首页 > 最新文献

Cryptologia最新文献

英文 中文
Deciphering Mary Stuart’s lost letters from 1578-1584 解读玛丽·斯图尔特1578-1584年间丢失的信件
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-02-08 DOI: 10.1080/01611194.2022.2160677
G. Lasry, Norbert Biermann, Satoshi Tomokiyo
Abstract Mary Stuart, Queen of Scots (1542–1587), has left an extensive corpus of letters held in various archive collections. There is evidence, however that other letters from Mary Stuart are missing from those collections, such as letters referenced in other sources but not found elsewhere. In Under the Molehill – an Elizabethan Spy Story, John Bossy writes that a secret correspondence with her associates and allies, prior to its compromise in mid-1583, was “kept so secure that none of it has survived, and we don’t know what was in it.” We have found over 55 letters fully in cipher in the Bibliothèque nationale de France, which, after we broke the code and deciphered the letters, unexpectedly turned out to be letters from Mary Stuart, addressed mostly to Michel de Castelnau Mauvissière, the French ambassador to England. Written between 1578 and 1584, those newly deciphered letters are most likely part of the aforementioned secret correspondence considered to have been lost, and they constitute a voluminous body of new primary material on Mary Stuart – about 50,000 words in total, shedding new light on some of her years of captivity in England.
玛丽·斯图尔特,苏格兰女王(1542-1587),在各种档案收藏中留下了大量的信件。然而,有证据表明,玛丽·斯图尔特的其他信件在这些合集中失踪了,比如在其他来源中提到的信件,但在其他地方找不到。在《鼹鼠丘之下——一个伊丽莎白时代的间谍故事》一书中,约翰·博西写道,在1583年中期妥协之前,她与同事和盟友的秘密通信“被保密得如此之严密,以至于没有一份得以保存,我们也不知道里面有什么。”我们在法国国家图书馆中发现了超过55封全密码的信件,在我们破译密码并破译信件后,意外地发现是玛丽·斯图尔特的信件,主要是写给法国驻英国大使米歇尔·德·卡斯特诺·莫维西的。这些新破译的信件写于1578年至1584年之间,很可能是上述被认为已经丢失的秘密信件的一部分,它们构成了关于玛丽·斯图尔特的大量新主要材料——总共约5万字,为她在英格兰被囚禁的一些年提供了新的线索。
{"title":"Deciphering Mary Stuart’s lost letters from 1578-1584","authors":"G. Lasry, Norbert Biermann, Satoshi Tomokiyo","doi":"10.1080/01611194.2022.2160677","DOIUrl":"https://doi.org/10.1080/01611194.2022.2160677","url":null,"abstract":"Abstract Mary Stuart, Queen of Scots (1542–1587), has left an extensive corpus of letters held in various archive collections. There is evidence, however that other letters from Mary Stuart are missing from those collections, such as letters referenced in other sources but not found elsewhere. In Under the Molehill – an Elizabethan Spy Story, John Bossy writes that a secret correspondence with her associates and allies, prior to its compromise in mid-1583, was “kept so secure that none of it has survived, and we don’t know what was in it.” We have found over 55 letters fully in cipher in the Bibliothèque nationale de France, which, after we broke the code and deciphered the letters, unexpectedly turned out to be letters from Mary Stuart, addressed mostly to Michel de Castelnau Mauvissière, the French ambassador to England. Written between 1578 and 1584, those newly deciphered letters are most likely part of the aforementioned secret correspondence considered to have been lost, and they constitute a voluminous body of new primary material on Mary Stuart – about 50,000 words in total, shedding new light on some of her years of captivity in England.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"101 - 202"},"PeriodicalIF":0.6,"publicationDate":"2023-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47968338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Statistical tests suites analysis methods. Cryptographic recommendations 统计测试套件分析方法。加密建议
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-01-30 DOI: 10.1080/01611194.2022.2155093
Elena Almaraz Luengo
{"title":"Statistical tests suites analysis methods. Cryptographic recommendations","authors":"Elena Almaraz Luengo","doi":"10.1080/01611194.2022.2155093","DOIUrl":"https://doi.org/10.1080/01611194.2022.2155093","url":null,"abstract":"","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48757442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of Behind the Enigma by John Ferris 约翰·费里斯《谜的背后》述评
