Cryptic Mining: Apriori Analysis of Parameterized Automatic Variable Key based Symmetric Cryptosystem (original) (raw)
Related papers
Frequent pattern mining for parameterised automatic variable key-based cryptosystems
International Journal of Business Intelligence and Data Mining, 2018
Huge amount of information is exchanged electronically in most enterprises and organisations. In particular, in all financial and e-business set ups the amount of data stored or exchanged is growing enormously over public network among variety of computing devices. Securing this gargantuan sized input is challenging. This paper provides a framework for securing information exchange using parametric approaches with AVK approach and investigating strength of this cryptosystem using mining algorithms on symmetric key-based cryptosystem. This work demonstrates association rule application as one of the component of cryptic mining system used to process the encrypted data for extracting use full patterns and association. The degree of identified patterns may be use full to rank the degree of safety and class of cryptic algorithm, during auditing of security algorithms.
Association Rule Mining in Cryptography
Huge amount of information is exchanged electronically in most enterprises and organisations. In particular, in all financial and e-business set ups the amount of data stored or exchanged is growing enormously over public network among variety of computing devices. Securing this gargantuan sized input is challenging. This paper provides a framework for securing information exchange using parametric approaches with AVK approach and investigating strength of this cryptosystem using mining algorithms on symmetric key-based cryptosystem. This work demonstrates association rule application as one of the component of cryptic mining system used to process the encrypted data for extracting use full patterns and association. The degree of identified patterns may be use full to rank the degree of safety and class of cryptic algorithm, during auditing of security algorithms.
Cryptic Mining for AVK Based Cryptosystem and Client Side Encryption Perspective
This work presents parametric versions of symmetric cryptic algorithms that emphasises on generation and usage of key based on parameter only. The key construction process has been extended for generation of alphanumeric keys apart from numeric one with exploiting domain of parameter selection from personnel information logs. The hypothesis of parametric but variable key for cryptic model (usable for Automatic Variable Key) tested with the freedom of user for the parameter selection and variation in the parameters according to comfort instead of using series, recurrence relation or location information [8, 21]. The paper investigates parametric model in the light of Association Rule Mining for such cryptosystem [15]. Useful inferences and results from testing results helps in auditing of AVK based cryptic algorithm and identifies power of using a large number of parameters for secure information exchange.
Cryptic Mining for Automatic Variable Key Based Cryptosystem
This paper presents evolution of Automatic variable key cryptosystem with study and analysis of state of symmetric cryptosystem. It presents framework of AVK model and extension by parameterized approach. The evaluation of cryptosystem from perspective of cryptanalyst has been presented. The paper opens direction of “Cryptic Mining “discipline. The AVK approach finds application in low power secure device communication, which is most desirable feature of Internet of Things.
Cryptic-Mining: Association Rules Extractions Using Session Log
Security of gargantuan sized data has always posed as a challenging issue. This domain has witnessed a number of approaches being introduced to counter such issues. This paper first reviews approaches for investigation of mining algorithms in cryptography domain and sheds light on application of mining techniques and machine learning algorithms in cryptography. The paper presents key computation using parameters-only scheme for automatic variable key (AVK) based symmetric key cryptosystem. A cryptanalysis based on association rule mining for key and parameter prediction has been discussed using both analytical method and WEKA tool. The paper also presents some research questions regarding the design issues associated with the implementation of parameter based symmetric Automatic Variable Key (AVK) based cryptosystem.
AVK based Cryptosystem and Recent Directions Towards Cryptanalysis
Cryptanalysis is very important step for auditing and checking strength of any cryptosystem. Some of these cryptosystem ensures confidentiality and security of large information exchange from source to destination using symmetric key cryptography. The cryptanalyst investigates the strengths and identifies weakness key as well as enciphering algorithm. With increase in key size the time and effort required to guess the correct key increases so trend is increase key size from 8, 16, 24, 32, 56, 64, 128 and 256 bits to strengthen the cryptosystem and thus algorithm continues without compromise on the cost of time and computation. Automatic Variable Key (AVK) approach is an alternative to the approach of fixing up key size and adding security level with key variability adds new dimension in the development of secure cryptosystem. Likewise, whenever any new cryptographic method is invented to replace per-existing vulnerable cryptographic method, its deep analysis from all perspectives (Hacker / Cryptanalyst as well as User) is desirable and proper study and evaluation of its performance is must. This work investigates AVK based cryptic techniques, in future to exploit benefits of advances in computational methods like ANN, GA, SI etc. These techniques for cryptanalysis are changing drastically to reduce cryptographic complexity. In this paper a detailed survey and direction of development work has been conducted. The work compares these new methods with state of art approaches and presents future scope and direction from the cryptic mining perspectives.
