{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:10:08Z","timestamp":1775067008519,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T00:00:00Z","timestamp":1692576000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T00:00:00Z","timestamp":1692576000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100012165","name":"Key Technologies Research and Development Program","doi-asserted-by":"publisher","award":["2018YFA0704703"],"award-info":[{"award-number":["2018YFA0704703"]}],"id":[{"id":"10.13039\/501100012165","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["61972215"],"award-info":[{"award-number":["61972215"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["61972073"],"award-info":[{"award-number":["61972073"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["62172238"],"award-info":[{"award-number":["62172238"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006606","name":"Natural Science Foundation of Tianjin City","doi-asserted-by":"publisher","award":["20JCZDJC00640"],"award-info":[{"award-number":["20JCZDJC00640"]}],"id":[{"id":"10.13039\/501100006606","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Specialized Research and Development Program of Henan Province","award":["222102210062"],"award-info":[{"award-number":["222102210062"]}]},{"name":"Basic Higher Educational Key Scientific Research Program of Henan Province","award":["22A413004"],"award-info":[{"award-number":["22A413004"]}]},{"name":"National Innovation Training Program of University Student","award":["202110475072"],"award-info":[{"award-number":["202110475072"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2024,2]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Cryptographic technology can effectively defend against malicious attackers to attack sensitive and private information. The core of cryptographic technology is cryptographic algorithm, and the cryptographic algorithm identification is the premise of in-depth analysis of cryptography. In the cryptanalysis of unknown cryptographic algorithm, the primary task is to identify the cryptographic algorithm used in the encryption and then carry out targeted analysis. With the rapid growth of Internet data, the increasing complexity of communication environment, and the increasing number of cryptographic algorithms, the single-layer identification scheme of cryptographic algorithm faces great challenges in terms of identification ability and stability. To solve these problems, on the basis of existing identification schemes, this paper proposes a new cluster division scheme CMSSBAM-cluster, and then proposes a multi-layer composite identification scheme of cryptographic algorithm using a composite structure. The scheme adopts the method of cluster division and single division to identify various cryptographic algorithms. Based on the idea of ensemble, the scheme uses the hybrid random forest and logistic regression (HRFLR) model for training, and conducts research on a data set consisting of 1700 ciphertext files encrypted by 17 cryptographic algorithms. In addition, two ensemble learning models, hybrid gradient boosting decision tree and logistic regression (HGBDTLR) model and hybrid k-neighbors and random forest (HKNNRF) model are used as controls to conduct controlled experiments in this paper. The experimental results show that multi-layer composite identification scheme of cryptographic algorithm based on HRFLR model has an accuracy rate close to 100% in the cluster division stage, and the identification results are higher than those of the other two models in both the cluster division and single division stages. In the last layer of cluster division, the identification accuracy of ECB and CBC encryption modes in block cryptosystem is significantly higher than that of the other two classification models by 35.2% and 36.1%. In single division, the identification accuracy is higher than HGBDTLR with a maximum of 9.8%, and higher than HKNNRF with a maximum of 7.5%. At the same time, the scheme proposed in this paper has significantly improved the identification effect compared with the single division identification accuracy of 17 cryptosystem directly and the 17 classification accuracy of 5.9% compared with random classification, which indicates that multi-layer composite identification scheme of cryptographic algorithm based on HRFLR model has significant advantages in the accuracy of identifying multiple cryptographic algorithms.