Neural network-based symmetric encryption algorithm with encrypted traffic protocol identification

Cryptography is a cornerstone of power grid security, with the symmetry and asymmetry of cryptographic algorithms directly influencing the resilience of power systems against cyberattacks. Cryptographic algorithm identification, a critical component of cryptanalysis, is pivotal to assessing algorith...

Full description

Saved in:
Bibliographic Details
Main Authors: Jiakai Hao, Ming Jin, Yuting Li, Yuxin Yang
Format: Article
Language:English
Published: PeerJ Inc. 2025-04-01
Series:PeerJ Computer Science
Subjects:
Online Access:https://peerj.com/articles/cs-2750.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!