首页 > 最新文献

Cryptologia最新文献

英文 中文
Elizebeth Smith Friedman’s recovery of the wiring of two rotors from an enigma D machine 伊丽莎白·史密斯·弗里德曼(elizabeth Smith Friedman)从一台谜D机器中恢复了两个转子的接线
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-09-21 DOI: 10.1080/01611194.2022.2109944
Stuart Boersma
{"title":"Elizebeth Smith Friedman’s recovery of the wiring of two rotors from an enigma D machine","authors":"Stuart Boersma","doi":"10.1080/01611194.2022.2109944","DOIUrl":"https://doi.org/10.1080/01611194.2022.2109944","url":null,"abstract":"","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48848084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Review of The Secret Life of an American Codebreaker: Codebreaker Girls by Jan Slimming 简·斯利明的《美国密码破译者的秘密生活:密码破译女孩》
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-08-26 DOI: 10.1080/01611194.2022.2105179
Chris Christensen
In 2021 Codebreaker Girls: A Secret Life at Bletchley Park, Jan Slimming’s first book about World War II codebreaking appeared. Slimming’s interest in codebreaking and, in particular, in Bletchley Park resulted from the fact that her mother Daisy Lawrence had served as a civilian codebreaker at Bletchley Park. What Slimming discovered of her mother’s service as a codebreaker is told in her first book. The first book also includes a bit of the story of her father Stanley Moore, who joined the Royal Army Service Corps, was taken prisoner by the Japanese during the fall of Singapore in 1942, and was a POW during the remainder of the war. Unfortunately Slimming tried to expand the story of her mother to include much of the cryptologic history of World War II, and in trying to do so she went badly wrong. Codebreaker Girls: A Secret Life at Bletchley Park is filled with errors and misunderstandings (Christensen 2022). This new Codebreaker Girls book is built upon the story of Janice Martin Benario, a US Navy codebreaker during World War II. Readers would be forgiven if, part way through Secret Life, they lose track of what would appear to be the focus of the book – the story of Janice Benario – because, like her first book, Slimming has attempted to go beyond the foundation of the book and tell a larger story – in this case seemingly the complete story of World War II codebreaking and more. Slimming has also filled this book with errors and misunderstandings. As with the review of A Secret Life at Bletchley Park, it unfortunately becomes necessary to provide evidence of Slimming’s errors and misunderstandings. Page ix: Problems begin with the second paragraph of the “Prologue.” Slimming locates the building that is designated Main Navy on Pennsylvania Avenue in Washington, DC. Main Navy was located on B Street, which is now Constitution Avenue. This might seem like a minor error, but such errors pop up throughout the book. Page 38: Referring to a delay in the receiving of a 6 December 1941 diplomatic message from President Roosevelt to the Japanese Emperor, Slimming explains that because the message was encoded with the less secure US diplomatic GRAY code US Ambassador to Japan Joseph Grew thought that it was possible that “Japanese militants had intercepted the message, solved its contents and deliberately delayed it to hinder any peace effort.” (37–38) Slimming then, referencing David Kahn’s The Codebreakers page 495, says: “The real reason, however, was not the code or the diplomats but a full embargo placed on all Japanese military incoming diplomatic messages.” (38) Much of what Slimming says about this event seems to be based on Kahn’s explanation. (Kahn
