Post-quantum cryptographic algorithm identification using machine learning

نویسندگان

چکیده

This research presents a study on the identification of post-quantum cryptography algorithms through machine learning techniques. Plain text files were encoded by four algorithms, participating in NIST's standardization contest, ECB mode. The resulting cryptograms submitted to NIST Statistical Test Suite enable creation metadata files. These provide information for six data mining identify cryptographic algorithm used encryption. Identification performance was evaluated samples different sizes. successful each is higher than probabilistic bid, with hit rates ranging between 73 and 100%.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Implementation Attacks on Post-Quantum Cryptographic Schemes

Post-quantum cryptographic schemes have been developed in the last decade in response to the rise of quantum computers. Fortunately, several schemes have been developed with quantum resistance. However, there is very little effort in evaluating and comparing these schemes in the embedded settings. Low cost embedded devices represents a highly-constraint environment that challenges all post-quan...

متن کامل

Internet Traffic Identification using Machine Learning

We apply an unsupervised machine learning approach for Internet traffic identification and compare the results with that of a previously applied supervised machine learning approach. Our unsupervised approach uses an Expectation Maximization (EM) based clustering algorithm and the supervised approach uses the Naı̈ve Bayes classifier. We find the unsupervised clustering technique has an accuracy ...

متن کامل

Realtime Encrypted Traffic Identification using Machine Learning

Accurate network traffic identification plays important roles in many areas such as traffic engineering, QoS and intrusion detection etc. The emergence of many new encrypted applications which use dynamic port numbers and masquerading techniques causes the most challenging problem in network traffic identification field. One of the challenging issues for existing traffic identification methods ...

متن کامل

Paraphrase Identification using Machine Learning Techniques

Paraphrases are different ways of expressing the same content. Two sentences are said to be paraphrases if they are semantically equivalent. Identification of paraphrases has numerous applications such as Information Extraction, Question Answering, etc. The traditional systems use threshold values to decide whether two sentences are paraphrases. This threshold determination process is independe...

متن کامل

Dermoscopic Image Segmentation using Machine Learning Algorithm

Problem statement: Malignant melanoma is the most frequent type of skin cancer. Its incidence has been rapidly increasing over the last few decades. Medical image segmentation is the most essential and crucial process in order to facilitate the characterization and visualization of the structure of interest in medical images. Approach: This study explains the task of segmenting skin lesions in ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Information Security and Cryptography

سال: 2022

ISSN: ['2595-5217']

DOI: https://doi.org/10.17648/jisc.v9i1.81