciphers. Springer, London

    Book  Google Scholar 

  15. Lahouhou A, Viennet E, Beghdadi A (2010) Selecting low-level features for image quality assessment by statistical methods. J Comput Inform Tech 18(2):183–189

    Article  Google Scholar 

  16. Mc Cullough BD (2004) Wilkinson’s test and econometric software. J Econ Soc Meas 29:261–270

    Article  Google Scholar 

  17. Menezes A, Vanstone S, Van Oorschot P (1996) Handbook of applied cryptography. CRC Press, Boca Raton

    MATH  Google Scholar 

  18. Prakash S, Trivedi V, Ramteke M (2016) An elitist non-dominated sorting bat algorithm NSBAT-II for multiobjective optimization of phthalic anhydride reactor. J Syst Assur Eng Manag 7(3):299–315

    Article  Google Scholar 

  19. Prasad Mukesh, Li Dong-Lin, Lin Chin-Teng, Prakash Shiv, Singh Jagendra, Joshi Sudhanshu (2015) Designing mamdani-type fuzzy reasoning for visualizing prediction problems based on collaborative fuzzy clustering. IAENG Int J Comput Sci 42(4):404–411

    Google Scholar 

  20. Ratan R (2014) Applications of genetic algorithms in cryptology. Adv Intell Syst Comput 258:281–291

    Google Scholar 

  21. Ratan R, Arvind (2019) Bit-plane specific measures and its applications in analysis of image ciphers. Commun Comput Inf Sci 968:282–297

    Google Scholar 

  22. Ratan R, Veni Madhavan CE (2002) Steganography based information security. IETE Tech Rev 19(4):213–219

    Article  Google Scholar 

  23. Renu, Ravi, Ratan R (2012) Live traffic english text monitoring using fuzzy approach. Adv Intell Syst Comput 236:911–918

    Google Scholar 

  24. Rueppel RA (1986) Analysis and design of stream ciphers. Springer, Berlin

    Book  Google Scholar 

  25. Sadkhan SB, Abbas NA (2013) Watermarked and noisy images identification based on statistical evaluation parameters. J Zankoy Sulaimani-Part A 15(3):159–168

    Article  Google Scholar 

  26. Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656–715

    MathSciNet  Article  Google Scholar 

  27. Simon KS, Omura JK, Scholtz RA, Levitt BK (1994) Spread spectrum communications handbook. McGraw-Hill, New York

    Google Scholar 

  28. Stallings W (2011) Cryptography and network security. Prentice Hall, Englewood Cliffs

    Google Scholar 

  29. Stinson DR (1994) Decomposition constructions for secret sharing schemes. IEEE Trans Inf Theory 40(1):118–125

    MathSciNet  Article  Google Scholar 

  30. Streijl RC, Winkler S, Hands DS (2016) Mean opinion score (MOS) revisited: methods and applications, limitations and alternatives. Multimed Syst 22(2):213–227

    Article  Google Scholar 

  31. Teimouri M, Motlagh HK, (2017) Reverse engineering of communications networks: evolution and challenges. arXiv preprint arXiv:1704.05432 - arxiv.org

  32. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612

    Article  Google Scholar 

  33. Zadeh LA (1965) Fuzzy sets. Inf Control 8(3):338–353

    Article  Google Scholar 

  34. Zhou W, Bovik AC (2009) Mean squared error: love it or leave it? A new look at signal fidelity measures. Signal Process Mag IEEE 26(1):98–117

    Article  Google Scholar 

  35. Zimmermann HJ (1987) Fuzzy sets. Decision making and expert systems. Kluwer, Boston

    Book  Google Scholar 

Download references

Author information

Affiliations

Authors

Corresponding author

Correspondence to Ram Ratan.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Arvind, Ratan, R. Identifying traffic of same keys in cryptographic communications using fuzzy decision criteria and bit-plane measures. Int J Syst Assur Eng Manag 11, 466–480 (2020). https://doi.org/10.1007/s13198-019-00878-7

Download citation

Keywords

  • Bit-plane measures
  • Classification
  • Cryptography
  • Fuzzy criteria
  • Pattern recognition
  • Secure communication
  • Soft computing
  • Traffic analysis