<\/jats:p>","DOI":"10.1007\/s40747-023-01212-2","type":"journal-article","created":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T02:01:45Z","timestamp":1692583305000},"page":"1131-1147","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["A multi-layer composite identification scheme of cryptographic algorithm based on hybrid random forest and logistic regression model"],"prefix":"10.1007","volume":"10","author":[{"given":"Ke","family":"Yuan","sequence":"first","affiliation":[]},{"given":"Yabing","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Zhanfei","family":"Du","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3701-7677","authenticated-orcid":false,"given":"Jiabao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Chunfu","family":"Jia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,21]]},"reference":[{"key":"1212_CR1","unstructured":"Zhicheng Z (2018) The research of cryptosystem recognition scheme based on machine learing. Master\u2019s thesis, Support Forces Information Engineering University. CNKI:CDMD:2.1018.841883"},{"key":"1212_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cities.2022.103794","volume":"129","author":"AR Javed","year":"2022","unstructured":"Javed AR, Shahzad F, ur Rehman S, Zikria YB, Razzak I, Jalil Z, Xu G (2022) Future smart cities: requirements, emerging technologies, applications, challenges, and future aspects. Cities 129:103794. https:\/\/doi.org\/10.1016\/j.cities.2022.103794","journal-title":"Cities"},{"issue":"9","key":"1212_CR3","doi-asserted-by":"publisher","first-page":"6326","DOI":"10.1109\/TII.2022.3164741","volume":"18","author":"M Alazab","year":"2022","unstructured":"Alazab M, Gadekallu TR, Su C (2022) Guest editorial: security and privacy issues in industry 4.0 applications. IEEE Trans Ind Inform 18(9):6326\u20136329. https:\/\/doi.org\/10.1109\/TII.2022.3164741","journal-title":"IEEE Trans Ind Inform"},{"issue":"4","key":"1212_CR4","doi-asserted-by":"publisher","first-page":"4641","DOI":"10.1109\/TITS.2022.3208245","volume":"24","author":"Z Han","year":"2022","unstructured":"Han Z, Yang Y, Wang W, Zhou L, Gadekallu TR, Alazab M, Gope P, Su C (2022) Rssi map-based trajectory design for ugv against malicious radio source: a reinforcement learning approach. IEEE Trans Intell Transp Syst 24(4):4641\u20134650. https:\/\/doi.org\/10.1109\/TITS.2022.3208245","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"1212_CR5","doi-asserted-by":"publisher","unstructured":"El Zarif O, Haraty RA (2020) Toward information preservation in healthcare systems. In: Miltiadis D, Lytras MD, Sarirete A (eds) Innovation in health informatics. Academic Press, Next Gen Tech Driven Personalized Med & Smart Healthcare, pp 163\u2013185. https:\/\/doi.org\/10.1016\/B978-0-12-819043-2.00007-1, https:\/\/www.sciencedirect.com\/science\/article\/pii\/B9780128190432000071. (ISBN:978-0-12-819043-2)","DOI":"10.1016\/B978-0-12-819043-2.00007-1"},{"key":"1212_CR6","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/j.comcom.2022.12.004","volume":"199","author":"C Dhasarathan","year":"2023","unstructured":"Dhasarathan C, Hasan MK, Islam S, Abdullah S, Mokhtar UA, Javed AR, Goundar S (2023) COVID-19 health data analysis and personal data preserving: a homomorphic privacy enforcement approach. Comput Commun 199:87\u201397. https:\/\/doi.org\/10.1016\/j.comcom.2022.12.004","journal-title":"Comput Commun"},{"issue":"1","key":"1212_CR7","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S1566-2535(04)00037-5","volume":"6","author":"G Brown","year":"2005","unstructured":"Brown G, Wyatt J, Harris R, Yao X (2005) Diversity creation methods: a survey and categorisation. Inf Fusion 6(1):5\u201320. https:\/\/doi.org\/10.1016\/S1566-2535(04)00037-5","journal-title":"Inf Fusion"},{"key":"1212_CR8","doi-asserted-by":"publisher","first-page":"3185","DOI":"10.1007\/s11063-022-11005-2","volume":"55","author":"K Yuan","year":"2023","unstructured":"Yuan K, Huang Y, Li J, Jia C, Yu D (2023) A block cipher algorithm identification scheme based on hybrid random forest and logistic regression model. Neural Process Lett 55:3185\u20133203. https:\/\/doi.org\/10.1007\/s11063-022-11005-2","journal-title":"Neural Process Lett"},{"key":"1212_CR9","doi-asserted-by":"publisher","unstructured":"Dileep AD, Sekhar CC (2006) Identification of block ciphers using support vector machines. In: The 2006 IEEE international joint conference on neural network proceedings. IEEE, pp 2696\u20132701. https:\/\/doi.org\/10.1109\/IJCNN.2006.247172","DOI":"10.1109\/IJCNN.2006.247172"},{"key":"1212_CR10","doi-asserted-by":"publisher","unstructured":"Manjula R, Anitha R (2011) Identification of encryption algorithm using decision tree. In: International