Skip to main content

Identification of Encryption Algorithm Using Decision Tree

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 133))

Abstract

The task of identification of encryption algorithm from cipher text alone is considered to be a challenging one. Very few works have been done in this area by considering block ciphers or symmetric key ciphers. In this paper, we propose an approach for identification of encryption algorithm for various ciphers using the decision tree generated by C4.5 algorithm. A system which extracts eight features from a cipher text and classifies the encryption algorithm using the C4.5 classifier is developed. Success rate of this proposed method is in the range of 70 to 75 percentages.

This work is a part of the Collaborative Directed Basic Research on Smart and Secure Environment project, funded by NTRO, New Delhi, India.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Albassal, A.M.B., Wahdan, A.-M.A.: Neural network based cryptanalysis of a Fiestel type block cipher. In: Proceedings of IEEE International Conference on Electrical, Electronic and Computer Engineering, ICEEC 2004, pp. 231–237 (September 2004)

    Google Scholar 

  2. Albassal, A.M.B., Wahdan, A.-M.A.: Genetic algorithm based cryptanalysis of a Fiestel type block cipher. In: Proceedings of IEEE International Conference on Electrical, Electronic and Computer Engineering, ICEEC 2004, pp. 217–221 (September 2004)

    Google Scholar 

  3. Dileep, A.D., Chandra Sekhar, C.: Identification of Block Ciphers using Support Vector Machines. In: Proceedings of International Joint Conference on Neural Networks, Vancouver, BC, Canada (July 2006)

    Google Scholar 

  4. Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification, 2nd edn. (2004)

    Google Scholar 

  5. Saxena, G.: Classification of Ciphers using Machine Learning. Master Thesis, Indian Institute of Technology, Kanpur (July 2008)

    Google Scholar 

  6. Jones, G.A., Jones, J.M.: Information and Coding theory. Springer, Heidelberg (2004)

    MATH  Google Scholar 

  7. Dunham, J.G., Sun, M.-T., Tseng, J.C.R.: Classifying File Type of Stream Ciphers in Depth Using Neural Networks. IEEE, Los Alamitos (2005)

    Book  Google Scholar 

  8. Liu, H., Setiono, R.: Chi2: Feature selection and discretization of numeric attributes. In: Proc. IEEE 7th International Conference on Tools with Artificial Intelligence, pp. 338–391 (1995)

    Google Scholar 

  9. Lin, F.-T., Kao, C.-Y.: A genetic algorithm for cipher text-only attack in cryptanalysis. In: Proceedings of IEEE International Conference on Systems, Man and Cybernetics, vol. 1, pp. 650–654 (1995)

    Google Scholar 

  10. Williams, N., Zander, S., Armitage, G.: A Preliminary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traffic Flow Classification. Swinburne University of Technology. ACM SIGCOMM Computer Communication Review 36(5) (October 2006)

    Google Scholar 

  11. Quinlan, J.R.: C4.5: Programs for Machine Learning. Morgan Kaufmann Publishers, San Francisco (1993)

    Google Scholar 

  12. Seibt, P.: Algorithmic Information Theory. Springer, Heidelberg, ISBN 3-540-33218-9

    Google Scholar 

  13. Ruggieri, S.: Efficient C4.5. IEEE Transactions on Knowledge and Data Engineering 14(2) (March 2002)

    Google Scholar 

  14. Korting, T.S.: C4.5 algorithm and Multivariate Decision Tress. Image Proecession Division, National Institute for Space Research, Brazil

    Google Scholar 

  15. Shi, Z.: Principles of Machine learning. International Academic Publishers (1992)

    Google Scholar 

  16. SmartSec ECC encryptor tool, http://smartsec.com.br/

  17. Weka: Waikato Environment for Knowledge Analysis Version 3.6.0. The University of Waikato, Hamilton New Zealand (1999-2008)

    Google Scholar 

  18. Prof. Bernhard Esslinger and CrypTool-Team, http://www.cryptool.com

  19. Yand, Y., Pedersen, J.: A comparative study on feature selection in text categorization. In: ICML 1997, pp. 412–420 (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Manjula, R., Anitha, R. (2011). Identification of Encryption Algorithm Using Decision Tree. In: Meghanathan, N., Kaushik, B.K., Nagamalai, D. (eds) Advanced Computing. CCSIT 2011. Communications in Computer and Information Science, vol 133. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17881-8_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17881-8_23

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17880-1

  • Online ISBN: 978-3-642-17881-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics