Klasifikasi Algoritma Kriptografi pada Pesan Terenkripsi menggunakan Support Vector Machine (SVM)
DOI:
https://doi.org/10.37859/jf.v15i3.10843
Abstract
Data protection has become a highly critical aspect, particularly in addressing ransomware threats that illegally encrypt data. This study is important to evaluate the capability of machine learning techniques in identifying encryption algorithms used in encrypted data, especially in ransomware attacks. This work represents an initial step that can assist cybersecurity practitioners in more rapidly understanding attack patterns, determining appropriate response strategies, and enhancing proactive mitigation and response efforts to protect data against increasingly complex cyber threats. The machine learning algorithm employed in this study is the Support Vector Machine (SVM). The dataset consists of ciphertext generated using the AES, DES, and Vigenère Cipher cryptographic algorithms. The feature extraction process utilizes ten statistical features to capture the distinctive patterns of each type of ciphertext. The SVM model is developed using a data split of 90% for training and 10% for testing. Performance evaluation is conducted using a confusion matrix with accuracy, precision, recall, and F1-score metrics. The result demonstrate an average accuracy 0f 92,33%, with the vigenere cipher being perfectly classified (100% accuracy). Howefer, slight misclassifications occured beetween AES and DES duet o their similiar entropy chraracteristic. Experimental results demonstrate that the SVM model is capable of identifying encryption algorithms with high accuracy and balanced classification performance across the three algorithm classes. These findings highlight the potential of machine learning approaches for detecting encryption algorithms in cyber-attacks, thereby making a meaningful contribution to the improvement of proactive data security mitigation and response strategies.
Downloads
References
L. Septiani, “Kronologi Pusat Data Nasional Diretas hingga Pejabat Kominfo Mundur.” [Online]. Available: https://katadata.co.id/digital/teknologi/66862b8b7f375/kronologi-pusat-data-nasional-diretas-hingga-pejabat-kominfo-mundur
G. W. Wahidin, S. Syaifuddin, and Z. Sari, “Analisis Ransomware Wannacry Menggunakan Aplikasi Cuckoo Sandbox,” J. Repos., vol. 4, no. 1, pp. 83–94, 2022, doi: 10.22219/repositor.v4i1.1373.
Y. Zhao and S. Fan, “Analysis of cryptosystem recognition scheme based on Euclidean distance feature extraction in three machine learning classifiers,” J. Phys. Conf. Ser., vol. 1314, no. 1, 2019, doi: 10.1088/1742-6596/1314/1/012184.
W. Stallings, the William Stallings Books on Computer Data and Computer Communications , Eighth Edition, 5th ed. New York: Pearson, 2011.
A. Benamira, D. Gerault, T. Peyrin, and Q. Quan Tan, “A Deeper Look at Machine Learning-Based Cryptanalysis,” in Advances in Cryptology – EUROCRYPT 2021, Springer, Cham, 2021, pp. 805–835. doi: https://doi.org/10.1007/978-3-030-77870-5_28.
J. So, “Deep Learning-Based Cryptanalysis of Lightweight Block Ciphers,” Secur. Commun. Networks, vol. 2020, 2020, doi: 10.1155/2020/3701067.
Y. Fatma, R. Wardoyo, and H. Mukhtar, “An Approach to Cryptography Based on Neural Network,” AIP Conf. Proc., vol. 2601, no. 1, pp. 1–9, 2023, doi: 10.1063/5.0130464.
R. L. Rivest, “Cryptography and machine learning,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 739 LNCS, pp. 412–426, 1993, doi: 10.1007/3-540-57332-1_36.
S. Baek and K. Kim, “Recent Advances of Neural Attacks against Block Ciphers,” in Symposium on Cryptography and Information Security (SCIS 2020), Kochi, Japan: IEICE Technical Committee on Information Security, 2020. [Online]. Available: https://caislab.kaist.ac.kr/publication/paper_files/2020/scis2020_SG.pdf
E. M. Meno, “Neural Cryptanalysis for Cyber-Physical System Ciphers,” Virginia Polytechnic Institute and State University, 2021. [Online]. Available: https://vtechworks.lib.vt.edu/handle/10919/103373%0Ahttps://vtechworks.lib.vt.edu/bitstream/handle/10919/103373/Meno_EM_T_2021.pdf?sequence=1
B. Y. Chong and I. Salam, “Investigating deep learning approaches on the security analysis of cryptographic algorithms,” Cryptography, vol. 5, no. 4, pp. 1–20, 2021, doi: 10.3390/cryptography5040030.
Uci Julya Ningsih, Sophia Salsabila, Isniar Hutapea, Dewi Santika, and Indra Gunawan, “Pendekripsian Caesar Chiper Dengan Menggunakan Teknik-Teknik Kriptanalisis,” J. Ilmu Komput. dan Multimed., vol. 1, no. 1, pp. 11–15, 2024, doi: 10.46510/ilkomedia.v1i1.10.
M. W. Kurniaga, A. Yulianto, and T. Setya Aji Kumoro, “Kriptanalisis DES menggunakan Jaringan Syaraf Tiruan,” Fidel. J. Tek. Elektro, vol. 4, no. 2, pp. 40–44, 2022, doi: 10.52005/fidelity.v4i2.89.
N. R. Krishna, “Classifying Classic Ciphers using Machine Learning,” 2019.
Ernst Leierzopf, Nils Kopal, Bernhard Esslinger, Harald Lampesberger, and Eckehard Hermann, “A Massive Machine-Learning Approach For Classical Cipher Type Detection Using Feature Engineering,” Proc. 4th Int. Conf. Hist. Cryptol. HistoCrypt 2020, vol. 183, pp. 111–120, 2021, doi: 10.3384/ecp183164.
K. Begovic, A. Al-Ali, and Q. Malluhi, “Cryptographic ransomware encryption detection: Survey,” Comput. Secur., vol. 132, no. February 2022, 2023, doi: 10.1016/j.cose.2023.103349.
R. Nanda, E. Haerani, S. K. Gusti, and S. Ramadhani, “Klasifikasi Berita Menggunakan Metode Support Vector Machine,” J. Nas. Komputasi dan Teknol. Inf., vol. 5, no. 2, pp. 269–278, 2022, doi: 10.32672/jnkti.v5i2.4193.
F. Abdusyukur, “Penerapan Algoritma Support Vector Machine (Svm) Untuk Klasifikasi Pencemaran Nama Baik Di Media Sosial Twitter,” Komputa J. Ilm. Komput. dan Inform., vol. 12, no. 1, pp. 73–82, 2023, doi: 10.34010/komputa.v12i1.9418.
F. Putrawansyah, “Penerapan Metode Support Vector Machine Terhadap Klasifikasi Jenis Jambu Biji,” JIKO (Jurnal Inform. dan Komputer), vol. 8, no. 1, p. 193, 2024, doi: 10.26798/jiko.v8i1.988.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Yulia Fatma, Rahmad Gunawan, Nurkhairi Fitri, Rahmad Firdaus, Regiolina Hayami, Soni Soni

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Copyright Notice
An author who publishes in the Jurnal FASILKOM (teknologi inFormASi dan ILmu KOMputer) agrees to the following terms:
- Author retains the copyright and grants the journal the right of first publication of the work simultaneously licensed under the Creative Commons Attribution-ShareAlike 4.0 License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal
- Author is able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book) with the acknowledgement of its initial publication in this journal.
- Author is permitted and encouraged to post his/her work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of the published work (See The Effect of Open Access).
Read more about the Creative Commons Attribution-ShareAlike 4.0 Licence here: https://creativecommons.org/licenses/by-sa/4.0/.










_(1).png)



