首页 > 最新文献

Cryptologia最新文献

英文 中文
Classifying World War II era ciphers with machine learning 利用机器学习对二战时期的密码进行分类
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-03-14 DOI: 10.1080/01611194.2024.2304888
Brooke Dalton, Mark Stamp
We determine the accuracy with which machine learning and deep learning techniques can classify selected World War II era ciphers when only ciphertext is available. The specific ciphers considered ...
我们确定了在只有密码文本的情况下,机器学习和深度学习技术对选定的二战时期密码进行分类的准确性。所考虑的特定密码...
{"title":"Classifying World War II era ciphers with machine learning","authors":"Brooke Dalton, Mark Stamp","doi":"10.1080/01611194.2024.2304888","DOIUrl":"https://doi.org/10.1080/01611194.2024.2304888","url":null,"abstract":"We determine the accuracy with which machine learning and deep learning techniques can classify selected World War II era ciphers when only ciphertext is available. The specific ciphers considered ...","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"69 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2024-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140151411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of The Real Special Relationship by Michael Smith 迈克尔-史密斯《真正的特殊关系》评论
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-02-23 DOI: 10.1080/01611194.2024.2316705
Chris Christensen
Published in Cryptologia (Ahead of Print, 2024)
发表于《密码学》(2024 年提前出版)
{"title":"Review of The Real Special Relationship by Michael Smith","authors":"Chris Christensen","doi":"10.1080/01611194.2024.2316705","DOIUrl":"https://doi.org/10.1080/01611194.2024.2316705","url":null,"abstract":"Published in Cryptologia (Ahead of Print, 2024)","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"88 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2024-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139947596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Japanese Green Machine 日本绿色机器
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-02-05 DOI: 10.1080/01611194.2023.2263001
Chris Christensen
In May 1945 an Imperial Japanese Army Green cipher machine was captured at Baguio in the Philippines. The machine was unlike any previous Japanese cipher machine that was known to U.S. codebreakers...
1945 年 5 月,在菲律宾碧瑶缴获了一台日本皇军绿色密码机。据美国密码破译人员所知,这台机器与以往任何一台日本密码机都不同......
{"title":"The Japanese Green Machine","authors":"Chris Christensen","doi":"10.1080/01611194.2023.2263001","DOIUrl":"https://doi.org/10.1080/01611194.2023.2263001","url":null,"abstract":"In May 1945 an Imperial Japanese Army Green cipher machine was captured at Baguio in the Philippines. The machine was unlike any previous Japanese cipher machine that was known to U.S. codebreakers...","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"18 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2024-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139752472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
T.R. Hollcroft’s Problem T.R. 霍尔克罗夫特的问题
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-01-29 DOI: 10.1080/01611194.2023.2277276
Chris Christensen, Sandy Zabell, Conner Ernst, Hanna Schmitt, Matthew Henn
JN-25 was the primary World War II Japanese naval cipher. It was introduced in 1939 and evolved throughout the war, presenting US Navy codebreakers with a succession of challenges. When JN-25N-62 w...
JN-25 是第二次世界大战中日本海军的主要密码。它于 1939 年问世,在整个战争期间不断演变,给美国海军破译人员带来了一系列挑战。当 JN-25N-62...
{"title":"T.R. Hollcroft’s Problem","authors":"Chris Christensen, Sandy Zabell, Conner Ernst, Hanna Schmitt, Matthew Henn","doi":"10.1080/01611194.2023.2277276","DOIUrl":"https://doi.org/10.1080/01611194.2023.2277276","url":null,"abstract":"JN-25 was the primary World War II Japanese naval cipher. It was introduced in 1939 and evolved throughout the war, presenting US Navy codebreakers with a succession of challenges. When JN-25N-62 w...","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"30 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2024-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139662844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An improved cryptanalysis of multi-prime RSA with specific forms of decryption exponent 利用特定形式的解密指数改进多质数 RSA 的密码分析
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-01-05 DOI: 10.1080/01611194.2023.2271463
Santosh Kumar R, Prakash Klnc, Krishna Srm
Multi-prime RSA (MPRSA) is an extended version of RSA in which the modulus is the product of three or more distinct prime numbers. As with the RSA, this variant is also scrutinized for vulnerabilit...
多质数 RSA (MPRSA) 是 RSA 的扩展版本,其中的模数是三个或三个以上不同质数的乘积。与 RSA 一样,这种变体也被仔细检查是否存在漏洞...
