Skip to main content
Log in

Identifying traffic of same keys in cryptographic communications using fuzzy decision criteria and bit-plane measures

  • Original Article
  • Published:
International Journal of System Assurance Engineering and Management Aims and scope Submit manuscript

Abstract

The use of same keys for different messages is not safe in cryptography to secure cryptographic communications even if encryption algorithm is strong enough and possesses good cryptographic properties. Such communications can be analyzed to find meaningful information by cryptanalysts or adversaries. Use of same keys may happens if keys are not managed in cipher systems appropriately by customers. One should evaluate ciphers thoroughly and assure for non-repetition of keys prior to its usage for secure communications. The paper presents a methodology to identify and segregate traffic of cryptographic communications of images encrypted with same keys by exploiting bit-plane image characteristics and applying Fuzzy decision criteria. Results presented in the paper shows that the proposed Fuzzy classification method is able to identify images encrypted with same keys successfully and it seems very useful to consider for various pattern recognition and image analysis problems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  • Asthana R, Sharma A, Ratan R, Verma N (2015) Classification of error-correcting coded data using multidimensional feature vectors. Adv Intell Syst Comput 336:303–312

    Google Scholar 

  • Bezdek JC, Keller J, Krisnapuram R, Pal NR (2005) Fuzzy models and algorithms for pattern recognition and image processing, Rev edn. Springer, New York

    MATH  Google Scholar 

  • Bouyer P et al (2011) Quantitative analysis of real-time systems. J Commn ACM 54(9):78–87

    Article  Google Scholar 

  • Cusick TW, Stanica P (2009) Cryptographic Boolean functions and applications. Academic Press, Cambridge,

    MATH  Google Scholar 

  • Din M, Ratan R, Bhateja AK, Bhateja A (2012) Multimedia classification using ANN approach. Adv Intell Syst Comput 236:905–910

    Google Scholar 

  • Doane DP, Seward LE (2011) Measuring Skewness: a forgotten statistics. J Stat Educ 19(2):1–18

    Article  Google Scholar 

  • George AG, Prabavathy AK (2013) A survey on different approaches used in image quality assessment. Int J Emerg Technol Adv Eng 3(2):197–203

    Google Scholar 

  • Haddon JF, Boyce JF (1993) Co-occurrence matrices for image analysis. IEEE Electron Commun Eng J 5(2):71–83

    Article  Google Scholar 

  • Huber P, Ronchetti E (2009) Robust statistics. Wiley, Hoboken

    Book  Google Scholar 

  • Jain AK (1995) Fundamentals of digital image processing. Prentice Hall, Englewood Cliffs

    MATH  Google Scholar 

  • Katzenbeisser S, Petitcolas FAP (2000) Information hiding techniques for steganography and digital watermarking. Artech House, Norwood

    Google Scholar 

  • Keelan BW (2002) Handbook of image quality. Marcel Dekker Inc., New York

    Book  Google Scholar 

  • Keerthi SS, Chapelle O, DeCoste D (2006) Building support vector machines with reduced classifier complexity. J Mach Learn Res 7:1493–1515

    MathSciNet  MATH  Google Scholar 

  • Klein A (2013) Stream ciphers. Springer, London

    Book  Google Scholar 

  • Lahouhou A, Viennet E, Beghdadi A (2010) Selecting low-level features for image quality assessment by statistical methods. J Comput Inform Tech 18(2):183–189

    Article  Google Scholar 

  • Mc Cullough BD (2004) Wilkinson’s test and econometric software. J Econ Soc Meas 29:261–270

    Article  Google Scholar 

  • Menezes A, Vanstone S, Van Oorschot P (1996) Handbook of applied cryptography. CRC Press, Boca Raton

    MATH  Google Scholar 

  • Prakash S, Trivedi V, Ramteke M (2016) An elitist non-dominated sorting bat algorithm NSBAT-II for multiobjective optimization of phthalic anhydride reactor. J Syst Assur Eng Manag 7(3):299–315

    Article  Google Scholar 

  • Prasad Mukesh, Li Dong-Lin, Lin Chin-Teng, Prakash Shiv, Singh Jagendra, Joshi Sudhanshu (2015) Designing mamdani-type fuzzy reasoning for visualizing prediction problems based on collaborative fuzzy clustering. IAENG Int J Comput Sci 42(4):404–411

    Google Scholar 

  • Ratan R (2014) Applications of genetic algorithms in cryptology. Adv Intell Syst Comput 258:281–291

    Google Scholar 

  • Ratan R, Arvind (2019) Bit-plane specific measures and its applications in analysis of image ciphers. Commun Comput Inf Sci 968:282–297

    Google Scholar 

  • Ratan R, Veni Madhavan CE (2002) Steganography based information security. IETE Tech Rev 19(4):213–219

    Article  Google Scholar 

  • Renu, Ravi, Ratan R (2012) Live traffic english text monitoring using fuzzy approach. Adv Intell Syst Comput 236:911–918

    Google Scholar 

  • Rueppel RA (1986) Analysis and design of stream ciphers. Springer, Berlin

    Book  Google Scholar 

  • Sadkhan SB, Abbas NA (2013) Watermarked and noisy images identification based on statistical evaluation parameters. J Zankoy Sulaimani-Part A 15(3):159–168

    Article  Google Scholar 

  • Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656–715

    Article  MathSciNet  Google Scholar 

  • Simon KS, Omura JK, Scholtz RA, Levitt BK (1994) Spread spectrum communications handbook. McGraw-Hill, New York

    Google Scholar 

  • Stallings W (2011) Cryptography and network security. Prentice Hall, Englewood Cliffs

    Google Scholar 

  • Stinson DR (1994) Decomposition constructions for secret sharing schemes. IEEE Trans Inf Theory 40(1):118–125

    Article  MathSciNet  Google Scholar 

  • Streijl RC, Winkler S, Hands DS (2016) Mean opinion score (MOS) revisited: methods and applications, limitations and alternatives. Multimed Syst 22(2):213–227

    Article  Google Scholar 

  • Teimouri M, Motlagh HK, (2017) Reverse engineering of communications networks: evolution and challenges. arXiv preprint arXiv:1704.05432 - arxiv.org

  • Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612

    Article  Google Scholar 

  • Zadeh LA (1965) Fuzzy sets. Inf Control 8(3):338–353

    Article  Google Scholar 

  • Zhou W, Bovik AC (2009) Mean squared error: love it or leave it? A new look at signal fidelity measures. Signal Process Mag IEEE 26(1):98–117

    Article  Google Scholar 

  • Zimmermann HJ (1987) Fuzzy sets. Decision making and expert systems. Kluwer, Boston

    Book  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ram Ratan.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Arvind, Ratan, R. Identifying traffic of same keys in cryptographic communications using fuzzy decision criteria and bit-plane measures. Int J Syst Assur Eng Manag 11, 466–480 (2020). https://doi.org/10.1007/s13198-019-00878-7

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13198-019-00878-7

Keywords

Navigation