在2021年的《破解密码的女孩:布莱切利公园的秘密生活》中,简·斯利明的第一本关于二战密码破解的书出现了。Slimming对密码破译的兴趣,尤其是对布莱切利公园的兴趣,源于她的母亲Daisy Lawrence曾在布莱切利花园担任平民密码破译员。Slimming在她的第一本书中讲述了她母亲作为密码破译者的发现。第一本书还讲述了她的父亲斯坦利·摩尔的故事,他加入了皇家陆军服务团,在1942年新加坡沦陷期间被日本人俘虏,在战争的剩余时间里是一名战俘。不幸的是,Slimming试图将她母亲的故事扩展到第二次世界大战的大部分密码学历史中,但在试图这样做的过程中,她大错特错了。《破解密码的女孩:布莱切利公园的秘密生活》充满了错误和误解(克里斯滕森2022)。这本新书《破解密码的女孩》是根据二战期间美国海军密码破译员珍妮丝·马丁·贝纳里奥的故事改编的。如果读者在《秘密生活》的中途忘记了这本书的焦点——珍妮丝·贝纳里奥的故事——那将是情有可原的,因为就像她的第一本书一样,《瘦身》试图超越这本书,讲述一个更大的故事——在这种情况下,似乎是二战密码破译的完整故事等等。瘦身也使这本书充满了错误和误解。正如《布莱切利公园的秘密生活》的评论一样,不幸的是,有必要提供证据来证明瘦身的错误和误解。第九页:问题从“序言”的第二段开始。Slimming位于华盛顿特区宾夕法尼亚大道上被指定为主要海军的建筑。海军总部位于B街,即现在的宪法大道。这可能看起来是一个小错误,但这样的错误在整本书中都会出现。第38页:关于延迟收到1941年12月6日罗斯福总统给日本天皇的外交电文,Slimming解释说,由于该信息是用不太安全的美国外交格雷码编码的,美国驻日本大使Joseph Grew认为“日本激进分子截获了该信息,解决了其内容,并故意拖延,以阻碍任何和平努力。”,他说:“然而,真正的原因不是法规或外交官,而是对所有日本军方收到的外交信息实施了全面禁运。”(38)斯林对这一事件的大部分说法似乎都是基于卡恩的解释。(卡恩
{"title":"Review of The Secret Life of an American Codebreaker: Codebreaker Girls by Jan Slimming","authors":"Chris Christensen","doi":"10.1080/01611194.2022.2105179","DOIUrl":"https://doi.org/10.1080/01611194.2022.2105179","url":null,"abstract":"In 2021 Codebreaker Girls: A Secret Life at Bletchley Park, Jan Slimming’s first book about World War II codebreaking appeared. Slimming’s interest in codebreaking and, in particular, in Bletchley Park resulted from the fact that her mother Daisy Lawrence had served as a civilian codebreaker at Bletchley Park. What Slimming discovered of her mother’s service as a codebreaker is told in her first book. The first book also includes a bit of the story of her father Stanley Moore, who joined the Royal Army Service Corps, was taken prisoner by the Japanese during the fall of Singapore in 1942, and was a POW during the remainder of the war. Unfortunately Slimming tried to expand the story of her mother to include much of the cryptologic history of World War II, and in trying to do so she went badly wrong. Codebreaker Girls: A Secret Life at Bletchley Park is filled with errors and misunderstandings (Christensen 2022). This new Codebreaker Girls book is built upon the story of Janice Martin Benario, a US Navy codebreaker during World War II. Readers would be forgiven if, part way through Secret Life, they lose track of what would appear to be the focus of the book – the story of Janice Benario – because, like her first book, Slimming has attempted to go beyond the foundation of the book and tell a larger story – in this case seemingly the complete story of World War II codebreaking and more. Slimming has also filled this book with errors and misunderstandings. As with the review of A Secret Life at Bletchley Park, it unfortunately becomes necessary to provide evidence of Slimming’s errors and misunderstandings. Page ix: Problems begin with the second paragraph of the “Prologue.” Slimming locates the building that is designated Main Navy on Pennsylvania Avenue in Washington, DC. Main Navy was located on B Street, which is now Constitution Avenue. This might seem like a minor error, but such errors pop up throughout the book. Page 38: Referring to a delay in the receiving of a 6 December 1941 diplomatic message from President Roosevelt to the Japanese Emperor, Slimming explains that because the message was encoded with the less secure US diplomatic GRAY code US Ambassador to Japan Joseph Grew thought that it was possible that “Japanese militants had intercepted the message, solved its contents and deliberately delayed it to hinder any peace effort.” (37–38) Slimming then, referencing David Kahn’s The Codebreakers page 495, says: “The real reason, however, was not the code or the diplomats but a full embargo placed on all Japanese military incoming diplomatic messages.” (38) Much of what Slimming says about this event seems to be based on Kahn’s explanation. (Kahn","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"584 - 587"},"PeriodicalIF":0.6,"publicationDate":"2022-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44884937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cracking PURPLE: the identification of homologs in the cryptanalysis of the Angooki Taipu B cipher machine 破解紫色:安古基泰普B密码机密码分析中同源物的鉴定
