ISSN: 2245-4578 (Online Version) ISSN:2245-1439 (Print Version)
Security Assessment of Commercial Password Applications: A Framework that Integrates Randomness Visualization and Spatiotemporal Deep Learning
PDF
HTML

Keywords

Commercial cryptography
randomness test
spatiotemporal fusion
ResNet
transformer
deep learning

How to Cite

[1]
J. . Luo, F. . Hong, S. . Liu, Y. . Yang, and H. . Chi, “Security Assessment of Commercial Password Applications: A Framework that Integrates Randomness Visualization and Spatiotemporal Deep Learning”, JCSANDM, vol. 15, no. 02, pp. 273–302, Apr. 2026.

Abstract

To solve the compliance risks caused by “weak passwords”, “clear text transmission”, and algorithm misuse, and to help commercial passwords achieve automated and high-precision security assessment, this study proposes a “randomness-space-time” dual-axis fusion framework. This framework contains two core innovations: firstly, on the static ciphertext side, a “randomness visualization” strategy is proposed, which concatenates the NIST nine-term global randomness test values with local non-overlapping template matching results into a vector. After dimensionality reduction by an autoencoder, it is stacked with the original hexadecimal word throttling and bit accumulation graph to form a three-channel grayscale image, which is then input into the ResNet50 for fine-grained recognition of the encryption algorithm. Secondly, on the dynamic traffic side, a spatio-temporal parallel fusion network is designed, the session is fragmented into packet sequences, and “Attention-ResNet50” is run in parallel to extract the “spatial” texture features inside the packets. It uses the Transformer encoder to capture the “time” remote dependencies between data packets to achieve accurate identification of encryption protocols. The results showed that in ciphertext traffic detection, the recognition accuracy of ciphertext and traffic protocols reached 98.83% and 98.25%, both 3%–8% ahead of the control model. The single-sample inference delay was <5 ms, and the throughput was >240 sessions/s. This study couples randomness test statistics with deep vision-sequence models to achieve “ciphertext-traffic” dual-modal collaborative assessment, which can effectively provide compliance detection and defense technical guidance for commercial cryptography applications.

https://doi.org/10.13052/jcsm2245-1439.1521
PDF
HTML

References

Wiefling S, Jørgensen P R, Thunem S, Iacono L L. Pump up password security! Evaluating and enhancing risk-based authentication on a real-world large-scale online service. ACM Transactions on Privacy and Security, 2022, 26(1): 1–36. DOI: 10.1145/3546069.

Oladoyinbo T O, Oladoyinbo O B, Akinkunmi A I. The Importance Of Data Encryption Algorithm In Data Security. Current Journal of International Organization of Scientific Research Journal of Mobile Computing & Application (IOSRJMCA), 2024, 11(2): 10–16. DOI: 10.9790/0050-11021016.

Kumar M, Kondaiah C, Pais A R, Rao R S. Machine learning models for phishing detection from TLS traffic. Cluster Computing, 2023, 26(5), 3263–3277. DOI: 10.1007/s10586-023-04042-6.

Patel A K, Paul D, Giri S, Chaudhary S, Gautam B. Gradient-based facial encoding for key generation to encrypt and decrypt multimedia data. arXiv preprint arXiv:2412.06927, 2024. DOI: 10.48550/arXiv.2412.06927.

Shi W, Zhang J, Chen X, Ye X. PCDP-CRLPPM: a classified regional location privacy-protection model based on personalized clustering with differential privacy in data management. The Computer Journal, 2025, 68(4): 372–396. DOI: 10.1093/comjnl/bxae118.

Zhou L, Liu C, Tian L, Wang J, Liu C, Yu X. Network security analysis based on feature selection and optimized fireworks algorithm. Scientific Reports, 2025, 15(1): 44188. DOI: 10.1038/s41598-025-27855-4.

Wanjau S K, Wambugu G M, Oirere A M, Muketha G M. Discriminative spatial-temporal feature learning for modeling network intrusion detection systems. Journal of computer security, 2024, 32(1): 1–30. DOI: 10.3233/JCS-220031.

Baskar K, Muthumanickam K, Vijayalakshmi P, Kumarganesh S. A Strong Password Manager Using Multiple Encryption Techniques. Journal of The Institution of Engineers (India): Series B, 2025, 106(4): 1207–1214. DOI: 10.1007/s40031-024-01144-6.

Hughes J P, Diffie W. The Challenges of IoT, TLS, and Random Number Generators in the Real World: Bad random numbers are still with us and are proliferating in modern systems. Queue, 2022, 20(3): 18–40. DOI: 10.1145/3546933.

Kumbhakar D, Sanyal K, Karforma S. An optimal and efficient data security technique through crypto-stegano for E-commerce. Multimedia Tools and Applications, 2023, 82(14): 21005–21018. DOI: 10.1007/s11042-023-14526-7.

Chen, E. “Analysis of E-Commerce Security Protection Technology Based on YOLO Algorithm Optimized by Lightweight Neural Network”. Journal of Cyber Security and Mobility, 2025, 14 (04): 849–876, DOI: 10.13052/jcsm2245-1439.1444.

Rasheed A F, Zarkoosh M, Elia F R. Enhancing graphical password authentication system with deep learning-based arabic digit recognition. International journal of information technology, 2024, 16(3): 1419–1427. DOI: 10.1007/s41870-023-01561-8.

Singamaneni K K, Muhammad G, Ali Z. A novel multi-qubit quantum key distribution ciphertext-policy attribute-based encryption model to improve cloud security for consumers. IEEE Transactions on Consumer Electronics, 2023, 70(1): 1092–1101. DOI: 10.1109/TCE.2023.3331306.

