Neural network-based symmetric encryption algorithm with encrypted traffic protocol identification
Cryptography is a cornerstone of power grid security, with the symmetry and asymmetry of cryptographic algorithms directly influencing the resilience of power systems against cyberattacks. Cryptographic algorithm identification, a critical component of cryptanalysis, is pivotal to assessing algorith...
Saved in:
| Main Authors: | Jiakai Hao, Ming Jin, Yuting Li, Yuxin Yang |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
PeerJ Inc.
2025-04-01
|
| Series: | PeerJ Computer Science |
| Subjects: | |
| Online Access: | https://peerj.com/articles/cs-2750.pdf |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Towards Analysable Chaos-based Cryptosystems: Constructing Difference Distribution Tables for Chaotic Maps
by: Je Sen Teh, et al.
Published: (2024-10-01) -
Cryptanalysis and improvement of an encryption scheme that uses elliptic curves over finite fields
by: Malik Zia, et al.
Published: (2021-12-01) -
DNA-Inspired Lightweight Cryptographic Algorithm for Secure and Efficient Image Encryption
by: Mahmoud A. Abdelaal, et al.
Published: (2025-04-01) -
Conic curve encryption and digital signature based on complex number theory for cybersecurity applications
by: Ahmed Kamal, et al.
Published: (2025-07-01) -
Two-Layer Security for Image Encryption: A Switched System Approach
by: Uyen L. P. Nguyen, et al.
Published: (2025-01-01)