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-08-16 DOI: 10.1080/01611194.2022.2064200
K. Bures
Abstract In 1940 the US Army’s Signal Intelligence Service (SIS) cracked PURPLE, the Japanese diplomatic cipher. Shortly after that accomplishment, William Friedman, legendary cryptographer and civilian head of SIS, wrote his Preliminary Historical Report on the Solution of the “B” Machine. In it he introduced the mysterious “Identification of Homologs” and stated there that it had been a crucial technology to the success of cracking PURPLE. Despite that dramatic assessment, the concept simply disappeared, ignored by all subsequent authors of PURPLE histories and technical analyses. So what exactly is the Identification of Homologs and what role did it play in the cryptanalysis of PURPLE? That is the subject of this paper. We give a complete technical description, as well as historical information, some newly uncovered, about how SIS collected PURPLE “data”.
1940年,美国陆军信号情报局(SIS)破解了日本外交密码“紫色”。在取得这一成就后不久,传奇密码学家、SIS文职负责人威廉·弗里德曼(William Friedman)撰写了他关于“B”机解决方案的初步历史报告。在这篇文章中,他介绍了神秘的“同源物鉴定”,并指出这是成功破解紫色病毒的关键技术。尽管如此,这个概念还是消失了,被PURPLE历史和技术分析的所有后续作者所忽视。那么,究竟什么是同源物识别,它在紫色密码分析中发挥了什么作用?这就是本文的主题。我们给出了一个完整的技术描述,以及历史信息,一些新发现的,关于SIS如何收集紫色“数据”。
{"title":"Cracking PURPLE: the identification of homologs in the cryptanalysis of the Angooki Taipu B cipher machine","authors":"K. Bures","doi":"10.1080/01611194.2022.2064200","DOIUrl":"https://doi.org/10.1080/01611194.2022.2064200","url":null,"abstract":"Abstract In 1940 the US Army’s Signal Intelligence Service (SIS) cracked PURPLE, the Japanese diplomatic cipher. Shortly after that accomplishment, William Friedman, legendary cryptographer and civilian head of SIS, wrote his Preliminary Historical Report on the Solution of the “B” Machine. In it he introduced the mysterious “Identification of Homologs” and stated there that it had been a crucial technology to the success of cracking PURPLE. Despite that dramatic assessment, the concept simply disappeared, ignored by all subsequent authors of PURPLE histories and technical analyses. So what exactly is the Identification of Homologs and what role did it play in the cryptanalysis of PURPLE? That is the subject of this paper. We give a complete technical description, as well as historical information, some newly uncovered, about how SIS collected PURPLE “data”.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"436 - 448"},"PeriodicalIF":0.6,"publicationDate":"2022-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43116081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The changes in Ottoman diplomatic cryptography and its methods during the 19th century (1811–1877) 19世纪(1811–1877)奥斯曼外交密码及其方法的变化
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-08-10 DOI: 10.1080/01611194.2022.2092916
S. Bingöl
Abstract In parallel with the change in the understanding of diplomacy during the reign of Selim III, the Ottoman Empire started to use diplomatic cryptography. However, the efforts which started in 1797 were interrupted to a great extent when the ambassadors were recalled to the state after 1811. In the following period, Chargé d’affaires took over their duties and continued to use cryptography. With the reassignment of ambassadors to European capitals after 1834, Ottoman diplomatic cryptography stepped into a new era. In this study, the process until 1877 is discussed in the light of encrypted documents found in Ottoman archives. Codes and coding/decoding methods of Ottoman diplomats throughout the period are also examined.
