Pub Date : 2024-09-19DOI: 10.1080/01611194.2024.2398100
Roland Long
Abraham Adrian Albert “A cubed” (1905–1972) was an algebraist best known academically for his study of associative and non-associative algebras. By the 1940s he had also developed an interest in cr...
亚伯拉罕-阿德里安-阿尔伯特 "A 立方"(1905-1972 年)是一位代数学家,以研究联立和非联立代数而闻名于世。到了 20 世纪 40 年代,他还对......
{"title":"The classified mathematical papers of A. A. Albert: a glimpse into the application of mathematics to cryptologic problems during the 1950s and 1960s","authors":"Roland Long","doi":"10.1080/01611194.2024.2398100","DOIUrl":"https://doi.org/10.1080/01611194.2024.2398100","url":null,"abstract":"Abraham Adrian Albert “A cubed” (1905–1972) was an algebraist best known academically for his study of associative and non-associative algebras. By the 1940s he had also developed an interest in cr...","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"80 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2024-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142259230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-09-13DOI: 10.1080/01611194.2024.2396805
Chris Christensen
Published in Cryptologia (Ahead of Print, 2024)
发表于《密码学》(2024 年提前出版)
{"title":"Review of The Hidden History of Code-Breaking and 50 Codes That Changed the World, both by Sinclair McKay","authors":"Chris Christensen","doi":"10.1080/01611194.2024.2396805","DOIUrl":"https://doi.org/10.1080/01611194.2024.2396805","url":null,"abstract":"Published in Cryptologia (Ahead of Print, 2024)","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"1 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142259232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-01DOI: 10.1080/01611194.2024.2372254
Eugen Antal, Paul Reuvers, Pavol Zajac
Condenser PBJ is a mechanical cipher machine developed by Pavel Baráček-Jacquier (1885-1969). It was created between 1922 and 1924, and was used by the Czechoslovak diplomatic service until 1934. T...
{"title":"The Condenser PBJ cipher machine","authors":"Eugen Antal, Paul Reuvers, Pavol Zajac","doi":"10.1080/01611194.2024.2372254","DOIUrl":"https://doi.org/10.1080/01611194.2024.2372254","url":null,"abstract":"Condenser PBJ is a mechanical cipher machine developed by Pavel Baráček-Jacquier (1885-1969). It was created between 1922 and 1924, and was used by the Czechoslovak diplomatic service until 1934. T...","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"41 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142222946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-05DOI: 10.1080/01611194.2024.2340478
Tomi S. Melka, Robert M. Schoch
In this article, we document a small wooden relic from Rapa Nui (Easter Island) acquired by a crewmember of HMS Topaze during the ship’s visit to the island in 1868. Despite its otherwise unassumin...
{"title":"The “Topaze stick fragment”—a newly discovered rongorongo-inscribed artifact collected during the Rapa Nui (Easter Island) visit of HMS Topaze in 1868","authors":"Tomi S. Melka, Robert M. Schoch","doi":"10.1080/01611194.2024.2340478","DOIUrl":"https://doi.org/10.1080/01611194.2024.2340478","url":null,"abstract":"In this article, we document a small wooden relic from Rapa Nui (Easter Island) acquired by a crewmember of HMS Topaze during the ship’s visit to the island in 1868. Despite its otherwise unassumin...","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"9 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141567459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-11DOI: 10.1080/01611194.2024.2351117
Christian Millichap, Yeeka Yau
In this article, we create an artificial neural network (ANN) that combines both classical and modern techniques for determining the key length of a Vigenère cipher. We provide experimental evidenc...
{"title":"An artificial neural network approach to finding the key length of the Vigenère cipher","authors":"Christian Millichap, Yeeka Yau","doi":"10.1080/01611194.2024.2351117","DOIUrl":"https://doi.org/10.1080/01611194.2024.2351117","url":null,"abstract":"In this article, we create an artificial neural network (ANN) that combines both classical and modern techniques for determining the key length of a Vigenère cipher. We provide experimental evidenc...","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"6 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2024-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141506930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-14DOI: 10.1080/01611194.2024.2328548
Gautham Sekar, Mabin Joseph, R. Balasubramanian
Streebog is a family of hash functions defined in the Russian cryptographic standard GOST R 34.11–2012. HMAC-Streebog, which is defined in RFC 7836, is a Streebog-based message authentication code....
{"title":"Fault-assisted side-channel analysis of HMAC-Streebog","authors":"Gautham Sekar, Mabin Joseph, R. Balasubramanian","doi":"10.1080/01611194.2024.2328548","DOIUrl":"https://doi.org/10.1080/01611194.2024.2328548","url":null,"abstract":"Streebog is a family of hash functions defined in the Russian cryptographic standard GOST R 34.11–2012. HMAC-Streebog, which is defined in RFC 7836, is a Streebog-based message authentication code....","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"33 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2024-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140568218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-03DOI: 10.1080/01611194.2024.2320362
Orhun Kara
In this work, we examine the security of the 8-round AES, under the known plaintext attack scenario, a type of cryptographic attack in which an attacker has access to the plaintext and correspondin...
{"title":"Square impossible differential attack and security of AES in known plaintext scenario","authors":"Orhun Kara","doi":"10.1080/01611194.2024.2320362","DOIUrl":"https://doi.org/10.1080/01611194.2024.2320362","url":null,"abstract":"In this work, we examine the security of the 8-round AES, under the known plaintext attack scenario, a type of cryptographic attack in which an attacker has access to the plaintext and correspondin...","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"92 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2024-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140568228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-23DOI: 10.1080/01611194.2024.2320368
Vasily Mikhalev, Nils Kopal, Bernhard Esslinger
In the rapidly advancing domain of artificial intelligence, ChatGPT, powered by the GPT-4 model, has emerged as a state-of-the-art interactive agent, exhibiting substantial capabilities across vari...
{"title":"Evaluating GPT-4’s proficiency in addressing cryptography examinations","authors":"Vasily Mikhalev, Nils Kopal, Bernhard Esslinger","doi":"10.1080/01611194.2024.2320368","DOIUrl":"https://doi.org/10.1080/01611194.2024.2320368","url":null,"abstract":"In the rapidly advancing domain of artificial intelligence, ChatGPT, powered by the GPT-4 model, has emerged as a state-of-the-art interactive agent, exhibiting substantial capabilities across vari...","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"24 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2024-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140201924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-19DOI: 10.1080/01611194.2024.2321963
Chris Christensen
Published in Cryptologia (Ahead of Print, 2024)
发表于《密码学》(2024 年提前出版)
{"title":"Review of Arctic Convoys by David Kenyon","authors":"Chris Christensen","doi":"10.1080/01611194.2024.2321963","DOIUrl":"https://doi.org/10.1080/01611194.2024.2321963","url":null,"abstract":"Published in Cryptologia (Ahead of Print, 2024)","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"199 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2024-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140168081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-14DOI: 10.1080/01611194.2024.2327725
Published in Cryptologia (Ahead of Print, 2024)
发表于《密码学》(2024 年提前出版)
{"title":"The Immortal David Kahn","authors":"","doi":"10.1080/01611194.2024.2327725","DOIUrl":"https://doi.org/10.1080/01611194.2024.2327725","url":null,"abstract":"Published in Cryptologia (Ahead of Print, 2024)","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"116 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2024-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140151413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}