{"title":"An improved cryptanalysis of multi-prime RSA with specific forms of decryption exponent","authors":"Santosh Kumar R, Prakash Klnc, Krishna Srm","doi":"10.1080/01611194.2023.2271463","DOIUrl":"https://doi.org/10.1080/01611194.2023.2271463","url":null,"abstract":"Multi-prime RSA (MPRSA) is an extended version of RSA in which the modulus is the product of three or more distinct prime numbers. As with the RSA, this variant is also scrutinized for vulnerabilit...","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"209 1 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2024-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139105437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decentralized universally verifiable stake voting system with perfect privacy 具有完美隐私的去中心化、普遍可验证的股权投票系统
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-12-18 DOI: 10.1080/01611194.2023.2279147
Pavithra Gurushankar, Kunwar Singh
Stake voting is a voting system where the vote cast by a voter is proportional to their account balance/asset. We propose the first implementation of an efficient, fully-decentralized, universally-...
股权投票是一种投票系统,投票人所投的票与其账户余额/资产成正比。我们首次提出了一种高效的、完全去中心化的、通用的投票系统。
{"title":"Decentralized universally verifiable stake voting system with perfect privacy","authors":"Pavithra Gurushankar, Kunwar Singh","doi":"10.1080/01611194.2023.2279147","DOIUrl":"https://doi.org/10.1080/01611194.2023.2279147","url":null,"abstract":"Stake voting is a voting system where the vote cast by a voter is proportional to their account balance/asset. We propose the first implementation of an efficient, fully-decentralized, universally-...","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"29 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138742197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modifying twist algorithms for determining the key length of a Vigenère cipher 修改确定维基涅尔密码密钥长度的扭转算法
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-12-12 DOI: 10.1080/01611194.2023.2275583
Christian Millichap, Yeeka Yau, Alyssa Pate, Morgan Carns
In this article, we analyze and improve upon the twist-based algorithms introduced by Barr–Simoson and Park–Kim–Cho–Yum for determining the key length of a Vigenère cipher. We provide an in-depth d...
本文分析并改进了 Barr-Simoson 和 Park-Kim-Cho-Yum 提出的基于扭转的算法,以确定维基耶尔密码的密钥长度。我们深入分析了...
{"title":"Modifying twist algorithms for determining the key length of a Vigenère cipher","authors":"Christian Millichap, Yeeka Yau, Alyssa Pate, Morgan Carns","doi":"10.1080/01611194.2023.2275583","DOIUrl":"https://doi.org/10.1080/01611194.2023.2275583","url":null,"abstract":"In this article, we analyze and improve upon the twist-based algorithms introduced by Barr–Simoson and Park–Kim–Cho–Yum for determining the key length of a Vigenère cipher. We provide an in-depth d...","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"90 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138573830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dorabella unMASCed – the Dorabella Cipher is not an English or Latin Mono-Alphabetical Substitution Cipher Dorabella unMASCed - Dorabella密码不是英语或拉丁语单字母替代密码
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-11-20 DOI: 10.1080/01611194.2023.2271466
Viktor Wase
The Dorabella cipher is an unsolved cipher with only 87 characters. In this study we show that state-of-the-art algorithms are able to solve Mono-Alphabetical Substitution Ciphers with 87 character...
多拉贝拉密码是一个只有87个字符的未解密码。在本研究中,我们展示了最先进的算法能够解决具有87个字符的单字母替换密码。
{"title":"Dorabella unMASCed – the Dorabella Cipher is not an English or Latin Mono-Alphabetical Substitution Cipher","authors":"Viktor Wase","doi":"10.1080/01611194.2023.2271466","DOIUrl":"https://doi.org/10.1080/01611194.2023.2271466","url":null,"abstract":"The Dorabella cipher is an unsolved cipher with only 87 characters. In this study we show that state-of-the-art algorithms are able to solve Mono-Alphabetical Substitution Ciphers with 87 character...","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"120 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138540576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The undisclosed history of the Dutch governmental telex-message security 1945–1960 1945-1960年荷兰政府电报安全的未公开历史
4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-11-02 DOI: 10.1080/01611194.2023.2258877
M. R. Oberman
AbstractThe information behind the Dutch governmental telex message security 1945–1960 was stored in private hidden archives, our national General Intelligence and Security Service and the National Archive. Therefore, it became unknow information. The article describes the reasons behind the need for a national developed secure cryptosystem. But also, the obstacles and politics behind the developing and the producing of the OTP-systems at the national PTT for the Ministry of Foreign affairs and the Royal Dutch Navy. It also reveals the politics to transfer the subject cryptography to the national IT industry: Philips, which became the start of the commercial crypto industry in the Netherlands in 1957.Keywords: EcolexObermanDutch historyone time padClaude ShannonCold WarSignal CorpsWorld War II Disclosure statementNo potential conflict of interest was reported by the author(s).About the inventor as described in this documentMy father1928–1935 TU-Delft Mechanical and Electrical Engineering1936–1957 PTT1947–1980 TU-Delft1976 Prof. Oberman cycling at his department after his restart as extraordinary professor.Notes1 www.cryptomuseum.com.2 PTT was in that time a state-owned entity, the national monopolist on telecom in the Netherlands.3 A. Snijders cooperated closely with Oberman on cryptography from 1946 on at PTT and he ended up as a professor at TU-Delft.
