Pub Date : 2022-05-16DOI: 10.1080/01611194.2021.2021565
D. Code
Abstract The purpose of this article is to analyze the characteristics of a range of music-based ciphers (from the fifteenth to twentieth centuries) with respect to their intended goals and actual outcomes. Historically, the practitioners of music-based ciphers generally fall into one of two distinct groups: composers and cryptographers. The primary goal of the composers was to create music that embedded extra-musical content by means of musico-alphabetic correspondences. The cryptographers were generally interested in presenting many varieties of cryptographic methods of which ciphers incorporating musical notes were a very small part. The systems used by the former were usually so superficial they should not really be considered encryption; whereas the systems used by the latter were so mechanical that most would not consider the results to be music. Musical encryption can rarely be both because the attributes needed for convincing musicality and strong encryption are not mutually conducive. However, after examining these music-based cryptosystems in detail, I will consider what criteria might be necessary to create a reasonably secure cipher which produces a normatively-musical output and apply these in the form of an original music-based cipher. For most of the ciphers, interactive web applications have been developed which render plaintext into enciphered melodies.
{"title":"Can musical encryption be both? A survey of music-based ciphers","authors":"D. Code","doi":"10.1080/01611194.2021.2021565","DOIUrl":"https://doi.org/10.1080/01611194.2021.2021565","url":null,"abstract":"Abstract The purpose of this article is to analyze the characteristics of a range of music-based ciphers (from the fifteenth to twentieth centuries) with respect to their intended goals and actual outcomes. Historically, the practitioners of music-based ciphers generally fall into one of two distinct groups: composers and cryptographers. The primary goal of the composers was to create music that embedded extra-musical content by means of musico-alphabetic correspondences. The cryptographers were generally interested in presenting many varieties of cryptographic methods of which ciphers incorporating musical notes were a very small part. The systems used by the former were usually so superficial they should not really be considered encryption; whereas the systems used by the latter were so mechanical that most would not consider the results to be music. Musical encryption can rarely be both because the attributes needed for convincing musicality and strong encryption are not mutually conducive. However, after examining these music-based cryptosystems in detail, I will consider what criteria might be necessary to create a reasonably secure cipher which produces a normatively-musical output and apply these in the form of an original music-based cipher. For most of the ciphers, interactive web applications have been developed which render plaintext into enciphered melodies.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"318 - 364"},"PeriodicalIF":0.6,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47327645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-05DOI: 10.1080/01611194.2021.2022035
G. Teşeleanu
Abstract In our paper we study the effect of changing the commutative group operation used in Feistel and Lai-Massey symmetric structures into a quasigroup operation. We prove that if the quasigroup operation is isotopic with a group the complexity of mounting a differential attack against our generalization of the Feistel structure is the same as attacking the unkeyed version of the general Feistel iteration based on Also, when is non-commutative, we show that both versions of the Feistel structure are equivalent from a differential point of view. For the Lai-Massey structure, we introduce four non-commutative versions, we argue for the necessity of working over a group and we provide some necessary conditions for the differential equivalency of the four notions.
{"title":"Cryptographic symmetric structures based on quasigroups","authors":"G. Teşeleanu","doi":"10.1080/01611194.2021.2022035","DOIUrl":"https://doi.org/10.1080/01611194.2021.2022035","url":null,"abstract":"Abstract In our paper we study the effect of changing the commutative group operation used in Feistel and Lai-Massey symmetric structures into a quasigroup operation. We prove that if the quasigroup operation is isotopic with a group the complexity of mounting a differential attack against our generalization of the Feistel structure is the same as attacking the unkeyed version of the general Feistel iteration based on Also, when is non-commutative, we show that both versions of the Feistel structure are equivalent from a differential point of view. For the Lai-Massey structure, we introduce four non-commutative versions, we argue for the necessity of working over a group and we provide some necessary conditions for the differential equivalency of the four notions.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"365 - 392"},"PeriodicalIF":0.6,"publicationDate":"2022-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41568510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-30DOI: 10.1080/01611194.2022.2043488
J. Dooley
{"title":"Review of The Rose Code by Kate Quinn","authors":"J. Dooley","doi":"10.1080/01611194.2022.2043488","DOIUrl":"https://doi.org/10.1080/01611194.2022.2043488","url":null,"abstract":"","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"393 - 395"},"PeriodicalIF":0.6,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45694546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-25DOI: 10.1080/01611194.2021.2023235
Stuart Boersma
Abstract Elizebeth Smith Friedman has been credited with breaking hundreds of encryption systems during Prohibition, yet few complete examples exist. Using material available in the Elizebeth Smith Friedman archives at the Marshall Library, examples of a variety of encryption systems are presented. Complete examples include original ciphertext, plaintext, and a description of the encryption process. Friedman’s cryptanalysis of some of these messages is described.
