首页 > 最新文献

Cryptologia最新文献

英文 中文
How we set new world records in breaking Playfair ciphertexts 我们是如何在破解游戏密文方面创造新的世界纪录的
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-08-13 DOI: 10.1080/01611194.2021.1905734
Elonka Dunin, Magnus Ekhall, Konstantin Hamidullin, Nils Kopal, G. Lasry, Klaus Schmeh
Abstract The Playfair cipher is a well-known manual encryption method developed in the 19th century. Until 2018, known cryptanalysis techniques, with computer assistance, could solve non-keyword-based Playfair ciphertexts if they had at least 60 letters to work with. Shorter ciphertexts were effectively impossible to solve in the absence of a crib. In this article, we show how we introduced several improvements in these cryptanalysis methods, which made it possible to do much better. This resulted in the (unofficial) world record for the shortest Playfair message broken going down from 60 via 50, 40, 32, and 28 to 26 letters. The cryptanalysis techniques used include hill climbing, simulated annealing, tabu search, and plaintext-based dictionary attacks. For readers interested in improving the current record, we also provide unsolved Playfair challenges consisting of 24 and 22 letters.
摘要Playfair密码是19世纪发展起来的一种著名的手动加密方法。直到2018年,已知的密码分析技术在计算机辅助下,如果有至少60个字母可供使用,就可以解决非基于关键字的Playfair密文。在没有婴儿床的情况下,较短的密文实际上是不可能解决的。在这篇文章中,我们展示了我们是如何在这些密码分析方法中引入一些改进的,这些改进使我们有可能做得更好。这导致Playfair最短信息的(非官方)世界纪录从60个字母减少到50个、40个、32个和28个,减少到26个。使用的密码分析技术包括爬山、模拟退火、禁忌搜索和基于明文的字典攻击。对于有兴趣改进当前记录的读者,我们还提供了由24封和22封信件组成的未解决的Playfair挑战。
{"title":"How we set new world records in breaking Playfair ciphertexts","authors":"Elonka Dunin, Magnus Ekhall, Konstantin Hamidullin, Nils Kopal, G. Lasry, Klaus Schmeh","doi":"10.1080/01611194.2021.1905734","DOIUrl":"https://doi.org/10.1080/01611194.2021.1905734","url":null,"abstract":"Abstract The Playfair cipher is a well-known manual encryption method developed in the 19th century. Until 2018, known cryptanalysis techniques, with computer assistance, could solve non-keyword-based Playfair ciphertexts if they had at least 60 letters to work with. Shorter ciphertexts were effectively impossible to solve in the absence of a crib. In this article, we show how we introduced several improvements in these cryptanalysis methods, which made it possible to do much better. This resulted in the (unofficial) world record for the shortest Playfair message broken going down from 60 via 50, 40, 32, and 28 to 26 letters. The cryptanalysis techniques used include hill climbing, simulated annealing, tabu search, and plaintext-based dictionary attacks. For readers interested in improving the current record, we also provide unsolved Playfair challenges consisting of 24 and 22 letters.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"46 1","pages":"302 - 322"},"PeriodicalIF":0.6,"publicationDate":"2021-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44733319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Construction of cryptographically strong S-boxes from ternary quasigroups of order 4 从4阶三元拟群构造密码强s盒
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-07-26 DOI: 10.1080/01611194.2021.1934915
Dimpy Chauhan, Indivar Gupta, Pooja Mishra, Rashmi Verma
Abstract The security of block ciphers solely depends on the S-boxes used in their design. Hence, for a secure block cipher, S-boxes should be chosen very thoughtfully. n-ary quasigroups of different orders and for different values of n are being used to design various cryptographic primitives. In the literature, many algorithms based on the quasigroups have been proposed for the generation of S-boxes of order 4. However, in this article, we propose a general method for the construction of symmetric S-boxes of even order using ternary quasigroups of order 4 with certain properties. These S-boxes give strong resistance against linear, differential, algebraic, and DPA attacks and hence provide good cryptographic properties.
