{"title":"密文模式分析:一种组合方法","authors":"Shivendra Mishra, A. Bhattacharjya","doi":"10.1109/ICRTIT.2013.6844236","DOIUrl":null,"url":null,"abstract":"In this paper, we propose and implement a combined approach for identification of a given unknown sample of cipher text. In the first part of system, cipher text samples are generated randomly using different cipher algorithms. In the second part; the system analyses sample through a) Block Length/stream Detection b) Entropy/Reoccurrence Analysis c) Dictionary and Decision tree based approach. All these blocks analyzethe sample simultaneously. The block length/stream detection is done through counting the block length and by comparing to known sample's patterns. Whereas, the Entropy/reoccurrence analysis and Dictionary-Decision tree based approaches are done through the large data set characterization. At last, in the third part; the different block results are compared and result is generated. Finally, we analyze the system with unknown ciphertext samplesof AES, DES and Blow Fish, which is generated in random fashion and given as input to the system.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":"{\"title\":\"Pattern analysis of cipher text: A combined approach\",\"authors\":\"Shivendra Mishra, A. Bhattacharjya\",\"doi\":\"10.1109/ICRTIT.2013.6844236\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we propose and implement a combined approach for identification of a given unknown sample of cipher text. In the first part of system, cipher text samples are generated randomly using different cipher algorithms. In the second part; the system analyses sample through a) Block Length/stream Detection b) Entropy/Reoccurrence Analysis c) Dictionary and Decision tree based approach. All these blocks analyzethe sample simultaneously. The block length/stream detection is done through counting the block length and by comparing to known sample's patterns. Whereas, the Entropy/reoccurrence analysis and Dictionary-Decision tree based approaches are done through the large data set characterization. At last, in the third part; the different block results are compared and result is generated. Finally, we analyze the system with unknown ciphertext samplesof AES, DES and Blow Fish, which is generated in random fashion and given as input to the system.\",\"PeriodicalId\":113531,\"journal\":{\"name\":\"2013 International Conference on Recent Trends in Information Technology (ICRTIT)\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-07-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"15\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 International Conference on Recent Trends in Information Technology (ICRTIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICRTIT.2013.6844236\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICRTIT.2013.6844236","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Pattern analysis of cipher text: A combined approach
In this paper, we propose and implement a combined approach for identification of a given unknown sample of cipher text. In the first part of system, cipher text samples are generated randomly using different cipher algorithms. In the second part; the system analyses sample through a) Block Length/stream Detection b) Entropy/Reoccurrence Analysis c) Dictionary and Decision tree based approach. All these blocks analyzethe sample simultaneously. The block length/stream detection is done through counting the block length and by comparing to known sample's patterns. Whereas, the Entropy/reoccurrence analysis and Dictionary-Decision tree based approaches are done through the large data set characterization. At last, in the third part; the different block results are compared and result is generated. Finally, we analyze the system with unknown ciphertext samplesof AES, DES and Blow Fish, which is generated in random fashion and given as input to the system.