{"title":"Complete examples of encryption systems broken by Elizebeth Smith Friedman: 1923–1934","authors":"Stuart Boersma","doi":"10.1080/01611194.2021.2023235","DOIUrl":"https://doi.org/10.1080/01611194.2021.2023235","url":null,"abstract":"Abstract Elizebeth Smith Friedman has been credited with breaking hundreds of encryption systems during Prohibition, yet few complete examples exist. Using material available in the Elizebeth Smith Friedman archives at the Marshall Library, examples of a variety of encryption systems are presented. Complete examples include original ciphertext, plaintext, and a description of the encryption process. Friedman’s cryptanalysis of some of these messages is described.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"397 - 418"},"PeriodicalIF":0.6,"publicationDate":"2022-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44181648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-21DOI: 10.1080/01611194.2022.2037929
J. Dooley
Historian and documentarian Marc McMenamin’s first book, Codebreaker, tells the story of Dr. Richard Hayes, the long-time Director of the National Library of Ireland, and his work assisting Irish military intelligence (G2) as a cryptanalyst and interrogator during World War II. The book is less a biography of Richard Hayes, than a treatment of the efforts of German military intelligence (the Abwehr) to influence the Irish Republican Army to ally with the Germans to expand the war against the British into Ireland. It covers quite well the Irish government’s response to the German espionage threat and the continuing threat of the radical members of the Irish Republican Army (IRA). Hayes was an integral part of G2’s response to the incursion of German spies into Ireland during the war. From the outset of World War II, Nazi Germany sought to open a second front against Great Britain through Ireland. The British were using Northern Ireland as a staging ground for both army and naval forces, and the Americans would do the same after they joined the conflict. The State of Ireland, headed by Prime Minister (Taoiseach) Eamon De Valera had declared its neutrality in the conflict early on. However, that did not mean that there was no conflict in Ireland itself. One opening the Nazis hoped to exploit was the continuing presence of a radical part of the Irish Republican Army that was conspiring against both the government of Ireland, and the British. The Nazis hoped to use the IRA as a destabilizing force within Ireland and as a terrorist organization to undermine and sabotage British rule in the north. To this end, the Abwehr plotted to insert German spies into Ireland to connect with the IRA, arrange to supply them with weapons and explosives, and use them as allies in a possible invasion of either Northern Ireland, the State of Ireland, or both. The German spies who were dropped into Ireland by parachute or put on shore via U-boat were generally incompetent. All but two of them were arrested within 48 hours of their illegal arrival in Ireland. Their associates in the IRA were slightly more capable, but still not up to the caliber of spies portrayed in either literature or in military history books. The most interesting thing about this book is the revelations about the lengths that members of the IRA were willing to go in order to get the British out of Ireland and to disrupt the Irish government. At least one faction of the IRA was nearly constantly trying to convince the Nazis to supply them with arms and ammunition and were
{"title":"Review of codebreaker by Marc McMenamin","authors":"J. Dooley","doi":"10.1080/01611194.2022.2037929","DOIUrl":"https://doi.org/10.1080/01611194.2022.2037929","url":null,"abstract":"Historian and documentarian Marc McMenamin’s first book, Codebreaker, tells the story of Dr. Richard Hayes, the long-time Director of the National Library of Ireland, and his work assisting Irish military intelligence (G2) as a cryptanalyst and interrogator during World War II. The book is less a biography of Richard Hayes, than a treatment of the efforts of German military intelligence (the Abwehr) to influence the Irish Republican Army to ally with the Germans to expand the war against the British into Ireland. It covers quite well the Irish government’s response to the German espionage threat and the continuing threat of the radical members of the Irish Republican Army (IRA). Hayes was an integral part of G2’s response to the incursion of German spies into Ireland during the war. From the outset of World War II, Nazi Germany sought to open a second front against Great Britain through Ireland. The British were using Northern Ireland as a staging ground for both army and naval forces, and the Americans would do the same after they joined the conflict. The State of Ireland, headed by Prime Minister (Taoiseach) Eamon De Valera had declared its neutrality in the conflict early on. However, that did not mean that there was no conflict in Ireland itself. One opening the Nazis hoped to exploit was the continuing presence of a radical part of the Irish Republican Army that was conspiring against both the government of Ireland, and the British. The Nazis hoped to use the IRA as a destabilizing force within Ireland and as a terrorist organization to undermine and sabotage British rule in the north. To this end, the Abwehr plotted to insert German spies into Ireland to connect with the IRA, arrange to supply them with weapons and explosives, and use them as allies in a possible invasion of either Northern Ireland, the State of Ireland, or both. The German spies who were dropped into Ireland by parachute or put on shore via U-boat were generally incompetent. All but two of them were arrested within 48 hours of their illegal arrival in Ireland. Their associates in the IRA were slightly more capable, but still not up to the caliber of spies portrayed in either literature or in military history books. The most interesting thing about this book is the revelations about the lengths that members of the IRA were willing to go in order to get the British out of Ireland and to disrupt the Irish government. At least one faction of the IRA was nearly constantly trying to convince the Nazis to supply them with arms and ammunition and were","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"46 1","pages":"556 - 560"},"PeriodicalIF":0.6,"publicationDate":"2022-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46257710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-11DOI: 10.1080/01611194.2022.2026839