摘要分组密码的安全性完全取决于其设计中使用的S盒。因此,对于一个安全的分组密码,S盒应该经过深思熟虑的选择。不同阶和n的不同值的n元拟群被用于设计各种密码原语。在文献中,已经提出了许多基于拟群的生成4阶S盒的算法。然而,在本文中,我们提出了一种利用具有某些性质的4阶三元拟群构造偶数阶对称S盒的一般方法。这些S盒对线性、微分、代数和DPA攻击具有很强的抵抗力,因此提供了良好的密码特性。
{"title":"Construction of cryptographically strong S-boxes from ternary quasigroups of order 4","authors":"Dimpy Chauhan, Indivar Gupta, Pooja Mishra, Rashmi Verma","doi":"10.1080/01611194.2021.1934915","DOIUrl":"https://doi.org/10.1080/01611194.2021.1934915","url":null,"abstract":"Abstract The security of block ciphers solely depends on the S-boxes used in their design. Hence, for a secure block cipher, S-boxes should be chosen very thoughtfully. n-ary quasigroups of different orders and for different values of n are being used to design various cryptographic primitives. In the literature, many algorithms based on the quasigroups have been proposed for the generation of S-boxes of order 4. However, in this article, we propose a general method for the construction of symmetric S-boxes of even order using ternary quasigroups of order 4 with certain properties. These S-boxes give strong resistance against linear, differential, algebraic, and DPA attacks and hence provide good cryptographic properties.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"46 1","pages":"525 - 551"},"PeriodicalIF":0.6,"publicationDate":"2021-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/01611194.2021.1934915","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46704637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
FCSR connection integers: efficient generation, testing and counting FCSR连接整数:高效生成、测试、计数
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-07-20 DOI: 10.1080/01611194.2021.1914775
P. Mishra, S. Ramola
Abstract The period of a binary sequence generated by feedback with carry shift register (FCSR) depends on the connection integer (q) of the register. We define FCSR primes as primes generating maximum possible period sequences when used as connection integer of an FCSR. Hence, to design good FCSR pseudorandom generators, one needs suitable feedback primes. The authors of this article study some properties about these primes and give algorithms to generate some of them. The first algorithm is somewhat straightforward and is based on the criterion given in Arnault and Berger. We propose two new algorithms for the efficient generation of FCSR primes. Comparison between these algorithms, supported by experimental and analytical results is presented. Further, we address the question of quantification of such primes and derive some explicit bounds.
摘要进位移位寄存器(FCSR)反馈产生的二进制序列的周期取决于寄存器的连接整数(q)。我们将FCSR素数定义为当用作FCSR的连接整数时生成最大可能周期序列的素数。因此,要设计好的FCSR伪随机发生器,需要合适的反馈素数。本文研究了这些素数的一些性质,并给出了生成这些素数的算法。第一种算法有点简单,基于Arnault和Berger中给出的标准。我们提出了两种有效生成FCSR素数的新算法。在实验和分析结果的支持下,对这些算法进行了比较。此外,我们讨论了这些素数的量化问题,并导出了一些显式边界。
{"title":"FCSR connection integers: efficient generation, testing and counting","authors":"P. Mishra, S. Ramola","doi":"10.1080/01611194.2021.1914775","DOIUrl":"https://doi.org/10.1080/01611194.2021.1914775","url":null,"abstract":"Abstract The period of a binary sequence generated by feedback with carry shift register (FCSR) depends on the connection integer (q) of the register. We define FCSR primes as primes generating maximum possible period sequences when used as connection integer of an FCSR. Hence, to design good FCSR pseudorandom generators, one needs suitable feedback primes. The authors of this article study some properties about these primes and give algorithms to generate some of them. The first algorithm is somewhat straightforward and is based on the criterion given in Arnault and Berger. We propose two new algorithms for the efficient generation of FCSR primes. Comparison between these algorithms, supported by experimental and analytical results is presented. Further, we address the question of quantification of such primes and derive some explicit bounds.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"46 1","pages":"439 - 460"},"PeriodicalIF":0.6,"publicationDate":"2021-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/01611194.2021.1914775","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43367190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deciphering the Voynich manuscript: propositions to unlock research 解读Voynich手稿:开启研究的命题
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-07-20 DOI: 10.1080/01611194.2021.1919944
François Parmentier
The Voynich Manuscript is a medieval book, whose text has continuously resisted decoding efforts for more than a century. First, propositions are made to insure a good overall quality of research about this manuscript. Next, two common assumptions, correspondingly about the manuscript writing system and the presence of labels, are questioned. As a result, a certain number of irregular forms of letters are pointed out and tentatively explained; and labels are found to be sometimes widespread words or refer to different objects (plants, stars…). Theoretical implications of such empirical findings are discussed, and call into question the validity of natural language hypothesis.