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-01-16 DOI: 10.1080/01611194.2022.2156311
Philip Marks
{"title":"Review of Behind the Enigma by John Ferris","authors":"Philip Marks","doi":"10.1080/01611194.2022.2156311","DOIUrl":"https://doi.org/10.1080/01611194.2022.2156311","url":null,"abstract":"","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"169 ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41282267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On security aspects of the ciphers T-310 and SKS with approved long-term keys 关于具有批准的长期密钥的密码T-310和SKS的安全方面
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-01-12 DOI: 10.1080/01611194.2022.2134752
Wolfgang Killmann
{"title":"On security aspects of the ciphers T-310 and SKS with approved long-term keys","authors":"Wolfgang Killmann","doi":"10.1080/01611194.2022.2134752","DOIUrl":"https://doi.org/10.1080/01611194.2022.2134752","url":null,"abstract":"","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45839592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Keys with nomenclatures in the early modern Europe 欧洲近代早期的命名键
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-11-03 DOI: 10.1080/01611194.2022.2113185
Beáta Megyesi, Crina Tudor, Benedek Láng, Anna Lehofer, Nils Kopal, K. de Leeuw, Michelle Waldispühl
{"title":"Keys with nomenclatures in the early modern Europe","authors":"Beáta Megyesi, Crina Tudor, Benedek Láng, Anna Lehofer, Nils Kopal, K. de Leeuw, Michelle Waldispühl","doi":"10.1080/01611194.2022.2113185","DOIUrl":"https://doi.org/10.1080/01611194.2022.2113185","url":null,"abstract":"","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"1 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41326686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Review of The Woman All Spies Fear by Amy Butler Greenfield and Code Breaker, Spy Hunter by Laurie Wallmark, Illustrated by Brooke Smart 回顾艾米·巴特勒·格林菲尔德的《所有间谍都害怕的女人》和劳里·沃尔马克的《密码破译者》、《间谍猎人》,布鲁克·斯玛特的插图
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-10-25 DOI: 10.1080/01611194.2022.2134753
Stuart Boersma, J. Linhart
Elizabeth Smith Friedman was a phenomenal cryptanalyst who worked with the US Government during both world wars and broke the codes and ciphers of drug and alcohol smugglers in the tumultuous years of Prohibition in between the wars. Her husband William Friedman was also a cryptanalyst whose career is often allowed to eclipse hers. There are two new biographies, with women authors, that give Elizebeth center stage and that introduce cryptography, codebreaking, and her accomplishments to a wider audience. The first biography, The Woman All Spies Fear: Code breaker Elizebeth Smith Friedman and her hidden life by Amy Butler Greenfield, was a finalist for the 2022 Young Adult Library Services Association’s award for excellence in nonfiction. Do not make the mistake of thinking this book is just for “young adults” – we “not-so-young adult” reviewers thoroughly enjoyed it too! The second biography is Code Breaker, Spy Hunter: How Elizebeth Smith Friedman changed the Course of Two World Wars by Laurie Wallmark and illustrated by Brook Smart. This is a beautifully illustrated children’s picture book. The Woman All Spies Fear opens with a teaser about the Doll Woman spying case that Elizebeth helped crack in 1944 and then flips back to Elizebeth Smith’s childhood, her drive to get a college education, and her struggle to repay a loan from her father for her education. In 1916, the need to repay her father results in her working for eccentric millionaire George Fabyan at his estate called Riverbank in Geneva, Illinois. At this point the narrative is interrupted with an interlude called a “Code Break” which educates the reader on the difference between a code and a cipher. Attentive readers might identify the beginning of a hidden message in this section before the biography returns to the main story where we find Elizebeth at Riverbank trying to find messages encrypted with a Bacon cipher hidden among the fonts of Shakespeare’s first folio. These “Code Break” sections appear frequently throughout the book and will be described in more detail below. Elizebeth soon meets William Friedman and
