Cryptic Mining in Light of Artificial Intelligence

Abstract

The analysis of cryptic text is hard problem”, and there is no fixed algorithm for generating plain-text from cipher text. Human brains do this intelligently. The intelligent cryptic analysis process needs learning algorithms, co-operative effort of cryptanalyst and mechanism of knowledge based inference engine. This information of knowledge base will be useful for mining data(plain-text, key or cipher text plain-text relationships), classification of cipher text based on enciphering algorithms, key length or any other desirable parameters, clustering of cipher text based on similarity and extracting association rules for identifying weaknesses of cryptic algorithms. This categorization will be useful for placing given cipher text into a specific category or solving difficult level of cipher text-plain text conversion process. This paper elucidates cipher text-plain text process first than utilizes it to create a framework for AI-enabled-Cryptanalysis system. The process demonstrated in this paper attempts to analyze captured cipher from scratch. The system design elements presented in the paper gives all hints and guidelines for development of AI enabled Cryptic analysis tool.

Authors and Affiliations

Shaligram Prajapat, Aditi Thakur, Kajol Maheshwari, Ramjeevan Thakur

Keywords

Related Articles

Three-Phase Approach for Developing Suitable Business Models for Exchanging Federated ERP Components as Web Services

The importance of business models has increased significantly in the last decade, especially in the Internet. The cause of this increase is the effect of Internet and the associated applications and their business proces...

Performance of Spectral Angle Mapper and Parallelepiped Classifiers in Agriculture Hyperspectral Image

Hyperspectral Imaging (HSI) is used to provide a wealth of information which can be used to address a variety of problems in different applications. The main requirement in all applications is the classification of HSI d...

A Survey on Resource Allocation Strategies in Cloud Computing

Cloud computing has become a new age technology that has got huge potentials in enterprises and markets. Clouds can make it possible to access applications and associated data from anywhere. Companies are able to rent re...

A Mobile Robot Teleoperation System with a Wireless Communication Infrastructure using a Leaky Coaxial Cable based on TCP/IP

In this study, we propose and develop a wireless teleoperation system for mobile robots using a leaky coaxial cable (LCX) with a wireless communication infrastructure. In closed spaces resulting from disasters, some prob...

An Automated Advice Seeking and Filtering System

Advice seeking and knowledge exchanging over the Internet and social networks became a very common activity. The system proposed in this work aims to assist the users in choosing the best possible advice and allows them...

Download PDF file
  • EP ID EP163893
  • DOI 10.14569/IJACSA.2015.060808
  • Views 101
  • Downloads 0

How To Cite

Shaligram Prajapat, Aditi Thakur, Kajol Maheshwari, Ramjeevan Thakur (2015). Cryptic Mining in Light of Artificial Intelligence. International Journal of Advanced Computer Science & Applications, 6(8), 62-69. https://europub.co.uk/articles/-A-163893