Abstract
The task of identification of encryption algorithm from cipher text alone is considered to be a challenging one. Very few works have been done in this area by considering block ciphers or symmetric key ciphers. In this paper, we propose an approach for identification of encryption algorithm for various ciphers using the decision tree generated by C4.5 algorithm. A system which extracts eight features from a cipher text and classifies the encryption algorithm using the C4.5 classifier is developed. Success rate of this proposed method is in the range of 70 to 75 percentages.
This work is a part of the Collaborative Directed Basic Research on Smart and Secure Environment project, funded by NTRO, New Delhi, India.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Albassal, A.M.B., Wahdan, A.-M.A.: Neural network based cryptanalysis of a Fiestel type block cipher. In: Proceedings of IEEE International Conference on Electrical, Electronic and Computer Engineering, ICEEC 2004, pp. 231–237 (September 2004)
Albassal, A.M.B., Wahdan, A.-M.A.: Genetic algorithm based cryptanalysis of a Fiestel type block cipher. In: Proceedings of IEEE International Conference on Electrical, Electronic and Computer Engineering, ICEEC 2004, pp. 217–221 (September 2004)
Dileep, A.D., Chandra Sekhar, C.: Identification of Block Ciphers using Support Vector Machines. In: Proceedings of International Joint Conference on Neural Networks, Vancouver, BC, Canada (July 2006)
Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification, 2nd edn. (2004)
Saxena, G.: Classification of Ciphers using Machine Learning. Master Thesis, Indian Institute of Technology, Kanpur (July 2008)
Jones, G.A., Jones, J.M.: Information and Coding theory. Springer, Heidelberg (2004)
Dunham, J.G., Sun, M.-T., Tseng, J.C.R.: Classifying File Type of Stream Ciphers in Depth Using Neural Networks. IEEE, Los Alamitos (2005)
Liu, H., Setiono, R.: Chi2: Feature selection and discretization of numeric attributes. In: Proc. IEEE 7th International Conference on Tools with Artificial Intelligence, pp. 338–391 (1995)
Lin, F.-T., Kao, C.-Y.: A genetic algorithm for cipher text-only attack in cryptanalysis. In: Proceedings of IEEE International Conference on Systems, Man and Cybernetics, vol. 1, pp. 650–654 (1995)
Williams, N., Zander, S., Armitage, G.: A Preliminary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traffic Flow Classification. Swinburne University of Technology. ACM SIGCOMM Computer Communication Review 36(5) (October 2006)
Quinlan, J.R.: C4.5: Programs for Machine Learning. Morgan Kaufmann Publishers, San Francisco (1993)
Seibt, P.: Algorithmic Information Theory. Springer, Heidelberg, ISBN 3-540-33218-9
Ruggieri, S.: Efficient C4.5. IEEE Transactions on Knowledge and Data Engineering 14(2) (March 2002)
Korting, T.S.: C4.5 algorithm and Multivariate Decision Tress. Image Proecession Division, National Institute for Space Research, Brazil
Shi, Z.: Principles of Machine learning. International Academic Publishers (1992)
SmartSec ECC encryptor tool, http://smartsec.com.br/
Weka: Waikato Environment for Knowledge Analysis Version 3.6.0. The University of Waikato, Hamilton New Zealand (1999-2008)
Prof. Bernhard Esslinger and CrypTool-Team, http://www.cryptool.com
Yand, Y., Pedersen, J.: A comparative study on feature selection in text categorization. In: ICML 1997, pp. 412–420 (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Manjula, R., Anitha, R. (2011). Identification of Encryption Algorithm Using Decision Tree. In: Meghanathan, N., Kaushik, B.K., Nagamalai, D. (eds) Advanced Computing. CCSIT 2011. Communications in Computer and Information Science, vol 133. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17881-8_23
Download citation
DOI: https://doi.org/10.1007/978-3-642-17881-8_23
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17880-1
Online ISBN: 978-3-642-17881-8
eBook Packages: Computer ScienceComputer Science (R0)