Journal of Engineering and Applied Sciences

Year: 2019
Volume: 14
Issue: 11
Page No. 3549 - 3556

Classification and Identification of Classical Cipher Type using Artificial Neural Networks

Authors : Ahmed J. Abd and Sufyan T. Faraj Al-Janabi

References

Al-Janabi, S.T., B. Al-Khateeb and A.J. Abd, 2017. Intelligent techniques in cryptanalysis: Review and future directions. UHD. J. Sci. Technol., 1: 1-10.
Direct Link  |  

Al-Janabi, S.T.F. and W.A. Hussien, 2016. Architectural design of general cryptanalysis platform for pedagogical purposes. I. Manager’s J. Software Eng., 11: 1-12.
Direct Link  |  

Al-Janabi, S.T.F., 2016. On the necessity of establishing a national cybersecurity testbed. J. Univ. Hum. Dev., 2: 428-436.
CrossRef  |  Direct Link  |  

Bahaa-Eldin, A.M., 2014. Intelligent systems for information security. Ph.D Thesis, Ain Shams University, Cairo, Egypt.

Carter, B. and T. Magoc, 2007. Introduction Classical Ciphers and Cryptanalysis. Ph.D Thesis, Pennsylvania State University, Pennsylvania, USA.

Dunham, J.G., M.T. Sun and J.C. Tseng, 2005. Classifying file type of stream ciphers in depth using neural networks. Proceedings of the 3rd ACS/IEEE International Conference on Computer Systems and Applications, January 6, 2005, IEEE, Cairo, Egypt, pp: 97-97.

Haizel, K.N., 1999. Development of an Automated Cryptanalysis Emulator (ACE) for classical cryptograms. MSc Thesis, University of New Brunswick, Fredericton, Canada.

Kriesel, D., 2005. A Brief Introduction to Neural Networks. University of Bonn, Bonn, Germany, Pages: 226.

Maheshwari, P., 2001. Classification of ciphers. Master Thesis, Department of Computer Science and Engineering, Indian Institute of Technology Kanpur, Kanpur, India.

Nuhn, M. and K. Knight, 2014. Cipher type detection. Proceedings of the 2014 International Conference on Empirical Methods in Natural Language Processing (EMNLP), October 25-29, 2014, Association for Computational Linguistics, Doha, Qatar, pp: 1769-1773.

Prajapat, S. and R.S. Thakur, 2015. Various approaches towards cryptanalysis. Intl. J. Comput. Appl., 127: 15-24.

Sharma, K. and P. Kumari, 2017. An overwiew and comparison of various cryptography algorithms. J. Eng. Appl. Sci., 12: 5527-5532.
Direct Link  |  

Sivagurunathan, G., V. Rajendran and T. Purusothaman, 2010. Classification of substitution ciphers using neural networks. Intl. J. Comput. Sci. Network Secur., 10: 274-279.
Direct Link  |  

Stallings, W., 2013. Cryptography and Network Security: Principles and Practices. 6th Edn., Pearson, Upper Saddle River, New Jersey, USA., ISBN:9780273793359, Pages: 749.

Tan, C. and Q. Ji, 2016. An approach to identifying cryptographic algorithm from ciphertext. Proceedings of the 8th IEEE International Conference on Communication Software and Networks (ICCSN), June 4-6, 2016, IEEE, Beijing, China, ISBN:978-1-5090-1781-2, pp: 19-23.

Tino, P., L. Benuskova and A. Sperduti, 2015. Artificial Neural Network Models. In: Springer Handbook of Computational Intelligence, Kacprzyk, J. and W. Pedrycz (Eds.). Springer, Berlin, Germany, ISBN:978-3-662-43504-5, pp: 455-471.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved