Abstract
Cryptographic algorithms classification, which can detect the underlying encryption algorithm on sufficient large ciphertexts, is essential to encrypted traffic analysis and protocol compliance detection. Previous studies have typically employed various feature quantities and models for feature learning in analyzing encryption algorithms. Unlike these, this work performs a broader feature selection and extracts features from the P-values of the randomness test and their data distributions for different block cipher algorithms. This work utilizes the LightGBM framework to focus on block cipher algorithms classification in ECB mode. It takes six algorithms to test the classification scheme, including AES-128, AES-192, AES-256, DES, 3DES and SM4, with an average accuracy of 82%. To compare the accuracy, this work analyzes the influence weights of random features and experiments with the classification accuracy of different schemes on the same ciphertext blocks. The experiment results show that our scheme is effective in classifying block ciphers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Al Daoud, E.: Comparison between XGBoost, LightGBM and CatBoost using a home credit dataset. Int. J. Comput. Inf. Eng. 13(1), 6–10 (2019)
Benadjila, R., Khati, L., Vergnaud, D.: Secure storage-confidentiality and authentication. Comput. Sci. Rev. 44, 100465 (2022)
Benamira, A., Gerault, D., Peyrin, T., Tan, Q.Q.: A deeper look at machine learning-based cryptanalysis. In: Canteaut, A., Standaert, F.-X. (eds.) EUROCRYPT 2021. LNCS, vol. 12696, pp. 805–835. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-77870-5_28
Bentéjac, C., Csörgő, A., Martínez-Muñoz, G.: A comparative analysis of gradient boosting algorithms. Artif. Intell. Rev. 54, 1937–1967 (2021)
Bogos, C.E., Mocanu, R., Simion, E.: A remark on NIST SP 800–22 serial test. Cryptology ePrint Archive (2022)
Burgos-Artizzu, X.P., Dollár, P., Lin, D., Anderson, D.J., Perona, P.: Social behavior recognition in continuous video. In: 2012 IEEE Conference on Computer Vision and Pattern Recognition, pp. 1322–1329. IEEE (2012)
Devi, M., Majumder, A.: Side-channel attack in internet of things: a survey. In: Mandal, J.K., Mukhopadhyay, S., Roy, A. (eds.) Applications of Internet of Things. LNNS, vol. 137, pp. 213–222. Springer, Singapore (2021). https://doi.org/10.1007/978-981-15-6198-6_20
Dileep, A.D., Sekhar, C.C.: Identification of block ciphers using support vector machines. In: The 2006 IEEE International Joint Conference on Neural Network Proceedings, pp. 2696–2701. IEEE (2006)
Draper-Gil, G., Lashkari, A.H., Mamun, M.S.I., Ghorbani, A.A.: Characterization of encrypted and VPN traffic using time-related. In: Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP), pp. 407–414 (2016)
Elashry, I.F., Allah, O., Abbas, A.M., El-Rabaie, S.: A new diffusion mechanism for data encryption in the ECB mode. In: IEEE (2010)
Griffin, G., Holub, A., Perona, P.: Caltech-256 object category dataset (2007)
Hu, X., Zhao, Y.: Block ciphers classification based on random forest. In: Journal of Physics: Conference Series, vol. 1168, p. 032015. IOP Publishing (2019)
Huang, L., Zhao, Z., Zhao, Y.: A two-stage cryptosystem recognition scheme based on random forest. Chin. J. Comput. 41(2), 382–399 (2018)
Ji, W., Li, Y., Qin, B.: ldentification of SM4 block cipher system based on random features. Appl. Res. Comput. (2021)
Kaur, S., Randhawa, S.: Dark web: a web of crimes. Wirel. Pers. Commun. 112, 2131–2158 (2020)
Ke, G., et al.: LightGBM: a highly efficient gradient boosting decision tree. In: Advances in Neural Information Processing Systems, vol. 30 (2017)
Liu, C., He, L., Xiong, G., Cao, Z., Li, Z.: FS-Net: a flow sequence network for encrypted traffic classification. In: IEEE INFOCOM 2019-IEEE Conference On Computer Communications, pp. 1171–1179. IEEE (2019)
Manfredi, S., Ranise, S., Sciarretta, G.: Lost in TLS? no more! assisted deployment of secure TLS configurations. In: Foley, S.N. (ed.) DBSec 2019. LNCS, vol. 11559, pp. 201–220. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-22479-0_11
Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E.: A statistical test suite for random and pseudorandom number generators for cryptographic applications. Technical report, Booz-allen and hamilton inc mclean va (2001)
Sharif, S.O., Kuncheva, L., Mansoor, S.: Classifying encryption algorithms using pattern recognition techniques. In: 2010 IEEE International Conference on Information Theory and Information Security, pp. 1168–1172. IEEE (2010)
Shen, M., Zhang, J., Zhu, L., Xu, K., Du, X.: Accurate decentralized application identification via encrypted traffic analysis using graph neural networks. IEEE Trans. Inf. Forensics Secur. 16, 2367–2380 (2021)
Sun, X., Liu, M., Sima, Z.: A novel cryptocurrency price trend forecasting model based on LightGBM. Financ. Res. Lett. 32, 101084 (2020)
Swapna, S., Dileep, A., Sekhar, C.C., Kant, S.: Block cipher identification using support vector classification and regression. J. Discr. Math. Sci. Crypt. 13(4), 305–318 (2010)
Tan, C., Deng, X., Zhang, L.: Identification of block ciphers under CBC mode. Procedia Comput. Sci. 131, 65–71 (2018)
Usmonov, M.: Fundamentals of Symmetric Cryptosystem. Scienceweb Academic Papers Collection (2021)
Wu, Y., Wang, T., Xing, M., Li, J.: Block ciphers identification scheme based on the distribution character of randomness test values of ciphertext. J. Commun. 36(4), 146–155 (2015)
Xing, M., Wu, Y., Wang, T., Li, J.: Identification of encrypted bit stream based on runs test and fast Fourier transform. Comput. Sci. 42(1), 164–169 (2015)
Yu, X., Shi, K.: Block ciphers identification scheme based on randomness test. In: 6th International Workshop on Advanced Algorithms and Control Engineering (IWAACE 2022), vol. 12350, pp. 375–380. SPIE (2022)
Yuan, K., Huang, Y., Li, J., Jia, C., Yu, D.: A block cipher algorithm identification scheme based on hybrid random forest and logistic regression model. In: Neural Processing Letters, pp. 1–19 (2022)
Zhang, W., Zhao, Y., Fan, S.: Cryptosystem identification scheme based on ascii code statistics. Secur. Commun. Netw. 2020, 1–10 (2020)
Zhao, Z., Zhao, Y., Liu, F.: Scheme of block ciphers recognition based on randomness test. J. Cryptol. Res. 6(2), 177–190 (2018)
Acknowledgments
This research was supported by the Key Research and Development Program Project of Shandong Province under grants No. 2020CXGC010115.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Liu, S., Luo, M., Peng, C., He, D. (2023). Block Ciphers Classification Based on Randomness Test Statistic Value via LightGBM. In: Wang, D., Yung, M., Liu, Z., Chen, X. (eds) Information and Communications Security. ICICS 2023. Lecture Notes in Computer Science, vol 14252. Springer, Singapore. https://doi.org/10.1007/978-981-99-7356-9_3
Download citation
DOI: https://doi.org/10.1007/978-981-99-7356-9_3
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-7355-2
Online ISBN: 978-981-99-7356-9
eBook Packages: Computer ScienceComputer Science (R0)