摘要在塞利姆三世统治期间,随着对外交理解的变化,奥斯曼帝国开始使用外交密码学。然而,从1797年开始的努力在很大程度上被中断了,因为大使们在1811年后被召回该州。在接下来的一段时间里,临时代办接管了他们的职责,并继续使用密码学。1834年后,随着驻欧洲各国首都大使的重新任命,奥斯曼外交密码进入了一个新时代。在这项研究中,1877年之前的过程是根据奥斯曼档案中发现的加密文件进行讨论的。还检查了整个时期奥斯曼外交官的代码和编码/解码方法。
{"title":"The changes in Ottoman diplomatic cryptography and its methods during the 19th century (1811–1877)","authors":"S. Bingöl","doi":"10.1080/01611194.2022.2092916","DOIUrl":"https://doi.org/10.1080/01611194.2022.2092916","url":null,"abstract":"Abstract In parallel with the change in the understanding of diplomacy during the reign of Selim III, the Ottoman Empire started to use diplomatic cryptography. However, the efforts which started in 1797 were interrupted to a great extent when the ambassadors were recalled to the state after 1811. In the following period, Chargé d’affaires took over their duties and continued to use cryptography. With the reassignment of ambassadors to European capitals after 1834, Ottoman diplomatic cryptography stepped into a new era. In this study, the process until 1877 is discussed in the light of encrypted documents found in Ottoman archives. Codes and coding/decoding methods of Ottoman diplomats throughout the period are also examined.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"541 - 569"},"PeriodicalIF":0.6,"publicationDate":"2022-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43023803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A treatise on the Rilke cryptogram 关于里尔克密码的论文
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-08-04 DOI: 10.1080/01611194.2022.2092784
Floe Foxon
Abstract The ‘Rilke Cryptogram’ is a possible cipher of German, WWII origin. This study summarises the text’s history, and examines explanations for its nature. Statistical techniques are applied to an updated transcription. The text consists of 18,760 characters in 3,305 unique groups of four, arranged into 670 rows by seven columns on 33 pages of an otherwise ordinary book. The distribution of these groups is not particularly Zipfian, suggesting the text is likely not a code or monoalphabetic substitution cipher. Its alphabet is longer than English and German (46 characters). Character and N-gram entropy analyses suggest the text is less ordered than English and German, but more ordered than random text. Machine-learning modelling suggests the text is a substitution cipher, but frequency and Kasiski-Kerckhoff analyses suggest otherwise. Sukhotin’s algorithm results for the text are somewhat consistent with results for German, though N-gram distributions do not strongly resemble English or German. Statistical analysis of physical typewriter key distances suggest the text’s groupings are highly unlikely to appear at random, and are consistent with intentional ‘lazy’ typing. The text is inconsistent with machine ciphers of its era (e.g., Enigma), and other features are not entirely consistent with non-cipher explanations. Further investigation is required.
摘要“里尔克密码”可能是源自二战的德国密码。本研究总结了文本的历史,并考察了对其性质的解释。将统计技术应用于更新的转录。该文本由3305个独特的四人组中的18760个字符组成,在一本普通的书的33页上排列成670行7列。这些组的分布并不是特别的Zipfian,这表明文本可能不是一个代码或单字母替换密码。它的字母表比英语和德语长(46个字符)。字符和N-gram熵分析表明,文本的有序性不如英语和德语,但比随机文本更有序。机器学习模型表明文本是一个替代密码,但频率和Kasiski Kerckhoff分析表明情况并非如此。Sukhotin对文本的算法结果与德语的结果有些一致,尽管N-gram分布与英语或德语并不十分相似。对物理打字机键距的统计分析表明,文本的分组极不可能随机出现,并且与有意的“懒惰”打字一致。该文本与其时代的机器密码(例如Enigma)不一致,其他特征也与非密码解释不完全一致。需要进一步调查。
{"title":"A treatise on the Rilke cryptogram","authors":"Floe Foxon","doi":"10.1080/01611194.2022.2092784","DOIUrl":"https://doi.org/10.1080/01611194.2022.2092784","url":null,"abstract":"Abstract The ‘Rilke Cryptogram’ is a possible cipher of German, WWII origin. This study summarises the text’s history, and examines explanations for its nature. Statistical techniques are applied to an updated transcription. The text consists of 18,760 characters in 3,305 unique groups of four, arranged into 670 rows by seven columns on 33 pages of an otherwise ordinary book. The distribution of these groups is not particularly Zipfian, suggesting the text is likely not a code or monoalphabetic substitution cipher. Its alphabet is longer than English and German (46 characters). Character and N-gram entropy analyses suggest the text is less ordered than English and German, but more ordered than random text. Machine-learning modelling suggests the text is a substitution cipher, but frequency and Kasiski-Kerckhoff analyses suggest otherwise. Sukhotin’s algorithm results for the text are somewhat consistent with results for German, though N-gram distributions do not strongly resemble English or German. Statistical analysis of physical typewriter key distances suggest the text’s groupings are highly unlikely to appear at random, and are consistent with intentional ‘lazy’ typing. The text is inconsistent with machine ciphers of its era (e.g., Enigma), and other features are not entirely consistent with non-cipher explanations. Further investigation is required.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"493 - 510"},"PeriodicalIF":0.6,"publicationDate":"2022-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45538842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Review of Parker Hitt: The Father of American Military Cryptology by Betsy Rohaly Smoot Betsy Rohaly Smoot的《Parker Hitt:美国军事密码学之父》评论
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-07-26 DOI: 10.1080/01611194.2022.2101404
Chris Christensen
William Friedman did his bit to keep Hitt’s name alive at the National Security Agency, but it was David Kahn who preserved Hitt’s legacy as a cryptologist with his book The Codebreakers. Kahn who expressed an interest in codes and ciphers at an early age, first wrote to Hitt in 1949, asking him to autograph his copy of Hitt’s Manual. In November 1963 Kahn contacted Hitt with some questions, and Parker suggested that he read Friedman’s Elements of Cryptanalysis, if he could find it. He also suggested that Kahn contact Friedman, “one of my prot eg es ... .” (200)
威廉·弗里德曼(William Friedman)尽了自己的一份力量,让希特的名字在国家安全局(National Security Agency)继续存在,但正是大卫·卡恩(David Kahn)用他的《密码破译者》(the Codebreakers)一书保留了希特作为密码学家的遗产。卡恩在很小的时候就表达了对密码的兴趣,1949年他第一次写信给希特,请他在自己的《希特手册》上签名。1963年11月,卡恩联系了希特,提出了一些问题,帕克建议他读弗里德曼的《密码分析要素》,如果他能找到的话。他还建议卡恩联系弗里德曼,“我的一个门徒……”(200)
{"title":"Review of Parker Hitt: The Father of American Military Cryptology by Betsy Rohaly Smoot","authors":"Chris Christensen","doi":"10.1080/01611194.2022.2101404","DOIUrl":"https://doi.org/10.1080/01611194.2022.2101404","url":null,"abstract":"William Friedman did his bit to keep Hitt’s name alive at the National Security Agency, but it was David Kahn who preserved Hitt’s legacy as a cryptologist with his book The Codebreakers. Kahn who expressed an interest in codes and ciphers at an early age, first wrote to Hitt in 1949, asking him to autograph his copy of Hitt’s Manual. In November 1963 Kahn contacted Hitt with some questions, and Parker suggested that he read Friedman’s Elements of Cryptanalysis, if he could find it. He also suggested that Kahn contact Friedman, “one of my prot eg es ... .” (200)","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"489 - 492"},"PeriodicalIF":0.6,"publicationDate":"2022-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43669221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resource guide for teaching post-quantum cryptography 后量子密码学教学资源指南
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-07-01 DOI: 10.1080/01611194.2022.2078077
Joshua Holden
Abstract Public-key cryptography has become a popular way to motivate the teaching of concepts in elementary number theory, abstract algebra, and introduction to proof courses, as well as in cryptography courses. Unfortunately, many experts expect quantum computers to make common forms of public-key cryptography obsolete in the near future. Fortunately, there are several systems being evaluated to replace RSA and the other systems we currently use. While some of the systems are too complicated to be good examples in introductory courses, others are either quite manageable or have simplified versions that are manageable. This article gives a tour of the main types of systems under consideration and the teaching resources available for instructors who want to teach them.