《伏尼契手稿》是一本中世纪的书,其文本在一个多世纪以来一直抵制解码工作。首先,提出了保证该手稿研究总体质量的建议。接下来,两个常见的假设,相应地关于手稿写作系统和标签的存在,都受到了质疑。从而指出并初步解释了一定数量的不规则字母形式;标签有时被发现是广泛使用的单词或指代不同的物体(植物、恒星…)。讨论了这些经验发现的理论含义,并对自然语言假说的有效性提出了质疑。
{"title":"Deciphering the Voynich manuscript: propositions to unlock research","authors":"François Parmentier","doi":"10.1080/01611194.2021.1919944","DOIUrl":"https://doi.org/10.1080/01611194.2021.1919944","url":null,"abstract":"The Voynich Manuscript is a medieval book, whose text has continuously resisted decoding efforts for more than a century. First, propositions are made to insure a good overall quality of research about this manuscript. Next, two common assumptions, correspondingly about the manuscript writing system and the presence of labels, are questioned. As a result, a certain number of irregular forms of letters are pointed out and tentatively explained; and labels are found to be sometimes widespread words or refer to different objects (plants, stars…). Theoretical implications of such empirical findings are discussed, and call into question the validity of natural language hypothesis.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"46 1","pages":"461 - 484"},"PeriodicalIF":0.6,"publicationDate":"2021-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/01611194.2021.1919944","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49601108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sources and methods: Searching for cryptologic records in the findings of post-World War II allied technical surveys and commissions 来源和方法:在二战后盟军技术调查和委员会的调查结果中搜索密码记录
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-07-04 DOI: 10.1080/01611194.2021.1921072
Robert J. Hanyok
Abstract At the end of World War II, the Allied Cryptologic agencies in the U.S.A. and U.K. realized that valuable intelligence about Axis codebreaking and other analytic methods, as well as knowledge about Axis cryptography, could be lost, either through destruction or capture by the Soviet Union. A special organization, known as the Target Intelligence Committee (TICOM), was organized to retrieve this information. Special teams followed Allied forces into former Axis territory, gathered captured records and equipment and interrogated Axis cryptographers about their methods, successes, and failures. In the United States, this material was retained by the National Security Agency until major releases of WWII records to the National Archives, beginning in the mid-1990s and continuing for approximately another 20 years. TICOM records constitute a critical resource to understanding the dynamics of the struggle between those charged with protecting communications, the secrets they hold, and those with the mandate to discover those secrets.
