Pub Date : 2024-03-14DOI: 10.1080/01611194.2024.2304888
Brooke Dalton, Mark Stamp
We determine the accuracy with which machine learning and deep learning techniques can classify selected World War II era ciphers when only ciphertext is available. The specific ciphers considered ...
{"title":"Classifying World War II era ciphers with machine learning","authors":"Brooke Dalton, Mark Stamp","doi":"10.1080/01611194.2024.2304888","DOIUrl":"https://doi.org/10.1080/01611194.2024.2304888","url":null,"abstract":"We determine the accuracy with which machine learning and deep learning techniques can classify selected World War II era ciphers when only ciphertext is available. The specific ciphers considered ...","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"69 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2024-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140151411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-23DOI: 10.1080/01611194.2024.2316705
Chris Christensen
Published in Cryptologia (Ahead of Print, 2024)
发表于《密码学》(2024 年提前出版)
{"title":"Review of The Real Special Relationship by Michael Smith","authors":"Chris Christensen","doi":"10.1080/01611194.2024.2316705","DOIUrl":"https://doi.org/10.1080/01611194.2024.2316705","url":null,"abstract":"Published in Cryptologia (Ahead of Print, 2024)","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"88 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2024-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139947596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-05DOI: 10.1080/01611194.2023.2263001
Chris Christensen
In May 1945 an Imperial Japanese Army Green cipher machine was captured at Baguio in the Philippines. The machine was unlike any previous Japanese cipher machine that was known to U.S. codebreakers...
{"title":"The Japanese Green Machine","authors":"Chris Christensen","doi":"10.1080/01611194.2023.2263001","DOIUrl":"https://doi.org/10.1080/01611194.2023.2263001","url":null,"abstract":"In May 1945 an Imperial Japanese Army Green cipher machine was captured at Baguio in the Philippines. The machine was unlike any previous Japanese cipher machine that was known to U.S. codebreakers...","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"18 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2024-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139752472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-29DOI: 10.1080/01611194.2023.2277276
Chris Christensen, Sandy Zabell, Conner Ernst, Hanna Schmitt, Matthew Henn
JN-25 was the primary World War II Japanese naval cipher. It was introduced in 1939 and evolved throughout the war, presenting US Navy codebreakers with a succession of challenges. When JN-25N-62 w...
{"title":"T.R. Hollcroft’s Problem","authors":"Chris Christensen, Sandy Zabell, Conner Ernst, Hanna Schmitt, Matthew Henn","doi":"10.1080/01611194.2023.2277276","DOIUrl":"https://doi.org/10.1080/01611194.2023.2277276","url":null,"abstract":"JN-25 was the primary World War II Japanese naval cipher. It was introduced in 1939 and evolved throughout the war, presenting US Navy codebreakers with a succession of challenges. When JN-25N-62 w...","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"30 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2024-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139662844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-05DOI: 10.1080/01611194.2023.2271463
Santosh Kumar R, Prakash Klnc, Krishna Srm
Multi-prime RSA (MPRSA) is an extended version of RSA in which the modulus is the product of three or more distinct prime numbers. As with the RSA, this variant is also scrutinized for vulnerabilit...
{"title":"An improved cryptanalysis of multi-prime RSA with specific forms of decryption exponent","authors":"Santosh Kumar R, Prakash Klnc, Krishna Srm","doi":"10.1080/01611194.2023.2271463","DOIUrl":"https://doi.org/10.1080/01611194.2023.2271463","url":null,"abstract":"Multi-prime RSA (MPRSA) is an extended version of RSA in which the modulus is the product of three or more distinct prime numbers. As with the RSA, this variant is also scrutinized for vulnerabilit...","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"209 1 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2024-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139105437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-18DOI: 10.1080/01611194.2023.2279147
Pavithra Gurushankar, Kunwar Singh
Stake voting is a voting system where the vote cast by a voter is proportional to their account balance/asset. We propose the first implementation of an efficient, fully-decentralized, universally-...
{"title":"Decentralized universally verifiable stake voting system with perfect privacy","authors":"Pavithra Gurushankar, Kunwar Singh","doi":"10.1080/01611194.2023.2279147","DOIUrl":"https://doi.org/10.1080/01611194.2023.2279147","url":null,"abstract":"Stake voting is a voting system where the vote cast by a voter is proportional to their account balance/asset. We propose the first implementation of an efficient, fully-decentralized, universally-...","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"29 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138742197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-12DOI: 10.1080/01611194.2023.2275583
Christian Millichap, Yeeka Yau, Alyssa Pate, Morgan Carns
In this article, we analyze and improve upon the twist-based algorithms introduced by Barr–Simoson and Park–Kim–Cho–Yum for determining the key length of a Vigenère cipher. We provide an in-depth d...
