Machine Learning Approach for Analysing Encrypted Data

被引:0
|
作者
Pradeepthi, K., V [1 ]
Tiwari, Vikas [1 ]
Saxena, Ashutosh [1 ]
机构
[1] CR Rao Adv Inst Math Stat & Comp Sci, Hyderabad, India
关键词
learning; clustering; encryption; cipher text; information retrieval system;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Machine Learning has been explored in many fields for solving problems ranging from medicine to finance, including Information Security. At the same time, in the area of cryptography, it is always a challenge to decipher the cryptic text without the knowledge of the encryption key. The challenge becomes even harder in absence of knowledge about the encryption algorithm. In this paper, we propose a methodology to identify the encryption algorithm being used to produce the cryptic text. We apply machine learning approach, to be specific Expectation-Maximization based clustering to identify the encryption algorithm. We conducted several experiments to substantiate our hypothesis and are effectively able to identify the encryption algorithm with over 90 percent accuracy. Our approach finds a useful place in information retrieval system when no meta-knowledge is being extended for crypt-analysis.
引用
收藏
页码:70 / 73
页数:4
相关论文
共 50 条
  • [1] Private AI: Machine Learning on Encrypted Data
    Lauter, Kristin
    [J]. RECENT ADVANCES IN INDUSTRIAL AND APPLIED MATHEMATICS, 2022, : 97 - 113
  • [2] Machine Learning Training on Encrypted Data with TFHE
    Montero, Luis
    Frery, Jordan
    Kherfallah, Celia
    Bredehoft, Roman
    Stoian, Andrei
    [J]. PROCEEDINGS OF THE 10TH ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS, IWSPA 2024, 2024, : 71 - 76
  • [3] Detecting Encrypted Traffic: A Machine Learning Approach
    Cha, Seunghun
    Kim, Hyoungshick
    [J]. INFORMATION SECURITY APPLICATIONS, WISA 2016, 2017, 10144 : 54 - 65
  • [4] Machine Learning Classification over Encrypted Data
    Bost, Raphael
    Popa, Raluca Ada
    Tu, Stephen
    Goldwasser, Shafi
    [J]. 22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
  • [5] Encrypted Image Retrieval System: A machine learning approach
    Hazra, Tapan Kumar
    Chowdhury, Sreejit Roy
    Chakraborty, Ajoy Kumar
    [J]. 7TH IEEE ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE IEEE IEMCON-2016, 2016,
  • [6] Supervised machine learning using encrypted training data
    Francisco-Javier González-Serrano
    Adrián Amor-Martín
    Jorge Casamayón-Antón
    [J]. International Journal of Information Security, 2018, 17 : 365 - 377
  • [7] Supervised machine learning using encrypted training data
    Gonzalez-Serrano, Francisco-Javier
    Amor-Martin, Adrian
    Casamayon-Anton, Jorge
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2018, 17 (04) : 365 - 377
  • [8] NeuroCrypt: Machine Learning Over Encrypted Distributed Neuroimaging Data
    Nipuna Senanayake
    Robert Podschwadt
    Daniel Takabi
    Vince D. Calhoun
    Sergey M. Plis
    [J]. Neuroinformatics, 2022, 20 : 91 - 108
  • [9] Identification of VoIP encrypted traffic using a machine learning approach
    Alshammari, Riyad
    Zincir-Heywood, A. Nur
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2015, 27 (01) : 77 - 92
  • [10] Efficient Machine Learning on Encrypted Data using Hyperdimensional Computing
    Nam, Yujin
    Zhou, Minxuan
    Gupta, Saransh
    De Micheli, Gabrielle
    Cammarota, Rosario
    Wilkerson, Chris
    Micciancio, Daniele
    Rosing, Tajana
    [J]. 2023 IEEE/ACM INTERNATIONAL SYMPOSIUM ON LOW POWER ELECTRONICS AND DESIGN, ISLPED, 2023,