摘要第二次世界大战结束时,美国和英国的加密联盟机构意识到,关于轴心国密码破解和其他分析方法的宝贵情报,以及关于轴心国加密的知识,可能会因苏联的破坏或捕获而丢失。一个被称为目标情报委员会(TICOM)的特殊组织被组织起来检索这些信息。特种小组跟随盟军进入前轴心国领土,收集缴获的记录和设备,并询问轴心国密码学家的方法、成功和失败。在美国,这些材料一直由国家安全局保留,直到第二次世界大战记录被国家档案馆大规模公布,从20世纪90年代中期开始,并持续了大约20年。TICOM记录是了解负责保护通信的人、他们所掌握的秘密和有权发现这些秘密的人之间斗争动态的关键资源。
{"title":"Sources and methods: Searching for cryptologic records in the findings of post-World War II allied technical surveys and commissions","authors":"Robert J. Hanyok","doi":"10.1080/01611194.2021.1921072","DOIUrl":"https://doi.org/10.1080/01611194.2021.1921072","url":null,"abstract":"Abstract At the end of World War II, the Allied Cryptologic agencies in the U.S.A. and U.K. realized that valuable intelligence about Axis codebreaking and other analytic methods, as well as knowledge about Axis cryptography, could be lost, either through destruction or capture by the Soviet Union. A special organization, known as the Target Intelligence Committee (TICOM), was organized to retrieve this information. Special teams followed Allied forces into former Axis territory, gathered captured records and equipment and interrogated Axis cryptographers about their methods, successes, and failures. In the United States, this material was retained by the National Security Agency until major releases of WWII records to the National Archives, beginning in the mid-1990s and continuing for approximately another 20 years. TICOM records constitute a critical resource to understanding the dynamics of the struggle between those charged with protecting communications, the secrets they hold, and those with the mandate to discover those secrets.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"45 1","pages":"371 - 378"},"PeriodicalIF":0.6,"publicationDate":"2021-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/01611194.2021.1921072","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47137828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
In memoriam: Thomas Ralph Erskine CB (1933 – 2021) 纪念:托马斯·拉尔夫·厄斯金CB (1933 - 2021)
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-07-04 DOI: 10.1080/01611194.2021.1935363
Frode Weierud
Ralph passed away in his sleep on Friday 9 April 2021 at the age of 87. Only days before he was in contact with his friends, busy writing up some of his research for yet another publication and reviewing articles of his colleagues. The news of his untimely death therefore came as a great shock to us all. Ralph was born in Belfast in Northern Ireland on 14 October 1933. His parents were Robert Todd Erskine, a Belfast businessman, and Mary Edith Erskine, n ee Motherwell. He was one of four children: Robert Alan, who died in early childhood, Ann, who passed away in 2020, and Ruth. In 1941, at the age of eight, he started at Portora Royal School, a boarding school in Enniskillen 130 km west of Belfast, which has educated many well-known Irishmen among them Samuel Becket and Oscar Wilde. Boarding school must have been a challenging experience for a boy of that age, especially when being rather shy. In September 1947 he left for Campbell College in Belfast, a grammar school for boys now open to both day and boarding students. In 1947 it was primarily a boarding school and Ralph was lodged in Yate’s house. In his teens he contracted tuberculosis a disease not so uncommon in those days. This resulted in Ralph spending a year and a half in the hospital, something that must have been a harrowing experience at such a young age. He later expressed that he considered himself lucky because many in his hospital ward did not survive. However, the illness had its impact on his life. Many things, such as running to catch the bus, he was not able to do; it was not until his late twenties that such physical exercise again became possible. Ralph had a keen intellect, and he did well in school. In July 1949 he left Campbell College to enter Queen’s University in Belfast to study law. He graduated in 1955 with a very good law degree, LLB. On 1 July 1957 Ralph