{"title":"Modifying twist algorithms for determining the key length of a Vigenère cipher","authors":"Christian Millichap, Yeeka Yau, Alyssa Pate, Morgan Carns","doi":"10.1080/01611194.2023.2275583","DOIUrl":"https://doi.org/10.1080/01611194.2023.2275583","url":null,"abstract":"In this article, we analyze and improve upon the twist-based algorithms introduced by Barr–Simoson and Park–Kim–Cho–Yum for determining the key length of a Vigenère cipher. We provide an in-depth d...","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"90 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138573830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-20DOI: 10.1080/01611194.2023.2271466
Viktor Wase
The Dorabella cipher is an unsolved cipher with only 87 characters. In this study we show that state-of-the-art algorithms are able to solve Mono-Alphabetical Substitution Ciphers with 87 character...
{"title":"Dorabella unMASCed – the Dorabella Cipher is not an English or Latin Mono-Alphabetical Substitution Cipher","authors":"Viktor Wase","doi":"10.1080/01611194.2023.2271466","DOIUrl":"https://doi.org/10.1080/01611194.2023.2271466","url":null,"abstract":"The Dorabella cipher is an unsolved cipher with only 87 characters. In this study we show that state-of-the-art algorithms are able to solve Mono-Alphabetical Substitution Ciphers with 87 character...","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"120 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138540576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-02DOI: 10.1080/01611194.2023.2258877
M. R. Oberman
AbstractThe information behind the Dutch governmental telex message security 1945–1960 was stored in private hidden archives, our national General Intelligence and Security Service and the National Archive. Therefore, it became unknow information. The article describes the reasons behind the need for a national developed secure cryptosystem. But also, the obstacles and politics behind the developing and the producing of the OTP-systems at the national PTT for the Ministry of Foreign affairs and the Royal Dutch Navy. It also reveals the politics to transfer the subject cryptography to the national IT industry: Philips, which became the start of the commercial crypto industry in the Netherlands in 1957.Keywords: EcolexObermanDutch historyone time padClaude ShannonCold WarSignal CorpsWorld War II Disclosure statementNo potential conflict of interest was reported by the author(s).About the inventor as described in this documentMy father1928–1935 TU-Delft Mechanical and Electrical Engineering1936–1957 PTT1947–1980 TU-Delft1976 Prof. Oberman cycling at his department after his restart as extraordinary professor.Notes1 www.cryptomuseum.com.2 PTT was in that time a state-owned entity, the national monopolist on telecom in the Netherlands.3 A. Snijders cooperated closely with Oberman on cryptography from 1946 on at PTT and he ended up as a professor at TU-Delft.
{"title":"The undisclosed history of the Dutch governmental telex-message security 1945–1960","authors":"M. R. Oberman","doi":"10.1080/01611194.2023.2258877","DOIUrl":"https://doi.org/10.1080/01611194.2023.2258877","url":null,"abstract":"AbstractThe information behind the Dutch governmental telex message security 1945–1960 was stored in private hidden archives, our national General Intelligence and Security Service and the National Archive. Therefore, it became unknow information. The article describes the reasons behind the need for a national developed secure cryptosystem. But also, the obstacles and politics behind the developing and the producing of the OTP-systems at the national PTT for the Ministry of Foreign affairs and the Royal Dutch Navy. It also reveals the politics to transfer the subject cryptography to the national IT industry: Philips, which became the start of the commercial crypto industry in the Netherlands in 1957.Keywords: EcolexObermanDutch historyone time padClaude ShannonCold WarSignal CorpsWorld War II Disclosure statementNo potential conflict of interest was reported by the author(s).About the inventor as described in this documentMy father1928–1935 TU-Delft Mechanical and Electrical Engineering1936–1957 PTT1947–1980 TU-Delft1976 Prof. Oberman cycling at his department after his restart as extraordinary professor.Notes1 www.cryptomuseum.com.2 PTT was in that time a state-owned entity, the national monopolist on telecom in the Netherlands.3 A. Snijders cooperated closely with Oberman on cryptography from 1946 on at PTT and he ended up as a professor at TU-Delft.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"1 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135973685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}