公钥密码学已经成为一种流行的方法,它可以激发初等数论、抽象代数、证明课程入门以及密码学课程的概念教学。不幸的是,许多专家预计量子计算机将在不久的将来淘汰常见的公钥加密形式。幸运的是,有几个系统正在评估以取代RSA和我们目前使用的其他系统。虽然有些系统过于复杂,不能作为入门课程的好例子,但其他系统要么相当易于管理,要么具有易于管理的简化版本。本文介绍了正在考虑的主要类型的系统以及想要教授这些系统的教师可用的教学资源。
{"title":"Resource guide for teaching post-quantum cryptography","authors":"Joshua Holden","doi":"10.1080/01611194.2022.2078077","DOIUrl":"https://doi.org/10.1080/01611194.2022.2078077","url":null,"abstract":"Abstract Public-key cryptography has become a popular way to motivate the teaching of concepts in elementary number theory, abstract algebra, and introduction to proof courses, as well as in cryptography courses. Unfortunately, many experts expect quantum computers to make common forms of public-key cryptography obsolete in the near future. Fortunately, there are several systems being evaluated to replace RSA and the other systems we currently use. While some of the systems are too complicated to be good examples in introductory courses, others are either quite manageable or have simplified versions that are manageable. This article gives a tour of the main types of systems under consideration and the teaching resources available for instructors who want to teach them.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"459 - 465"},"PeriodicalIF":0.6,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48517918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Genevieve Grotjan’s “great discovery” 吉纳维芙·格罗詹的“伟大发现”
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-06-20 DOI: 10.1080/01611194.2022.2060052
C. Christensen
Abstract On 20 February 1939, a new Japanese diplomatic cipher machine that U.S. Army codebreakers would name PURPLE came into use. By 10 April 1939, the Army’s Signal Intelligence Service (SIS) had made startling progress. SIS codebreakers had discovered that, for no cryptographic reason, PURPLE maintained the split of the Roman alphabet into a set of 6 letters and a set of 20 letters—the sixes and the twenties—a split that had been observed in PURPLE’s predecessor RED. They had a familiar problem, and they were quickly able to recover the enciphering table for the sixes But 18 months later they were still puzzled by the enciphering of the twenties Then, on 20 September 1940, Genevieve Grotjan, an SIS codebreaker, made a discovery that opened the way for the recovery of the PURPLE machine. This paper explores the patterns for which Grotjan was searching and concludes with what she found.
摘要1939年2月20日,一种新的日本外交密码机开始使用,美国陆军密码破译人员将其命名为PURPLE。到1939年4月10日,陆军信号情报局(SIS)取得了惊人的进展。SIS密码破译人员发现,由于没有密码原因,PURPLE将罗马字母表拆分为一组6个字母和一组20个字母——6和20——这是在PURPLE的前身RED中观察到的分裂。他们有一个熟悉的问题,很快就能够恢复6的加密表。但是18 几个月后,他们仍然对20世纪20年代的加密感到困惑。1940年9月20日,SIS密码破译者Genevieve Grotjan发现了一个发现,为紫色机器的回收开辟了道路。本文探讨了Grotjan一直在寻找的模式,并以她的发现作为结论。
{"title":"Genevieve Grotjan’s “great discovery”","authors":"C. Christensen","doi":"10.1080/01611194.2022.2060052","DOIUrl":"https://doi.org/10.1080/01611194.2022.2060052","url":null,"abstract":"Abstract On 20 February 1939, a new Japanese diplomatic cipher machine that U.S. Army codebreakers would name PURPLE came into use. By 10 April 1939, the Army’s Signal Intelligence Service (SIS) had made startling progress. SIS codebreakers had discovered that, for no cryptographic reason, PURPLE maintained the split of the Roman alphabet into a set of 6 letters and a set of 20 letters—the sixes and the twenties—a split that had been observed in PURPLE’s predecessor RED. They had a familiar problem, and they were quickly able to recover the enciphering table for the sixes But 18 months later they were still puzzled by the enciphering of the twenties Then, on 20 September 1940, Genevieve Grotjan, an SIS codebreaker, made a discovery that opened the way for the recovery of the PURPLE machine. This paper explores the patterns for which Grotjan was searching and concludes with what she found.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"302 - 317"},"PeriodicalIF":0.6,"publicationDate":"2022-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44932212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unicity distance of the Zodiac-340 cipher 黄道带-340密码的唯一距离
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-06-09 DOI: 10.1080/01611194.2023.2174821
J. Gathen
Abstract In December 2020, David Oranchak, Jarl Van Eycke, and Sam Blake solved a 51-year old mystery: the Zodiac cipher of 340 symbols. The correctness of their solution has not been seriously doubted, and here we give a further argument in its favor: the unicity distance of the cipher’s system is at most 153.