伊丽莎白·史密斯·弗里德曼是一位杰出的密码分析师,她在两次世界大战期间与美国政府合作,并在两次世界大战之间混乱的禁酒令时期破译了毒品和酒精走私者的代码和密码。她的丈夫威廉·弗里德曼(William Friedman)也是一名密码分析师,他的职业生涯经常让她黯然失色。有两本由女性作者撰写的新传记将伊丽莎白推上了舞台的中心,并向更广泛的读者介绍了密码学、密码破译和她的成就。第一本传记《所有间谍都害怕的女人:密码破解者伊丽莎白·史密斯·弗里德曼和她的隐秘生活》,由艾米·巴特勒·格林菲尔德撰写,入围了2022年青年成人图书馆服务协会优秀非虚构类作品奖。不要错误地认为这本书只适合“年轻人”——我们这些“不那么年轻的成年人”也非常喜欢它!第二本传记是《密码破解者,间谍猎人:伊丽莎白·史密斯·弗里德曼如何改变两次世界大战的进程》,作者劳里·沃尔马克,插图作者布鲁克·斯马特。这是一本插图精美的儿童图画书。《所有间谍都害怕的女人》以1944年伊丽莎白协助侦破的“娃娃女”间谍案开头,然后倒转到伊丽莎白·史密斯的童年,她上大学的动力,以及她为偿还父亲为她提供的教育贷款而付出的努力。1916年,为了报答父亲的恩情,她不得不为古怪的百万富翁乔治·法比安(George Fabyan)工作,在他位于伊利诺伊州日内瓦的Riverbank庄园工作。在这一点上,故事被一个叫做“密码破译”的插曲打断了,这段插曲让读者了解了密码和密码的区别。细心的读者可能会在传记回到主要故事之前,在这一部分中发现一个隐藏的信息的开头,我们发现伊丽莎白在河岸试图找到隐藏在莎士比亚第一对开本字体中的培根密码加密的信息。这些“代码中断”章节在本书中经常出现,下面将更详细地描述。伊丽莎白很快就遇到了威廉·弗里德曼
{"title":"Review of The Woman All Spies Fear by Amy Butler Greenfield and Code Breaker, Spy Hunter by Laurie Wallmark, Illustrated by Brooke Smart","authors":"Stuart Boersma, J. Linhart","doi":"10.1080/01611194.2022.2134753","DOIUrl":"https://doi.org/10.1080/01611194.2022.2134753","url":null,"abstract":"Elizabeth Smith Friedman was a phenomenal cryptanalyst who worked with the US Government during both world wars and broke the codes and ciphers of drug and alcohol smugglers in the tumultuous years of Prohibition in between the wars. Her husband William Friedman was also a cryptanalyst whose career is often allowed to eclipse hers. There are two new biographies, with women authors, that give Elizebeth center stage and that introduce cryptography, codebreaking, and her accomplishments to a wider audience. The first biography, The Woman All Spies Fear: Code breaker Elizebeth Smith Friedman and her hidden life by Amy Butler Greenfield, was a finalist for the 2022 Young Adult Library Services Association’s award for excellence in nonfiction. Do not make the mistake of thinking this book is just for “young adults” – we “not-so-young adult” reviewers thoroughly enjoyed it too! The second biography is Code Breaker, Spy Hunter: How Elizebeth Smith Friedman changed the Course of Two World Wars by Laurie Wallmark and illustrated by Brook Smart. This is a beautifully illustrated children’s picture book. The Woman All Spies Fear opens with a teaser about the Doll Woman spying case that Elizebeth helped crack in 1944 and then flips back to Elizebeth Smith’s childhood, her drive to get a college education, and her struggle to repay a loan from her father for her education. In 1916, the need to repay her father results in her working for eccentric millionaire George Fabyan at his estate called Riverbank in Geneva, Illinois. At this point the narrative is interrupted with an interlude called a “Code Break” which educates the reader on the difference between a code and a cipher. Attentive readers might identify the beginning of a hidden message in this section before the biography returns to the main story where we find Elizebeth at Riverbank trying to find messages encrypted with a Bacon cipher hidden among the fonts of Shakespeare’s first folio. These “Code Break” sections appear frequently throughout the book and will be described in more detail below. Elizebeth soon meets William Friedman and","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"88 - 92"},"PeriodicalIF":0.6,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41750599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Shadow IT in higher education: survey and case study for cybersecurity 高等教育中的影子IT:网络安全调查与案例研究
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-10-12 DOI: 10.1080/01611194.2022.2103754
Selma Gomez Orr, C. Bonyadi, Enis Golaszewski, Alan T. Sherman, Peter A. H. Peterson, R. Forno, Sydney Johns, Jimmy Rodriguez