conference on computer science and information technology. Springer, pp 237\u2013246. https:\/\/doi.org\/10.1007\/978-3-642-17881-823","DOI":"10.1007\/978-3-642-17881-823"},{"key":"1212_CR11","doi-asserted-by":"publisher","unstructured":"Chou JW, Lin SD, Cheng CM (2012) On the effectiveness of using state-of-the-art machine learning techniques to launch cryptographic distinguishing attacks. In: Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, Raleigh, North Carolina, USA 6:105\u2013110. https:\/\/doi.org\/10.1145\/2381896.2381912","DOI":"10.1145\/2381896.2381912"},{"key":"1212_CR12","doi-asserted-by":"publisher","unstructured":"De\u00a0Souza WA, Tomlinson A (2013) A distinguishing attack with a neural network. In: 2013 IEEE 13th international conference on data mining workshops. IEEE, pp 154\u2013161. https:\/\/doi.org\/10.1109\/ICDMW.2013.116","DOI":"10.1109\/ICDMW.2013.116"},{"issue":"1","key":"1212_CR13","first-page":"25","volume":"24","author":"FL de Mello","year":"2018","unstructured":"de Mello FL, Xexeo JA (2018) Identifying encryption algorithms in ecb and cbc modes using computational intelligence. J Univ Comput Sci 24(1):25\u201342","journal-title":"J Univ Comput Sci"},{"issue":"2","key":"1212_CR14","doi-asserted-by":"publisher","first-page":"177","DOI":"10.13868\/j.cnki.jcr.000293","volume":"6","author":"Z Zhao","year":"2018","unstructured":"Zhao Z, Zhao Y, Liu F (2018) Recognition scheme of block cipher system based on randomness test. J Cryptogr 6(2):177\u2013190. https:\/\/doi.org\/10.13868\/j.cnki.jcr.000293","journal-title":"J Cryptogr"},{"issue":"2","key":"1212_CR15","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1007\/s13198019-00878-7","volume":"11","author":"R Ratan","year":"2020","unstructured":"Ratan R et al (2020) Identifying traffic of same keys in cryptographic communications using fuzzy decision criteria and bit-plane measures. Int J Syst Assur Eng Manag 11(2):466\u2013480. https:\/\/doi.org\/10.1007\/s13198019-00878-7","journal-title":"Int J Syst Assur Eng Manag"},{"key":"1212_CR16","doi-asserted-by":"publisher","DOI":"10.19734\/j.issn.1001-3695.2021.01.0019","author":"W Ji","year":"2021","unstructured":"Ji W, Li Y, Qin B (2021) Identification of sm4 block cipher system based on randomness characteristics. Appl Res Comput. https:\/\/doi.org\/10.19734\/j.issn.1001-3695.2021.01.0019","journal-title":"Appl Res Comput"},{"key":"1212_CR17","doi-asserted-by":"publisher","unstructured":"Grari H, Zine-Dine K, Azouaoui A, Lamzabi S (2022) Deep learning-based cryptanalysis of a simplified aes cipher. Int J Inf Secur Priv (IJISP) 16(1):1\u201316. https:\/\/doi.org\/10.4018\/IJISP.300325","DOI":"10.4018\/IJISP.300325"},{"key":"1212_CR18","doi-asserted-by":"publisher","unstructured":"Mishra S, Bhattacharjya A (2013) Pattern analysis of cipher text: a combined approach. In: 2013 International conference on recent trends in information technology (ICRTIT). IEEE, pp 393\u2013398. https:\/\/doi.org\/10.1109\/ICRTIT.2013.6844236","DOI":"10.1109\/ICRTIT.2013.6844236"},{"key":"1212_CR19","doi-asserted-by":"publisher","first-page":"147","DOI":"10.11959\/j.issn.1000-436x.2015107","volume":"4","author":"Y Wu","year":"2015","unstructured":"Wu Y, Wang T, Xing M, Li J (2015) Recognition scheme of block cipher algorithm based on distribution characteristics of random metric of ciphertext. J Commun 4:147\u2013155. https:\/\/doi.org\/10.11959\/j.issn.1000-436x.2015107","journal-title":"J Commun"},{"issue":"2","key":"1212_CR20","doi-asserted-by":"publisher","first-page":"382","DOI":"10.11897\/SP.J.1016.2018.00382","volume":"41","author":"L Huang","year":"2018","unstructured":"Huang L, Zhao Z, Zhao Y (2018) A two-stage cryptosystem recognition scheme based on random forest. Chin J Comput 41(2):382\u2013399. https:\/\/doi.org\/10.11897\/SP.J.1016.2018.00382","journal-title":"Chin J Comput"},{"issue":"1","key":"1212_CR21","doi-asserted-by":"publisher","first-page":"139","DOI":"10.19678\/j.issn.1000-3428.0056918","volume":"47","author":"X Wang","year":"2021","unstructured":"Wang X, Chen Y, Wang Q, Chen J (2021) Cryptosystem identification scheme combining feature selection and ensemble learning. Comput Eng 47(1):139\u2013145. https:\/\/doi.org\/10.19678\/j.issn.1000-3428.0056918","journal-title":"Comput Eng"},{"key":"1212_CR22","doi-asserted-by":"publisher","first-page":"21364","DOI":"10.1109\/ACCESS.2023.3249753","volume":"11","author":"L Zhao","year":"2023","unstructured":"Zhao L, Chi Y, Xu Z, Yue Z (2023) Block cipher identification scheme based on hamming weight distribution. IEEE Access 