Markov Analysis of AVK Approach of Symmetric Key Based Cryptosystem
In Symmetric Key Cryptography domain, Automatic Variable Key (AVK) approach is in inception phase because of unavailability of reversible XOR like operators. Fibonacci-Q matrix has emerged as an alternative solution for secure transmission with varying key for different sessions [3, 10]. This paper attempts to analyze symmetric key cryptography scheme based on AVK approach. Due to key variability nature, the AVK approach is assumed to be more powerful, efficient and optimal but its analysis from hackers' point of view is demonstrated in this paper. This paper also assumes various situations under which mining of future keys can be achieved. The paper also discusses concept of Key variability with less probability of extracted result under various scenario with the different degree of difficulty in key mining.
Generalized Parametric Model for AVK-Based Cryptosystem
Networking Communication and Data Knowledge Engineering, 2017
This work presents the enhancement of security of automatic variable key (AVK)-based cryptosystem by exchanging some parameters instead of entire keys between the communicating parties [1-4]. Now, these parameters will be used to generate required keys at the receiver end. The work presents a framework for above-specified mechanism. Moreover, the model has been demonstrated with parameterized scheme and production issues in AVK approach (from the different user's perspective including hacker).
Security and privacy has emerged to be a serious concern in which the business professional don't desire to share their classified transaction data. In the earlier work, secured sharing of transaction databases are carried out. The performance of those methods is enhanced further by bringing in Security and Privacy aware Large Database Association Rule Mining (SPLD-ARM) framework. Now the Improved Secured Association Rule Mining (ISARM) is introduced for the horizontal and vertical segmentation of huge database. Then k-Anonymization methods referred to as suppression and generalization based Anonymization method is employed for privacy guarantee. At last, Diffie-Hellman encryption algorithm is presented in order to safeguard the sensitive information and for the storage service provider to work on encrypted information. The Diffie-Hellman algorithm is utilized for increasing the quality of the system on the overall by the generation of the secured keys and thus the actual data is protected more efficiently. Realization of the newly introduced technique is conducted in the java simulation environment that reveals that the newly introduced technique accomplishes privacy in addition to security.
Towards Parameterized Shared Key for AVK Approach
" Key " plays a vital role in every symmetric key cryptosystem. The obvious way of enhancing security of any cryptosystem is to keep the key as large as possible. But it may not be suitable for low power devices since higher computation will be done for longer keys and that will increase the power requirement which decreases the device's performance. In order to resolve the former specified problem an alternative approach can be used in which the length of key is fixed and its value varies in every session. This is Time Variant Key approach or Automatic Variable Key (AVK) approach. The Security of AVK based cryptosystem is enhanced by exchanging some parameters instead of keys between the communicating parties, then these parameters will be used to generate required keys at the receiver end. This chapter presents implementation of the above specified Mechanism. A model has been demonstrated with pa-rameterized scheme and issues in AVK approach. Further, it has been analyzed from different users' perspectives. This chapter also highlights the benefits of AVK model to ensure two levels of security with characterization of methods for AVK and Estimation of key computation based on parameters only. The characteristic components of recent styles of key design with consideration of key size, life time of key and breaking threshold has also been pointed out. These characteristics are essential in the design of efficient symmetric key cryptosystem. The novel approach of AVK based cryptosystem is suitable for low power devices and useful for exchanging very large objects or files. This scheme has been demonstrated with Fibonacci-Q matrix and sparse matrix based diffused key information exchange procedures. These models have been further tested from perspective of hackers and cryptanalyst, to exploit any weakness with fixed size dynamic keys.