拉尔夫于2021年4月9日星期五在睡梦中去世,享年87岁。就在几天前,他还在和朋友们联系,忙着为另一份出版物撰写他的一些研究报告,并审阅同事们的文章。因此,他英年早逝的消息使我们大家大为震惊。1933年10月14日,拉尔夫出生于北爱尔兰的贝尔法斯特。他的父母是贝尔法斯特商人罗伯特·托德·厄斯金和马瑟韦尔的玛丽·伊迪丝·厄斯金。他有四个孩子:罗伯特·艾伦(Robert Alan)很小就去世了,安(Ann)于2020年去世,露丝(Ruth)。1941年,8岁的他进入波尔图拉皇家学校,这是一所寄宿学校,位于贝尔法斯特以西130公里的恩尼斯基林,培养了许多著名的爱尔兰人,其中包括塞缪尔·贝克特和奥斯卡·王尔德。寄宿学校对那个年龄的男孩来说一定是一段充满挑战的经历,尤其是当他相当害羞的时候。1947年9月,他去了贝尔法斯特的坎贝尔学院,这是一所男生文法学校,现在既招收走读学生,也招收寄宿学生。1947年,它主要是一所寄宿学校,拉尔夫住在耶特的家里。在他十几岁的时候,他染上了肺结核,这种病在当时并不罕见。这导致拉尔夫在医院里住了一年半,对他这么小的孩子来说,这一定是一段痛苦的经历。他后来表示,他认为自己很幸运,因为他病房里的许多人都没有活下来。然而,疾病对他的生活产生了影响。很多事情,比如跑去赶公共汽车,他都做不到;直到他快30岁的时候,这种体育锻炼才再次成为可能。拉尔夫有敏锐的才智,他在学校表现很好。1949年7月,他离开坎贝尔学院,进入贝尔法斯特女王大学学习法律。他于1955年毕业,获得了非常好的法学学士学位。1957年7月1日,拉尔夫
{"title":"In memoriam: Thomas Ralph Erskine CB (1933 – 2021)","authors":"Frode Weierud","doi":"10.1080/01611194.2021.1935363","DOIUrl":"https://doi.org/10.1080/01611194.2021.1935363","url":null,"abstract":"Ralph passed away in his sleep on Friday 9 April 2021 at the age of 87. Only days before he was in contact with his friends, busy writing up some of his research for yet another publication and reviewing articles of his colleagues. The news of his untimely death therefore came as a great shock to us all. Ralph was born in Belfast in Northern Ireland on 14 October 1933. His parents were Robert Todd Erskine, a Belfast businessman, and Mary Edith Erskine, n ee Motherwell. He was one of four children: Robert Alan, who died in early childhood, Ann, who passed away in 2020, and Ruth. In 1941, at the age of eight, he started at Portora Royal School, a boarding school in Enniskillen 130 km west of Belfast, which has educated many well-known Irishmen among them Samuel Becket and Oscar Wilde. Boarding school must have been a challenging experience for a boy of that age, especially when being rather shy. In September 1947 he left for Campbell College in Belfast, a grammar school for boys now open to both day and boarding students. In 1947 it was primarily a boarding school and Ralph was lodged in Yate’s house. In his teens he contracted tuberculosis a disease not so uncommon in those days. This resulted in Ralph spending a year and a half in the hospital, something that must have been a harrowing experience at such a young age. He later expressed that he considered himself lucky because many in his hospital ward did not survive. However, the illness had its impact on his life. Many things, such as running to catch the bus, he was not able to do; it was not until his late twenties that such physical exercise again became possible. Ralph had a keen intellect, and he did well in school. In July 1949 he left Campbell College to enter Queen’s University in Belfast to study law. He graduated in 1955 with a very good law degree, LLB. On 1 July 1957 Ralph","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"45 1","pages":"289 - 308"},"PeriodicalIF":0.6,"publicationDate":"2021-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/01611194.2021.1935363","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45892986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rudyard Kipling’s unsolved cryptogram Rudyard Kipling的未解决密码
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-06-28 DOI: 10.1080/01611194.2021.1938297
R. J. Morgan
Abstract Rudyard Kipling asserted that he had included a ‘cryptogram’ in his book ‘Rewards and Fairies’ (1910). This has so far gone unsolved, and indeed undetected. I present the known information.
