Abstract
Distinguishing analysis is an important part of cryptanalysis. It is an important content of discriminating analysis that how to identify ciphertext is encrypted by which cryptosystems when it knows only ciphertext. In this paper, Fisher’s discriminant analysis (FDA), which is based on statistical method and machine learning, is used to identify 4 stream ciphers and 7 block ciphers one to one by extracting 9 different features. The results show that the accuracy rate of the FDA can reach 80% when identifying files that are encrypted by the stream cipher and the block cipher in ECB mode respectively, and files encrypted by the block cipher in ECB mode and CBC mode respectively. The average one to one identification accuracy rates of stream ciphers RC4, Grain, Sosemanuk are more than 55%. The maximum accuracy rate can reach 60% when identifying SMS4 from block ciphers in CBC mode one to one. The identification accuracy rate of entropy-based features is apparently higher than the probability-based features.
Article PDF
Avoid common mistakes on your manuscript.
References
D. Feng and D. Pei, Cryptology guidance, (Science Press, Beijing, China, 1994).
B. Xi, Cryptology, (Information Engineer University, 2003).
C. Tan and Q. Ji, An approach to identifying cryptographic algorithm from ciphertext, (IEEE International Conference on Communication Software and Networks, 8, 2016), pp. 19–23.
S. O. Sharif and et al, Classifying encryption algorithms using pattern recognition techniques, (IEEE International Conference on Information Theory and Information Security, 2010), pp. 1168–1172.
Y. Wu and et al, Block ciphers identification scheme based on the distribution character of randomness test values of ciphertext, (Journal on Communications, 36, 2015), pp. 146–155.
J. G. Dunham and et al, Classifying file type of stream ciphers in depth using neural networks, (IEEE International Conference on Computer Systems and Applications, 2005), pp. 97–103.
S. Mishra and A. Bhattacharjya, Pattern analysis of cipher text: a combined approach, (International Conference on Recent Trends in Information Technology, 2013), pp. 393–398.
A. D. Dileep and C. C. Sekhar, Identification of block ciphers using support vector machines, (International Joint Conference on Neural Networks, 2006), pp. 2696–2701.
R. Manjula and R. Anitha, Identification of encryption algorithm using decision tree, (First International Conference on Computer Science and Information Technology, 2011), pp. 237–246.
A. E. Cortizo and et al, Application of Fisher linear discriminant analysis to speech/music classification, (The International Conference on IEEE, 2, 2005), pp. 1666–1669.
T. Cooke, Two variations on Fisher’s linear discriminant for pattern recognition, (IEEE Trans. Pattern Anal. Mach. Intelligence, 24, 2002), pp. 268–273.
Z. Liang and et al, Two-dimensional Fisher discriminant analysis and its application to face recognition, (In Computer Vision ACCV Springer, 2006), pp. 130–139.
P. K. Ray and et al, Classification of encryption algorithms using Fisher’s discriminant analysis, (Defence Science Journal, 67, 2017), pp. 59–65.
J. Fan and C. Mei, Data Analysis, (Science Press, Beijing, China, 2010).
H. Gao, Application of Multivariate Statistical Analysis, (Peking University Press, Beijing, China, 2005).
A. R. Webb and K. D. Copsey, Statistical Pattern Recognition, (Electronic Industry Press, Beijing, China, 2015).
X. Zhang, Pattern Recognition, (Tsinghua University Press, Beijing, China, 2010).
G. Griffin and et al, Caltech-256 Object Category Dataset, (Califonia Institute of Technology, 2007).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
This is an open access article under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
About this article
Cite this article
Hu, X., Zhao, Y. One to One Identification of Cryptosystem Using Fisher’s Discriminant Analysis. Int J Netw Distrib Comput 6, 155–173 (2018). https://doi.org/10.2991/ijndc.2018.6.3.4
Published:
Issue Date:
DOI: https://doi.org/10.2991/ijndc.2018.6.3.4