11:21364\u201321373. https:\/\/doi.org\/10.1109\/ACCESS.2023.3249753","journal-title":"IEEE Access"},{"key":"1212_CR23","doi-asserted-by":"crossref","unstructured":"Rukhin A, Soto J, Nechvatal J, Smid M, Barker E, Leigh S, Levenson M, Vangel M, Banks D, Heckert N, Dray J, Vo S (2001) A statistical test suite for random and pseudorandom number generators for cryptographic applications. Special Publication (NIST SP), National Institute of Standards and Technology, Gaithersburg, MD, Washington DC","DOI":"10.6028\/NIST.SP.800-22"},{"issue":"6","key":"1212_CR24","first-page":"1453","volume":"29","author":"Q Minyong","year":"2008","unstructured":"Minyong Q, Jinxin D, Quanke P (2008) Research and design of sequence randomness test system in information security. Comput Eng Des 29(6):1453\u20131455 (CNKI:SUN:SJSJ.0.2008-06-042)","journal-title":"Comput Eng Des"},{"issue":"5","key":"1212_CR25","doi-asserted-by":"publisher","first-page":"46","DOI":"10.3778\/j.issn.1002-8331.2011.05.016","volume":"47","author":"J Liu","year":"2011","unstructured":"Liu J, Qu Q (2011) Randomness tests of several chaotic sequences. Jisuanji Gongcheng yu Yingyong (Comput Eng Appl) 47(5):46\u201349. https:\/\/doi.org\/10.3778\/j.issn.1002-8331.2011.05.016","journal-title":"Jisuanji Gongcheng yu Yingyong (Comput Eng Appl)"},{"issue":"20","key":"1212_CR26","doi-asserted-by":"publisher","first-page":"145","DOI":"10.3969\/j.issn.1000-3428.2009.20.051","volume":"35","author":"G Shi","year":"2009","unstructured":"Shi G, Kang F, Gu H (2009) Research and implementation of randomness tests. Comput Eng 35(20):145\u2013147. https:\/\/doi.org\/10.3969\/j.issn.1000-3428.2009.20.051","journal-title":"Comput Eng"},{"key":"1212_CR27","unstructured":"Liu Z (2011) The study of statistical tests of cryptographic algorithm. Master\u2019s thesis, Xidian University. 10.7666\/d.y1866917"},{"key":"1212_CR28","volume-title":"Advanced mathematical statistics","author":"S Mao","year":"2006","unstructured":"Mao S, Wang J, XL P (2006) Advanced mathematical statistics. Higher Education Press, Beijing"},{"key":"1212_CR29","volume-title":"Probability theory and mathematical statistics","author":"Z Sheng","year":"2001","unstructured":"Sheng Z (2001) Probability theory and mathematical statistics. Higher Education Press, Beijing"},{"key":"1212_CR30","unstructured":"Hongchao L (2018) Research on cryptographic algorithm recognition based on ciphertext feature. Master\u2019s thesis, Xidian University. CNKI:CDMD:2.1019.011746"},{"issue":"4","key":"1212_CR31","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1016\/j.ipm.2009.03.002","volume":"45","author":"M Sokolova","year":"2009","unstructured":"Sokolova M, Lapalme G (2009) A systematic analysis of performance measures for classification tasks. Inf Process Manag 45(4):427\u2013437. https:\/\/doi.org\/10.1016\/j.ipm.2009.03.002","journal-title":"Inf Process Manag"},{"issue":"4","key":"1212_CR32","doi-asserted-by":"publisher","first-page":"218","DOI":"10.15961\/j.jsuese.202100341","volume":"54","author":"K Yuan","year":"2022","unstructured":"Yuan K, Huang Y, Du Z, Li J, Jia C (2022) Block cipher algorithm identification scheme based on hybrid gradient boosting decision tree and logistic regression model. Adv Eng Sci 54(4):218\u2013227. https:\/\/doi.org\/10.15961\/j.jsuese.202100341","journal-title":"Adv Eng Sci"},{"key":"1212_CR33","doi-asserted-by":"publisher","first-page":"1110","DOI":"10.7717\/peerj-cs.1110","volume":"8","author":"K Yuan","year":"2022","unstructured":"Yuan K, Yu D, Feng J, Yang L, Jia C, Huang Y (2022) A block cipher algorithm identification scheme based on hybrid k-nearest neighbor and random forest algorithm. PeerJ Comput Sci 8:1110. https:\/\/doi.org\/10.7717\/peerj-cs.1110","journal-title":"PeerJ Comput Sci"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-023-01212-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-023-01212-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-023-01212-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,10]],"date-time":"2024-02-10T22:32:07Z","timestamp":1707604327000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-023-01212-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,21]]},"references-count":33,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["1212"],"URL":"https:\/\/doi.org\/10.1007\/s40747-023-01212-2","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,21]]},"assertion":[{"value":"11 December 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 August 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 August 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}