拉迪亚德·吉卜林声称,他在1910年出版的《奖赏与仙女》一书中加入了一个“密码”。到目前为止,这个问题还没有得到解决,实际上也没有被发现。我提供已知的信息。
{"title":"Rudyard Kipling’s unsolved cryptogram","authors":"R. J. Morgan","doi":"10.1080/01611194.2021.1938297","DOIUrl":"https://doi.org/10.1080/01611194.2021.1938297","url":null,"abstract":"Abstract Rudyard Kipling asserted that he had included a ‘cryptogram’ in his book ‘Rewards and Fairies’ (1910). This has so far gone unsolved, and indeed undetected. I present the known information.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"46 1","pages":"485 - 497"},"PeriodicalIF":0.6,"publicationDate":"2021-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/01611194.2021.1938297","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46422454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
UDM: Private user discovery with minimal information disclosure UDM:以最少的信息披露进行私有用户发现
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-06-21 DOI: 10.1080/01611194.2021.1911876
D. Chaum, Mario Yaksetig, A. Sherman, Joeri de Ruiter
Abstract We present and analyze User Discovery with Minimal information disclosure (UDM), a new protocol for user discovery in anonymous communication systems that minimizes the information disclosed to the system and users. UDM solves the following user-discovery problem. User Alice wishes to communicate with Bob over an anonymous communication system, such as cMix or Tor. Initially, each party knows each other’s public contact identifier (e.g., email address or phone number), but neither knows the other’s private platform identifier in the communication system. If both parties wish to communicate with each other, UDM enables them to establish a shared secret and learn each other’s private platform identifier. Unlike existing systems, including those based on private set intersection, UDM learns nothing about the social contacts of the users, is not vulnerable to off-line dictionary attacks that expose contact lists, does not reveal platform identifiers to users without the owner’s explicit permission, and enjoys low computation and communication complexity. Using the anonymous communication system, each pair of users who wish to communicate with each other uploads to the user-discovery system their private platform identifier, encrypted with a key derived from their shared secret. Indexing their request by a cryptographic tag derived from their shared secret, each user can then download each other’s encrypted private platform identifier. In doing so, UDM uses an untrusted user-discovery system, which processes and stores only public information or values encrypted with keys it does not know. Therefore, from the data values it processes, UDM cannot learn any information about the social contacts of its users.
摘要:本文提出并分析了一种基于最小信息披露的用户发现协议(UDM)。UDM是一种用于匿名通信系统中用户发现的新协议,它可以最大限度地减少向系统和用户泄露的信息。UDM解决了以下用户发现问题。用户Alice希望通过匿名通信系统(如cMix或Tor)与Bob通信。最初,双方都知道对方的公开联系标识符(如电子邮件地址或电话号码),但都不知道对方在通信系统中的私有平台标识符。如果双方希望彼此通信,UDM使他们能够建立共享秘密并了解彼此的私有平台标识符。与现有的系统(包括那些基于私有集合交集的系统)不同,UDM不了解用户的社会联系,不容易受到暴露联系人列表的离线字典攻击,在没有所有者明确许可的情况下不会向用户透露平台标识符,并且具有较低的计算和通信复杂性。使用匿名通信系统,希望彼此通信的每对用户将他们的私有平台标识符上传到用户发现系统,并使用从他们的共享秘密派生的密钥进行加密。通过从共享密钥派生的加密标签索引他们的请求,每个用户可以下载彼此加密的私有平台标识符。为此,UDM使用一个不受信任的用户发现系统,该系统只处理和存储公共信息或用它不知道的密钥加密的值。因此,从它处理的数据值中,UDM无法了解到任何关于其用户的社交联系的信息。
{"title":"UDM: Private user discovery with minimal information disclosure","authors":"D. Chaum, Mario Yaksetig, A. Sherman, Joeri de Ruiter","doi":"10.1080/01611194.2021.1911876","DOIUrl":"https://doi.org/10.1080/01611194.2021.1911876","url":null,"abstract":"Abstract We present and analyze User Discovery with Minimal information disclosure (UDM), a new protocol for user discovery in anonymous communication systems that minimizes the information disclosed to the system and users. UDM solves the following user-discovery problem. User Alice wishes to communicate with Bob over an anonymous communication system, such as cMix or Tor. Initially, each party knows each other’s public contact identifier (e.g., email address or phone number), but neither knows the other’s private platform identifier in the communication system. If both parties wish to communicate with each other, UDM enables them to establish a shared secret and learn each other’s private platform identifier. Unlike existing systems, including those based on private set intersection, UDM learns nothing about the social contacts of the users, is not vulnerable to off-line dictionary attacks that expose contact lists, does not reveal platform identifiers to users without the owner’s explicit permission, and enjoys low computation and communication complexity. Using the anonymous communication system, each pair of users who wish to communicate with each other uploads to the user-discovery system their private platform identifier, encrypted with a key derived from their shared secret. Indexing their request by a cryptographic tag derived from their shared secret, each user can then download each other’s encrypted private platform identifier. In doing so, UDM uses an untrusted user-discovery system, which processes and stores only public information or values encrypted with keys it does not know. Therefore, from the data values it processes, UDM cannot learn any information about the social contacts of its users.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"46 1","pages":"347 - 379"},"PeriodicalIF":0.6,"publicationDate":"2021-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/01611194.2021.1911876","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41649670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Sources and methods for cryptologic history: researching individuals (and the biography boom) 密码学历史的来源和方法:研究个体(和传记热潮)
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-06-07 DOI: 10.1080/01611194.2021.1929567
B. R. Smoot
Abstract Recent years have seen a surge in interest in writing (and reading) biographies of renowned cryptologists. This article looks at the surge and provides suggestions for those wishing to research and write both short form and long form biographies and those who wish to know more about a cryptologist in their family.