摘要2020年12月,David Oranchak、Jarl Van Eycke和Sam Blake解开了一个51年前的谜团:340个符号的黄道带密码。他们的解决方案的正确性没有受到严重怀疑,在这里我们给出了一个有利于它的进一步论点:密码系统的唯一性距离最多为153。
{"title":"Unicity distance of the Zodiac-340 cipher","authors":"J. Gathen","doi":"10.1080/01611194.2023.2174821","DOIUrl":"https://doi.org/10.1080/01611194.2023.2174821","url":null,"abstract":"Abstract In December 2020, David Oranchak, Jarl Van Eycke, and Sam Blake solved a 51-year old mystery: the Zodiac cipher of 340 symbols. The correctness of their solution has not been seriously doubted, and here we give a further argument in its favor: the unicity distance of the cipher’s system is at most 153.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"474 - 488"},"PeriodicalIF":0.6,"publicationDate":"2022-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42855744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of rotation and shift based diffusion functions 基于旋转和移位的扩散函数分析
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-05-18 DOI: 10.1080/01611194.2022.2046660
Arvind Kumar, P. Mishra, O. Ojjela
Abstract ‘Rotation and shift’ based diffusion functions are used in modern ciphers especially in ARX (Addition, Rotation, and XOR) based designs. They are preferred over other alternatives as they are efficient and lightweight. Usually, such diffusion functions map an n-bit block to another n-bit block. One of the requirements for an n-bit to n-bit diffusion function is that, it should be invertible. In this paper, we present mathematical models for different classes of ‘rotation and shift’ based diffusion functions and explore their invertibility. We derive sufficient conditions under which diffusion functions of these classes are invertible.
基于“旋转和移位”的扩散函数用于现代密码中,特别是基于ARX(加法、旋转和异或)的设计。它们比其他替代品更受欢迎,因为它们效率高、重量轻。通常,这样的扩散函数将一个n位块映射到另一个n位块。一个n位到n位的扩散函数的要求之一是,它应该是可逆的。本文给出了不同类型的“旋转和移位”扩散函数的数学模型,并探讨了它们的可逆性。给出了这类扩散函数可逆的充分条件。
{"title":"Analysis of rotation and shift based diffusion functions","authors":"Arvind Kumar, P. Mishra, O. Ojjela","doi":"10.1080/01611194.2022.2046660","DOIUrl":"https://doi.org/10.1080/01611194.2022.2046660","url":null,"abstract":"Abstract ‘Rotation and shift’ based diffusion functions are used in modern ciphers especially in ARX (Addition, Rotation, and XOR) based designs. They are preferred over other alternatives as they are efficient and lightweight. Usually, such diffusion functions map an n-bit block to another n-bit block. One of the requirements for an n-bit to n-bit diffusion function is that, it should be invertible. In this paper, we present mathematical models for different classes of ‘rotation and shift’ based diffusion functions and explore their invertibility. We derive sufficient conditions under which diffusion functions of these classes are invertible.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"419 - 435"},"PeriodicalIF":0.6,"publicationDate":"2022-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44929140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Cryptologia
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1