We explore shadow information technology (IT) at institutions of higher education through a two-tiered approach involving a detailed case study and comprehensive survey of IT professionals. In its many forms, shadow IT is the software or hardware present in a computer system or network that lies outside the typical review process of the responsible IT unit. We carry out a case study of an internally built legacy grants management system at the University of Maryland, Baltimore County that exemplifies the vulnerabilities, including cross-site scripting and SQL injection, typical of such unauthorized and ad-hoc software. We also conduct a survey of IT professionals at universities, colleges, and community colleges that reveals new and actionable information regarding the prevalence, usage patterns, types, benefits, and risks of shadow IT at their respective institutions. Further, we propose a security-based profile of shadow IT, involving a subset of elements from existing shadow IT taxonomies, that categorizes shadow IT from a security perspective. Based on this profile, survey respondents identified the predominant form of shadow IT at their institutions, revealing close similarities to findings from our case study. Through this work, we are the first to identify possible susceptibility factors associated with the occurrence of shadow IT related security incidents within academic institutions. Correlations of significance include the presence of certain graduate schools, the level of decentralization of the IT department, the types of shadow IT present, the percentage of security violations related to shadow IT, and the institution’s overall attitude toward shadow IT. The combined elements of our case study, profile, and survey provide the first comprehensive view of shadow IT security at academic institutions, highlighting tension between its risks and benefits, and suggesting strategies for managing it successfully.
我们通过两层方法探索高等教育机构的影子信息技术(IT),包括详细的案例研究和对IT专业人员的全面调查。在许多形式中,影子IT是计算机系统或网络中存在的软件或硬件,不在负责IT部门的典型审查过程中。我们对马里兰大学巴尔的摩县分校内部构建的遗留拨款管理系统进行了案例研究,该系统举例说明了此类未经授权和特定软件的典型漏洞,包括跨站点脚本和SQL注入。我们还对大学、学院和社区学院的IT专业人员进行了一项调查,揭示了有关各自机构影子IT的流行率、使用模式、类型、好处和风险的新的可操作信息。此外,我们提出了一个基于安全的影子IT概要文件,涉及现有影子IT分类法中的元素子集,从安全角度对影子IT进行分类。根据这一概况,调查对象确定了其机构中影子IT的主要形式,这与我们的案例研究结果非常相似。通过这项工作,我们首次确定了与学术机构内部影子IT相关安全事件发生相关的可能易感性因素。重要的相关性包括某些研究生院的存在、IT部门的权力下放程度、存在的影子IT类型、与影子IT相关的安全违规百分比以及该机构对影子IT的总体态度,和调查首次全面了解了学术机构的影子IT安全,强调了其风险和收益之间的紧张关系,并提出了成功管理它的策略。
{"title":"Shadow IT in higher education: survey and case study for cybersecurity","authors":"Selma Gomez Orr, C. Bonyadi, Enis Golaszewski, Alan T. Sherman, Peter A. H. Peterson, R. Forno, Sydney Johns, Jimmy Rodriguez","doi":"10.1080/01611194.2022.2103754","DOIUrl":"https://doi.org/10.1080/01611194.2022.2103754","url":null,"abstract":"We explore shadow information technology (IT) at institutions of higher education through a two-tiered approach involving a detailed case study and comprehensive survey of IT professionals. In its many forms, shadow IT is the software or hardware present in a computer system or network that lies outside the typical review process of the responsible IT unit. We carry out a case study of an internally built legacy grants management system at the University of Maryland, Baltimore County that exemplifies the vulnerabilities, including cross-site scripting and SQL injection, typical of such unauthorized and ad-hoc software. We also conduct a survey of IT professionals at universities, colleges, and community colleges that reveals new and actionable information regarding the prevalence, usage patterns, types, benefits, and risks of shadow IT at their respective institutions. Further, we propose a security-based profile of shadow IT, involving a subset of elements from existing shadow IT taxonomies, that categorizes shadow IT from a security perspective. Based on this profile, survey respondents identified the predominant form of shadow IT at their institutions, revealing close similarities to findings from our case study. Through this work, we are the first to identify possible susceptibility factors associated with the occurrence of shadow IT related security incidents within academic institutions. Correlations of significance include the presence of certain graduate schools, the level of decentralization of the IT department, the types of shadow IT present, the percentage of security violations related to shadow IT, and the institution’s overall attitude toward shadow IT. The combined elements of our case study, profile, and survey provide the first comprehensive view of shadow IT security at academic institutions, highlighting tension between its risks and benefits, and suggesting strategies for managing it successfully.