[1] KERCKHOFFS A.La cryptographie militaire[J]. Journal des Sciences Militaires, 1883, IX:161-191. [2] DILEEP A D, SEKHAR C C.Identification of block ciphers using support vector machines[C]//Proceeding of IJCNN'06.Gulf Islands, Canada:[s.n.], 2006:2696-2701. [3] MANJULA R, ANITHA R.Identification of encryption algorithm using decision tree[J]. Advanced Computing Communications in Computer and Information Science, 2011, 133(3): 237-246. [4] CHOU J W, LIN S D, CHENG C M.On the effectiveness of using state-of-the-art machine learning techniques to launch cryptographic distinguishing attacks[C]//Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence.New York, USA:ACM Press, 2012:105-110. [5] MISHRA S, BHATTACHARJYA A.Pattern analysis of cipher text:a combined approach[C]//Proceedings of International Conference on Recent Trends in Information Technology.Washington D.C., USA:IEEE Press, 2013:393-398. [6] SOUZA W A R, TONLINSON A.A distinguishing attack with a neural network[C]//Proceedings of ICDMW'13.Washington D.C., USA:IEEE Press, 2013:154-161. [7] LOMTE V M, SHINDE A D.Review of a new distinguishing attack using block cipher with a neural network[J]. International Journal of Science and Research, 2014, 3(8): 733-736. [8] 吴杨, 王韬, 李进东.分组密码算法密文的统计检测新方法研究[J]. 军械工程学院学报, 2015, 27(3): 58-64. WU Y, WANG T, LI J D.Research on a new method of statistical detection of block cipher algorithm ciphertext[J]. Journal of Ordnance Engineering College, 2015, 27(3): 58-64.(in Chinese) [9] 吴杨, 王韬, 邢萌, 等. 基于密文随机性度量值分布特征的分组密码算法识别方案[J]. 通信学报, 2015, 36(4): 147-155. WU Y, WANG T, XING M, et al. Recognition scheme of block cipher algorithm based on distribution characteristics of ciphertext randomness measure value[J]. Journal of Communications, 2015, 36(4): 147-155.(in Chinese) [10] MELLO F L D, XEXEO J A M.Cryptographic algorithm identification using machine learning and massive processing[J]. IEEE Latin America Transactions, 2016, 14(11): 4585-4590. [11] TAN C, JI Q B.An approach to identifying cryptographic algorithm from ciphertext[C]//Proceedings of 2016 IEEE International Conference on Communication Software and Networks.Washington D.C., USA:IEEE Press, 2016:19-23. [12] BARBOSA F M, VIDAL A R S F, ALMEIDA H L S, et al. Machine learning applied to the recognition of cryptographic algorithms used for multimedia encryption[J]. Revista IEEE America Latina, 2017, 15(7): 1301-1305. [13] 黄良韬, 赵志诚, 赵亚群.基于随机森林的密码体制分层识别方案[J]. 计算机学报, 2018, 41(2): 382-399. HUANG L T, ZHAO Z C, ZHAO Y Q.Hierarchical recognition scheme of cryptosystem based on random forest[J]. Journal of Computer, 2018, 41(2): 382-399.(in Chinese) [14] TAN C, DENG X Y, ZHANG L J.Identification of block ciphers under CBC mode[J]. International Congress of Information and Communication Technology, 2018, 131:65-71. [15] 赵志诚, 赵亚群, 刘凤梅.基于随机性测试的分组密码体制识别方案[J]. 密码学报, 2019, 6(2): 177-190. ZHAO Z C, ZHAO Y Q, LIU F M.Recognition scheme of block cipher system based on randomness test[J]. Journal of Cryptography, 2019, 6(2): 177-190.(in Chinese) [16] PUB F.DES Modes of Operation:FIPS PUB 81[R]. US Department of Commerce, National Bureau of Standards, 1980. [17] MENEZES A J, OORSCHOT P C, VANSTONE S A.Handbook of applied cryptography[M]. [S.l.]:CRC Press, 1996. [18] 李洪超.基于密文特征的密码算法识别研究[D]. 西安:西安电子科技大学, 2018. LI H C.Research on cipher algorithm recognition based on ciphertext features[D]. Xi'an:Xidian University, 2018. [19] 赵志诚.基于机器学习的密码体制识别研究[D]. 郑州:战略支援部队信息工程大学, 2018. ZHAO Z C.Research on cryptographic system recognition based on machine learning[D]. Zhengzhou:Strategic Support Force Information Engineering University, 2018. [20] QUINLAN J R.Induction of decision trees[J]. Machine Learning, 1986, 1(1): 81-106. |