HariKrishna A, Bindu D, Sowmya C, Varshitha G, Tharunasree C. Enhanced Secure Communication Protocol with Pipelined Advanced Encryption for Mobile Networks. Turkish Journal of Computer and Mathematics Education, 2024, 15(1): 205–211. DOI: 10.61841/turcomat.v15i1.14613.

Jean A, Alherbe T. Gid Crypto: Application for End-to-End Encrypt and Decrypt E-mail and Data. ASEAN Journal of Scientific and Technological Reports, 2024, 27(2): 90–102. DOI: 10.55164/ajstr.v27i2.251127.

Grammatopoulos A V, Politis I, Xenakis C. Blind software-assisted conformance and security assessment of FIDO2/WebAuthn implementations. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022, 13(2): 96–127. DOI: 10.22667/JOWUA.2022.06.30.096.

Seyhan K, Akleylek S. A new password-authenticated module learning with rounding-based key exchange protocol: Saber. PAKE. Journal of Supercomputing, 2023, 79(16): 17859–17896. DOI: 10.1007/s11227-023-05251-x.

Luo Y, Liu J, Gong C, Li T. An efficient heterogeneous parallel password recovery system on MT-3000. The Journal of Supercomputing, 2025, 81(1): 38. DOI: 10.1007/s11227-024-06532-9.

Adeniyi A E, Abiodun K M, Awotunde J B, Olagunju M, Ojo O S, Edet N P. Implementation of a block cipher algorithm for medical information security on cloud environment: using modified advanced encryption standard approach. Multimedia Tools and Applications, 2023, 82(13): 20537–20551. DOI: 10.1007/s11042-023-14338-9.

Kondaiah C, Pais A R, Rao R S. An ensemble learning approach for detecting phishing URLs in encrypted TLS traffic. Telecommunication Systems, 2024, 87(4): 1015–1031. DOI: 10.1007/s11235-024-01229-z.

Rajesh Kanna P, Santhi P. Exploring the landscape of network security: a comparative analysis of attack detection strategies. Journal of Ambient Intelligence and Humanized Computing, 2024, 15(8): 3211–3228. DOI: 10.1007/s12652-024-04794-y.

Abudalou M. Enhancing Data Security through Advanced Cryptographic Techniques. Int. J. Comput. Sci. Mob. Comput., 2024, 13(1): 88–92. DOI: 10.47760/ijcsmc.2024.v13i01.007.

Jangam S K. Importance of Encrypting Data in Transit and at Rest Using TLS and Other Security Protocols and API Security Best Practices. International Journal of AI, BigData, Computational and Management Studies, 2023, 4(3): 82–91. DOI: 10.63282/3050-9416.IJAIBDCMS-V4I3P109.

Salem R B, Aimeur E, Hage H. A Multi-Party Agent for Privacy Preference Elicitation. Artificial Intelligence and Applications, 2023, 1(2): 98–105. DOI: 10.47852/bonviewAIA2202514.

Ibrahım S, Zengin A, Hızal S, Akhter A S, Altunkaya C. A novel data encryption algorithm to ensure database security. Acta Infologica, 2023, 7(1): 1–16. DOI: 10.26650/acin.1134979.

Akshaya S. ResNet50-based deep convolutional neural network for zero-day attack prediction and detection. International Journal of Advanced Technology and Engineering Exploration, 2025, 12(124): 507. DOI: 10.19101/IJATEE.2024.111100055.

Yu W, Liu C, Ni L, et al. Password region attribute classification based on multi-granularity cascade fusion. Connection Science, 2025, 37(1): 2461092. DOI: 10.1080/09540091.2025.2461092.

Yılmaz A G, Turhal U, Nabiyev V. Multi-input hybrid face presentation attack detection method based on simplified Xception and channel attention mechanism. Expert Systems with Applications, 2025, 283: 127610. DOI: 10.1016/j.eswa.2025.127610.

Pan J, Chen Y, Zhao C, et al. Long Text Classification Model Based on Transformer Sliding Window and Threshold Optimization. Journal of Internet Technology, 2025, 26(2): 231–240. DOI: 10.70003/160792642025032602008.

Zhan M, Yang J, Jia D, Fu G. EAPT: An encrypted traffic classification model via adversarial pre-trained transformers. Computer Networks, 2025, 257: 110973. DOI: 10.1016/j.comnet.2024.110973.

Chen Z W, Wei X X, Wang Y S. Encrypted traffic classification encoder based on lightweight graph representation. Scientific Reports, 2025, 15(1): 28564. DOI: 10.1038/s41598-025-05225-4.

Peng Q, Fu X, Lin F, Zhu X, Ning J, Li F. Multi-Scale Convolutional Neural Networks optimized by elite strategy dung beetle optimization algorithm for encrypted traffic classification. Expert Systems with Applications, 2025, 264: 125729. DOI: 10.1016/j.eswa.2024.125729.

Xu S J, Kong K C, Jin X B, Geng G G. Unveiling traffic paths: Explainable path signature feature-based encrypted traffic classification. Computers & Security, 2025, 150: 104283. DOI: 10.1016/j.cose.2024.104283.

Liu Z, Xie Y, Luo Y, Wang Y, Ji X. TransECA-Net: A transformer-based model for encrypted traffic classification. Applied Sciences, 2025, 15(6): 2977. DOI: 10.3390/app15062977.

Zhang J, Zhao H, Feng Y, Cai Z, Zhu L. NetST: Network Encrypted Traffic Classification Based on Swin Transformer. Computers, Materials & Continua, 2025, 84(3). DOI: 10.32604/cmc.2025.066367.

Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

Copyright (c) 2026 Journal of Cyber Security and Mobility

Downloads

Download data is not yet available.