摘要1945-1960年荷兰政府电文安全背后的信息被保存在私人秘密档案馆、我国国家情报安全局和国家档案馆。因此,它变成了未知信息。本文描述了需要国家开发的安全密码系统背后的原因。但是,在国家PTT为外交部和荷兰皇家海军开发和生产otp系统背后的障碍和政治。它还揭示了将主题密码学转移到国家It行业的政治:飞利浦,1957年成为荷兰商业加密产业的开端。关键词:ecolexoberman荷兰历史每个人的时间claude shannon冷战信号军团二战披露声明作者未报告潜在的利益冲突。关于本文档中所描述的发明者我的父亲1928 - 1935 TU-Delft机械与电气工程1936 - 1957 PTT1947-1980 TU-Delft1976奥伯曼教授在他重新开始担任特别教授后在他的部门骑自行车。注1 www.cryptomuseum.com.2 PTT当时是一家国有实体,是荷兰电信行业的国家垄断者。从1946年开始,斯尼德斯在PTT与奥伯曼在密码学方面密切合作,奥伯曼最终成为代尔夫特理工大学的教授。
{"title":"The undisclosed history of the Dutch governmental telex-message security 1945–1960","authors":"M. R. Oberman","doi":"10.1080/01611194.2023.2258877","DOIUrl":"https://doi.org/10.1080/01611194.2023.2258877","url":null,"abstract":"AbstractThe information behind the Dutch governmental telex message security 1945–1960 was stored in private hidden archives, our national General Intelligence and Security Service and the National Archive. Therefore, it became unknow information. The article describes the reasons behind the need for a national developed secure cryptosystem. But also, the obstacles and politics behind the developing and the producing of the OTP-systems at the national PTT for the Ministry of Foreign affairs and the Royal Dutch Navy. It also reveals the politics to transfer the subject cryptography to the national IT industry: Philips, which became the start of the commercial crypto industry in the Netherlands in 1957.Keywords: EcolexObermanDutch historyone time padClaude ShannonCold WarSignal CorpsWorld War II Disclosure statementNo potential conflict of interest was reported by the author(s).About the inventor as described in this documentMy father1928–1935 TU-Delft Mechanical and Electrical Engineering1936–1957 PTT1947–1980 TU-Delft1976 Prof. Oberman cycling at his department after his restart as extraordinary professor.Notes1 www.cryptomuseum.com.2 PTT was in that time a state-owned entity, the national monopolist on telecom in the Netherlands.3 A. Snijders cooperated closely with Oberman on cryptography from 1946 on at PTT and he ended up as a professor at TU-Delft.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"1 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135973685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of The Enigma Affair by Charlie LovettLovett, Charlie. The Enigma Affair . Ashland, OR: Blackstone Publishing. 2022. 323 pages, Hardcover, $26.99. ISBN 978-1-66504-707-4. https://www.blackstonepublishing.com 《谜机事件》书评查理·洛维特,查理·洛维特。谜机事件。俄勒冈州阿什兰:黑石出版社,2022。323页,精装版,26.99美元。ISBN 978-1-66504-707-4。https://www.blackstonepublishing.com
4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-10-25 DOI: 10.1080/01611194.2023.2267563
John F. Dooley
{"title":"Review of <i>The Enigma Affair</i> by Charlie LovettLovett, Charlie. <i>The Enigma Affair</i> . Ashland, OR: Blackstone Publishing. 2022. 323 pages, Hardcover, $26.99. ISBN 978-1-66504-707-4. https://www.blackstonepublishing.com","authors":"John F. Dooley","doi":"10.1080/01611194.2023.2267563","DOIUrl":"https://doi.org/10.1080/01611194.2023.2267563","url":null,"abstract":"","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135169236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Cryptologia
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1