Handbook of Applied Cryptography
Handbook of Applied Cryptography
Machine Learning and Data Mining; Methods and Applications
Machine Learning and Data Mining; Methods and Applications
The First Experimental Cryptanalysis of the Data Encryption Standard
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Survey of Text Mining
Data Mining: Concepts and Techniques
Data Mining: Concepts and Techniques
Fast elliptic curve cryptography on FPGA
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
A Novel Visual Cryptography Scheme
ICACC '09 Proceedings of the 2009 International Conference on Advanced Computer Control
Quantum Cryptography: A New Generation of Information Technology Security System
ITNG '09 Proceedings of the 2009 Sixth International Conference on Information Technology: New Generations
Sensor Data Cryptography in Wireless Sensor Networks
IEEE Transactions on Information Forensics and Security
Cryptanalysis of Some Multimedia Encryption Schemes
IEEE Transactions on Multimedia
Hi-index | 0.00 |
Cryptography is a popular method for information hiding and reaching confidentiality in digital world. On the other hand, cryptanalysis is an interesting and useful science from different viewpoints. All the digital materials that are processed by computers or transferred in data transmission systems have some information. However, the information, embodied in the data, is entangled with known or unknown patterns and features. As an example, each certain author uses certain writing patterns and techniques which are almost unique. While cryptography algorithms hide information from the eavesdroppers, this hiding is performed through recoding. Hence, information and the related features are still remained in the encrypted output of the cryptosystem. Then, discovering the hidden features in the encrypted texts can be used to analyze the output of a cryptography algorithm. In this paper, the application of data mining in cryptanalysis is explored. It is shown that how this attack may be employed to classify the cipher texts. Also, a number of methods to improve the security of cryptography systems will be introduced. Simulation results support the arguments of the paper.