Klasifikasi Algoritma Kriptografi pada Pesan Terenkripsi menggunakan Support Vector Machine (SVM)

Authors

  • Yulia Fatma Universitas Muhammadiyah Riau
  • Rahmad Gunawan Universitas Muhammadiyah Riau
  • Nurkhairi Fitri Universitas Muhammadiyah Riau
  • Rahmad Firdaus Universitas Muhammadiyah Riau
  • Regiolina Hayami Universitas Muhammadiyah Riau
  • Soni Soni Universitas Muhammadiyah Riau

DOI:

https://doi.org/10.37859/jf.v15i3.10843
Keywords: cryptanalysis, support vector machine (SVM), AES, DES, Vigenère

Abstract

Data protection has become a highly critical aspect, particularly in addressing ransomware threats that illegally encrypt data. This study is important to evaluate the capability of machine learning techniques in identifying encryption algorithms used in encrypted data, especially in ransomware attacks. This work represents an initial step that can assist cybersecurity practitioners in more rapidly understanding attack patterns, determining appropriate response strategies, and enhancing proactive mitigation and response efforts to protect data against increasingly complex cyber threats. The machine learning algorithm employed in this study is the Support Vector Machine (SVM). The dataset consists of ciphertext generated using the AES, DES, and Vigenère Cipher cryptographic algorithms. The feature extraction process utilizes ten statistical features to capture the distinctive patterns of each type of ciphertext. The SVM model is developed using a data split of 90% for training and 10% for testing. Performance evaluation is conducted using a confusion matrix with accuracy, precision, recall, and F1-score metrics. The result demonstrate an average accuracy 0f 92,33%, with the vigenere cipher being perfectly classified (100% accuracy). Howefer, slight misclassifications occured beetween AES and DES duet o their similiar entropy chraracteristic. Experimental results demonstrate that the SVM model is capable of identifying encryption algorithms with high accuracy and balanced classification performance across the three algorithm classes. These findings highlight the potential of machine learning approaches for detecting encryption algorithms in cyber-attacks, thereby making a meaningful contribution to the improvement of proactive data security mitigation and response strategies.

Downloads

Download data is not yet available.

References

L. Septiani, “Kronologi Pusat Data Nasional Diretas hingga Pejabat Kominfo Mundur.” [Online]. Available: https://katadata.co.id/digital/teknologi/66862b8b7f375/kronologi-pusat-data-nasional-diretas-hingga-pejabat-kominfo-mundur

G. W. Wahidin, S. Syaifuddin, and Z. Sari, “Analisis Ransomware Wannacry Menggunakan Aplikasi Cuckoo Sandbox,” J. Repos., vol. 4, no. 1, pp. 83–94, 2022, doi: 10.22219/repositor.v4i1.1373.

Y. Zhao and S. Fan, “Analysis of cryptosystem recognition scheme based on Euclidean distance feature extraction in three machine learning classifiers,” J. Phys. Conf. Ser., vol. 1314, no. 1, 2019, doi: 10.1088/1742-6596/1314/1/012184.

W. Stallings, the William Stallings Books on Computer Data and Computer Communications , Eighth Edition, 5th ed. New York: Pearson, 2011.

A. Benamira, D. Gerault, T. Peyrin, and Q. Quan Tan, “A Deeper Look at Machine Learning-Based Cryptanalysis,” in Advances in Cryptology – EUROCRYPT 2021, Springer, Cham, 2021, pp. 805–835. doi: https://doi.org/10.1007/978-3-030-77870-5_28.

J. So, “Deep Learning-Based Cryptanalysis of Lightweight Block Ciphers,” Secur. Commun. Networks, vol. 2020, 2020, doi: 10.1155/2020/3701067.

Y. Fatma, R. Wardoyo, and H. Mukhtar, “An Approach to Cryptography Based on Neural Network,” AIP Conf. Proc., vol. 2601, no. 1, pp. 1–9, 2023, doi: 10.1063/5.0130464.

R. L. Rivest, “Cryptography and machine learning,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 739 LNCS, pp. 412–426, 1993, doi: 10.1007/3-540-57332-1_36.

S. Baek and K. Kim, “Recent Advances of Neural Attacks against Block Ciphers,” in Symposium on Cryptography and Information Security (SCIS 2020), Kochi, Japan: IEICE Technical Committee on Information Security, 2020. [Online]. Available: https://caislab.kaist.ac.kr/publication/paper_files/2020/scis2020_SG.pdf

E. M. Meno, “Neural Cryptanalysis for Cyber-Physical System Ciphers,” Virginia Polytechnic Institute and State University, 2021. [Online]. Available: https://vtechworks.lib.vt.edu/handle/10919/103373%0Ahttps://vtechworks.lib.vt.edu/bitstream/handle/10919/103373/Meno_EM_T_2021.pdf?sequence=1

B. Y. Chong and I. Salam, “Investigating deep learning approaches on the security analysis of cryptographic algorithms,” Cryptography, vol. 5, no. 4, pp. 1–20, 2021, doi: 10.3390/cryptography5040030.

Uci Julya Ningsih, Sophia Salsabila, Isniar Hutapea, Dewi Santika, and Indra Gunawan, “Pendekripsian Caesar Chiper Dengan Menggunakan Teknik-Teknik Kriptanalisis,” J. Ilmu Komput. dan Multimed., vol. 1, no. 1, pp. 11–15, 2024, doi: 10.46510/ilkomedia.v1i1.10.

M. W. Kurniaga, A. Yulianto, and T. Setya Aji Kumoro, “Kriptanalisis DES menggunakan Jaringan Syaraf Tiruan,” Fidel. J. Tek. Elektro, vol. 4, no. 2, pp. 40–44, 2022, doi: 10.52005/fidelity.v4i2.89.

N. R. Krishna, “Classifying Classic Ciphers using Machine Learning,” 2019.

Ernst Leierzopf, Nils Kopal, Bernhard Esslinger, Harald Lampesberger, and Eckehard Hermann, “A Massive Machine-Learning Approach For Classical Cipher Type Detection Using Feature Engineering,” Proc. 4th Int. Conf. Hist. Cryptol. HistoCrypt 2020, vol. 183, pp. 111–120, 2021, doi: 10.3384/ecp183164.

K. Begovic, A. Al-Ali, and Q. Malluhi, “Cryptographic ransomware encryption detection: Survey,” Comput. Secur., vol. 132, no. February 2022, 2023, doi: 10.1016/j.cose.2023.103349.

R. Nanda, E. Haerani, S. K. Gusti, and S. Ramadhani, “Klasifikasi Berita Menggunakan Metode Support Vector Machine,” J. Nas. Komputasi dan Teknol. Inf., vol. 5, no. 2, pp. 269–278, 2022, doi: 10.32672/jnkti.v5i2.4193.

F. Abdusyukur, “Penerapan Algoritma Support Vector Machine (Svm) Untuk Klasifikasi Pencemaran Nama Baik Di Media Sosial Twitter,” Komputa J. Ilm. Komput. dan Inform., vol. 12, no. 1, pp. 73–82, 2023, doi: 10.34010/komputa.v12i1.9418.

F. Putrawansyah, “Penerapan Metode Support Vector Machine Terhadap Klasifikasi Jenis Jambu Biji,” JIKO (Jurnal Inform. dan Komputer), vol. 8, no. 1, p. 193, 2024, doi: 10.26798/jiko.v8i1.988.

Downloads

Published

2026-01-11