摘要近年来,人们对撰写(和阅读)著名密码学家传记的兴趣激增。这篇文章着眼于这一激增,并为那些希望研究和撰写短篇传记和长篇传记的人,以及那些希望更多地了解家人中密码学家的人提供了建议。
{"title":"Sources and methods for cryptologic history: researching individuals (and the biography boom)","authors":"B. R. Smoot","doi":"10.1080/01611194.2021.1929567","DOIUrl":"https://doi.org/10.1080/01611194.2021.1929567","url":null,"abstract":"Abstract Recent years have seen a surge in interest in writing (and reading) biographies of renowned cryptologists. This article looks at the surge and provides suggestions for those wishing to research and write both short form and long form biographies and those who wish to know more about a cryptologist in their family.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"45 1","pages":"465 - 473"},"PeriodicalIF":0.6,"publicationDate":"2021-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/01611194.2021.1929567","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45344871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applying hierarchical clustering to homophonic substitution ciphers using historical corpora 基于历史语料库的同音替代密码的分层聚类分析
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-06-07 DOI: 10.1080/01611194.2021.1918801
Anna Lehofer
Abstract This study examines whether hierarchical clustering can be used efficiently on homophonic substitution ciphers from the early modern age. The methodology was first tested on artificial homophonic ciphers based on historical corpora in 4 different languages. This investigation established that the decryptability of homophonic substitution letters does not depend on the plain text language, and it is effective if the text length goes beyond the unicity point. Finally the examination of original homophonic substitution cipher – cipher-key pairs followed in 4 languages. It determined that the method is applicable to original historical encrypted documents as well.
摘要本研究考察了从现代早期开始,层次聚类是否可以有效地用于同音替换密码。该方法首先在4种不同语言的基于历史语料库的人工同音密码上进行了测试。研究表明,同音替换字母的可解密性不依赖于纯文本语言,如果文本长度超过单一性点,则是有效的。最后,对4种语言中的原始同音替换密码-密码密钥对进行了检查。它确定该方法也适用于原始历史加密文件。
{"title":"Applying hierarchical clustering to homophonic substitution ciphers using historical corpora","authors":"Anna Lehofer","doi":"10.1080/01611194.2021.1918801","DOIUrl":"https://doi.org/10.1080/01611194.2021.1918801","url":null,"abstract":"Abstract This study examines whether hierarchical clustering can be used efficiently on homophonic substitution ciphers from the early modern age. The methodology was first tested on artificial homophonic ciphers based on historical corpora in 4 different languages. This investigation established that the decryptability of homophonic substitution letters does not depend on the plain text language, and it is effective if the text length goes beyond the unicity point. Finally the examination of original homophonic substitution cipher – cipher-key pairs followed in 4 languages. It determined that the method is applicable to original historical encrypted documents as well.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"46 1","pages":"422 - 438"},"PeriodicalIF":0.6,"publicationDate":"2021-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/01611194.2021.1918801","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44067778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Cryptologia
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1