is there any research on detecting the encryption system or authentication mechanism over a cipher text?

assuming we have access to the key of a cipher text, we would like to apply the proper deciphering algorithm to access the plain text.

encryption system include , algorithm, length of the key and number of iterations required for algorithm.

More Behrad Mahboobi's questions See All
Similar questions and discussions