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2022-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45046651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cryptanalysis of RSA with small difference of primes and two decryption exponents: Jochemsz and May approach 具有小素数差和两个解密指数的RSA密码分析:Jochemsz和May方法
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-10-10 DOI: 10.1080/01611194.2022.2109943
R. Santosh Kumar, S. Krishna
Abstract RSA is a well-known cryptosystem in Modern Cryptography and its efficiency is based on the hardness of the Integer Factorization problem. The algorithm is shown to be vulnerable to several attacks in a number of special scenarios with assumptions. In this paper, the strength of RSA is investigated if the primes in the modulus are close and the same modulus is used for two instances. The attack is highly efficient compared to other known attacks which are only concentrated on either closeness of the primes or the same modulus used for two or more instances. This attack examines the closeness of the primes chosen whenever the RSA system is used for two instances with the same modulus. The LLL algorithm is used to obtain the bound, and the bound is highly efficient compared to other known attacks.
摘要RSA是现代密码学中著名的密码系统,其有效性取决于整数分解问题的难解性。在一些特殊的假设场景中,该算法容易受到几种攻击。本文研究了在模中素数接近且两个实例使用相同模时RSA的强度。与其他已知的攻击相比,这种攻击非常有效,这些攻击只集中在两个或多个实例中使用的素数的接近度或相同模量上。当RSA系统用于具有相同模量的两个实例时,这种攻击检查所选择的素数的接近度。使用LLL算法获取边界,与其他已知的攻击相比,该边界具有很高的效率。
{"title":"Cryptanalysis of RSA with small difference of primes and two decryption exponents: Jochemsz and May approach","authors":"R. Santosh Kumar, S. Krishna","doi":"10.1080/01611194.2022.2109943","DOIUrl":"https://doi.org/10.1080/01611194.2022.2109943","url":null,"abstract":"Abstract RSA is a well-known cryptosystem in Modern Cryptography and its efficiency is based on the hardness of the Integer Factorization problem. The algorithm is shown to be vulnerable to several attacks in a number of special scenarios with assumptions. In this paper, the strength of RSA is investigated if the primes in the modulus are close and the same modulus is used for two instances. The attack is highly efficient compared to other known attacks which are only concentrated on either closeness of the primes or the same modulus used for two or more instances. This attack examines the closeness of the primes chosen whenever the RSA system is used for two instances with the same modulus. The LLL algorithm is used to obtain the bound, and the bound is highly efficient compared to other known attacks.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"570 - 583"},"PeriodicalIF":0.6,"publicationDate":"2022-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47768406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A study of public key cryptosystems based on quasigroups 基于拟群的公钥密码系统研究
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-09-22 DOI: 10.1080/01611194.2022.2081824
Satish Kumar, Indivar Gupta, Ashok Gupta
Abstract A public-key cryptosystem is the undoubted spine of present-day communication systems. Many mathematical theories like number theory, group theory, and ring theory were utilized to design various cryptographic protocols. Similarly, quasigroups play a significant part in building both symmetric and public-key cryptosystems. Some famous cryptographic primitives like EdonX and NASHA are based on quasigroups. In this survey article, we will discuss some public-key cryptographic algorithms based on quasigroups and their structures.
