Unlock instant, AI-driven research and patent intelligence for your innovation.

A cryptographic algorithm identification method and system based on ciphertext only

A technology of cryptographic algorithm and identification method, applied in the field of cryptographic algorithm identification method and system based on ciphertext only, can solve the problem that the ciphertext data does not conform to the actual situation, the algorithm parameters are not specified, and other valuable research contents are not found and expanded. and other problems, to achieve the effect of high level of automatic analysis, strong feasibility and high recognition efficiency

Active Publication Date: 2018-11-16
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] (1) Only some exploratory theoretical research has been done. Many experimental ciphertext data do not conform to the actual situation. For example, all ciphertexts in the experiment correspond to the same key, and there is no strict limit on the size of the ciphertext file used in the test.
[0009] (2) The identified cryptographic algorithm does not specify the algorithm parameters, but only identifies the cryptographic algorithm by the algorithm name
[0010] (3) Basically, only a few block cipher algorithms are identified, and no other valuable research content has been found to expand

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A cryptographic algorithm identification method and system based on ciphertext only
  • A cryptographic algorithm identification method and system based on ciphertext only
  • A cryptographic algorithm identification method and system based on ciphertext only

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings of the specification.

[0034] The present invention proposes a cryptographic algorithm identification technology based on only ciphertext, and establishes an identification algorithm framework based on theoretical methods such as statistical analysis, information theory, optimization theory, and machine learning, which can identify some commonly used cryptographic algorithms. The technology mainly includes the following five steps:

[0035] Step 1: Determine which cryptographic algorithms need to be identified, and then generate ciphertext files corresponding to these cryptographic algorithms that need to be identified, and the size and number of ciphertext files corresponding to each cryptographic algorithm are consistent. The cipher algorithms here are mainly symmetric cipher algorithms, including block cipher algorithms and sequence cipher alg...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of cipher algorithm identification, and discloses a cipher algorithm identification method based on only-ciphertext. The cipher algorithm identification method concretely comprises that step 1: cipher algorithms needing to be identified are determined, and then ciphertext files are generated corresponding to the cipher algorithms needing to be identified; step 2: ciphertext data characteristics of the generated ciphertext files are extracted, and key characteristics are screened out; step 3: the key characteristics serve as a characteristic matching database of a cipher algorithm identification model, an identification algorithm in machine learning is combined, and a preliminary identification model is established; step 4: some ciphertext files are regenerated corresponding to the cipher algorithms, key characteristics of the new ciphertexts are obtained in the same way, and then serve as the input of an identification model, and preliminary identification is carried out to the cipher algorithms; and step 5: after multi-time optimization processes, a stable identification model is finally obtained, and is directly used for cipher algorithm identification based on only-ciphertext information.

Description

Technical field [0001] The invention relates to the technical field of cryptographic algorithm identification, in particular to a cryptographic algorithm identification method and system based on cipher text. Background technique [0002] Information confidential communication, secure storage, integrity protection, authentication, signature and verification, etc. are inseparable from the use of cryptographic algorithms. Cryptographic algorithms are the core of information security technology. The security of cryptographic algorithms plays an inestimable role. Kerckhoffs' basic hypothesis for cryptanalysis explained all the details of cryptographic algorithms known to cryptanalysts and their implementation. Almost all existing cryptanalysis techniques are based on known algorithms. However, in the analysis of public opinion, the only information we obtain is ciphertext, which is unknown to the cryptanalyst. But one thing can be confirmed, users are basically not professional cryp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/12G06F21/14
CPCG06F21/125G06F21/14
Inventor 吉庆兵刘义铭谈程张李军陈曼
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP