{"title":"一种从密文中识别密码算法的方法","authors":"Cheng Tan, Qingbing Ji","doi":"10.1109/ICCSN.2016.7586649","DOIUrl":null,"url":null,"abstract":"Cryptographic algorithm plays a significant role in a cryptosystem, which protects those sensitive and private data from been obtained by some malicious attackers. Actually, the details about the cryptographic algorithm applied in a cryptosystem are often unknown to one cryptanalyst. When a cryptanalyst works on cryptanalysis, he will have much trouble if he doesn't know anything about the used cryptographic algorithm. In this paper, we introduce an approach to identifying the cryptographic algorithm with no other information but ciphertext. Firstly, we present the whole implementation architecture of our identification system. Then we apply our identification system in identifying 5 common block ciphers, namely AES, Blowfish, 3DES, RC5 and DES. Through analyzing the experiment results, we conclude that the identification rate can obtain around 90% if keys are the same for training and testing ciphertexts. When we use different keys for training and testing ciphertexts, we can still identify AES from anyone of the other 4 cryptographic algorithms with a high identification rate in one to one identification.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"18","resultStr":"{\"title\":\"An approach to identifying cryptographic algorithm from ciphertext\",\"authors\":\"Cheng Tan, Qingbing Ji\",\"doi\":\"10.1109/ICCSN.2016.7586649\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cryptographic algorithm plays a significant role in a cryptosystem, which protects those sensitive and private data from been obtained by some malicious attackers. Actually, the details about the cryptographic algorithm applied in a cryptosystem are often unknown to one cryptanalyst. When a cryptanalyst works on cryptanalysis, he will have much trouble if he doesn't know anything about the used cryptographic algorithm. In this paper, we introduce an approach to identifying the cryptographic algorithm with no other information but ciphertext. Firstly, we present the whole implementation architecture of our identification system. Then we apply our identification system in identifying 5 common block ciphers, namely AES, Blowfish, 3DES, RC5 and DES. Through analyzing the experiment results, we conclude that the identification rate can obtain around 90% if keys are the same for training and testing ciphertexts. When we use different keys for training and testing ciphertexts, we can still identify AES from anyone of the other 4 cryptographic algorithms with a high identification rate in one to one identification.\",\"PeriodicalId\":158877,\"journal\":{\"name\":\"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)\",\"volume\":\"24 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-06-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"18\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCSN.2016.7586649\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCSN.2016.7586649","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An approach to identifying cryptographic algorithm from ciphertext
Cryptographic algorithm plays a significant role in a cryptosystem, which protects those sensitive and private data from been obtained by some malicious attackers. Actually, the details about the cryptographic algorithm applied in a cryptosystem are often unknown to one cryptanalyst. When a cryptanalyst works on cryptanalysis, he will have much trouble if he doesn't know anything about the used cryptographic algorithm. In this paper, we introduce an approach to identifying the cryptographic algorithm with no other information but ciphertext. Firstly, we present the whole implementation architecture of our identification system. Then we apply our identification system in identifying 5 common block ciphers, namely AES, Blowfish, 3DES, RC5 and DES. Through analyzing the experiment results, we conclude that the identification rate can obtain around 90% if keys are the same for training and testing ciphertexts. When we use different keys for training and testing ciphertexts, we can still identify AES from anyone of the other 4 cryptographic algorithms with a high identification rate in one to one identification.