摘要公钥密码系统无疑是当今通信系统的支柱。许多数学理论,如数论、群论和环论,被用来设计各种密码协议。类似地,拟群在构建对称和公钥密码系统中都发挥着重要作用。一些著名的密码原语如EdonX和NASHA都是基于准群的。在这篇综述文章中,我们将讨论一些基于拟群的公钥密码算法及其结构。
{"title":"A study of public key cryptosystems based on quasigroups","authors":"Satish Kumar, Indivar Gupta, Ashok Gupta","doi":"10.1080/01611194.2022.2081824","DOIUrl":"https://doi.org/10.1080/01611194.2022.2081824","url":null,"abstract":"Abstract A public-key cryptosystem is the undoubted spine of present-day communication systems. Many mathematical theories like number theory, group theory, and ring theory were utilized to design various cryptographic protocols. Similarly, quasigroups play a significant part in building both symmetric and public-key cryptosystems. Some famous cryptographic primitives like EdonX and NASHA are based on quasigroups. In this survey article, we will discuss some public-key cryptographic algorithms based on quasigroups and their structures.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"511 - 540"},"PeriodicalIF":0.6,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49296029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A statistical cryptanalysis of the Beale ciphers Beale密码的统计密码分析
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-09-21 DOI: 10.1080/01611194.2022.2116614
Leonardo Campanelli
Abstract The encryption method used to encode the second Beale cipher leads to a ε-Benford’s distribution for the first significant digit of the numbers in the coded message. The relative level of deviation from Benford’s law, ε, is about 0.15 for the second decoded cipher. The other two undeciphered codes show a statistically significant deviation from a 0.15-Benford’s law, suggesting that either ciphers 1 and 3 are fake or the encryption method used to encode them is different from the one used for cipher 2.
摘要用于编码第二个Beale密码的加密方法导致编码消息中数字的第一个有效数字的ε-Benford分布。对于第二个解码密码,偏离本福德定律的相对水平ε约为0.15。另外两个未解码的代码显示出与0.15-Benford定律的统计显著偏差,这表明密码1和3要么是假的,要么用于编码它们的加密方法与用于密码2的加密方法不同。
{"title":"A statistical cryptanalysis of the Beale ciphers","authors":"Leonardo Campanelli","doi":"10.1080/01611194.2022.2116614","DOIUrl":"https://doi.org/10.1080/01611194.2022.2116614","url":null,"abstract":"Abstract The encryption method used to encode the second Beale cipher leads to a ε-Benford’s distribution for the first significant digit of the numbers in the coded message. The relative level of deviation from Benford’s law, ε, is about 0.15 for the second decoded cipher. The other two undeciphered codes show a statistically significant deviation from a 0.15-Benford’s law, suggesting that either ciphers 1 and 3 are fake or the encryption method used to encode them is different from the one used for cipher 2.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"466 - 473"},"PeriodicalIF":0.6,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46512651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Cryptologia
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1