Chris Christensen
Preparing for war requires training. Codebreaking and intelligence require training a sufficient number of translators of enemy languages. On 7 December 1941 when Japan attacked British territories in the Southwest Pacific and the U.S. Navy base in Pearl Harbor, Britain did not have the necessary translators of Japanese. It was necessary for Britain to establish training programs to supply the translators who would be needed for codebreaking, interrogating prisoners of war, translating captured documents, and interpreting unenciphered voice. Eavesdropping on the Emperor is the story of how Britain trained Japanese translators for the war and the tasks that those translators undertook. It is an interesting story but one that has been explored too late. The author Peter Kornicki, who is an Emeritus Professor of Japanese at the University of Cambridge and a Fellow of the British Academy, notes that:
{"title":"Review of Eavesdropping on the Emperor: Interrogators and Codebreakers in Britain’s War with Japan by Peter Kornicki","authors":"Chris Christensen","doi":"10.1080/01611194.2022.2026839","DOIUrl":"https://doi.org/10.1080/01611194.2022.2026839","url":null,"abstract":"Preparing for war requires training. Codebreaking and intelligence require training a sufficient number of translators of enemy languages. On 7 December 1941 when Japan attacked British territories in the Southwest Pacific and the U.S. Navy base in Pearl Harbor, Britain did not have the necessary translators of Japanese. It was necessary for Britain to establish training programs to supply the translators who would be needed for codebreaking, interrogating prisoners of war, translating captured documents, and interpreting unenciphered voice. Eavesdropping on the Emperor is the story of how Britain trained Japanese translators for the war and the tasks that those translators undertook. It is an interesting story but one that has been explored too late. The author Peter Kornicki, who is an Emeritus Professor of Japanese at the University of Cambridge and a Fellow of the British Academy, notes that:","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"46 1","pages":"552 - 555"},"PeriodicalIF":0.6,"publicationDate":"2022-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49426121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-11DOI: 10.1080/01611194.2022.2026838
Chris Christensen
{"title":"Review of Codebreaker Girls: A Secret Life at Bletchley Park by Jan Slimming","authors":"Chris Christensen","doi":"10.1080/01611194.2022.2026838","DOIUrl":"https://doi.org/10.1080/01611194.2022.2026838","url":null,"abstract":"","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"93 - 96"},"PeriodicalIF":0.6,"publicationDate":"2022-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45672002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-03DOI: 10.1080/01611194.2021.1998808
David Sherman
Abstract David Kahn’s The Codebreakers, published in 1967, is the first modern comprehensive history of cryptology. Based on extensive research, including interviews with former government cryptologists in the United States and Europe, Kahn’s volume blazed a trail that numerous historians would follow. It also attracted the attention of intelligence officials in Washington and London, who sought to excise or edit passages in the book. In one of these, Kahn made but agreed to remove a claim that during World War II the Allies had broken the supposedly invulnerable Enigma, a feat that would remain secret until the following decade.
{"title":"The Codebreakers war: David Kahn, Macmillan, the government, and the making of a cryptologic history masterpiece","authors":"David Sherman","doi":"10.1080/01611194.2021.1998808","DOIUrl":"https://doi.org/10.1080/01611194.2021.1998808","url":null,"abstract":"Abstract David Kahn’s The Codebreakers, published in 1967, is the first modern comprehensive history of cryptology. Based on extensive research, including interviews with former government cryptologists in the United States and Europe, Kahn’s volume blazed a trail that numerous historians would follow. It also attracted the attention of intelligence officials in Washington and London, who sought to excise or edit passages in the book. In one of these, Kahn made but agreed to remove a claim that during World War II the Allies had broken the supposedly invulnerable Enigma, a feat that would remain secret until the following decade.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"205 - 226"},"PeriodicalIF":0.6,"publicationDate":"2022-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49551025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-26DOI: 10.1080/01611194.2022.2026841
Chris Christensen
The story of the Rohonc Code begins a little more than 180 years ago. Discovered in the collection of the Hungarian Academy of Sciences was a mysterious codex. It is 448 pages long, handwritten with 9 to 14 lines of writing per page, and heavily illustrated with nearly 90 handdrawn images (Figure 1). Some pages at the beginning and at the end of the codex were detached, and their order was not known. The codex became part of the collection when the library of theHungarian noblemanGuszt av Batthy any was absorbed into the collection. The discovery of the manuscript created excitement in the academic world, and exploration of the writing and its meaning began. The codex was first examined in the early 1840s by J anos Jerney.
Rohonc密码的故事始于180多年前。在匈牙利科学院的收藏品中发现了一个神秘的密码。它长达448页,手写,每页有9到14行文字,并用近90幅手绘图像进行了大量插图(图1)。法典开头和结尾的一些页面是分离的,它们的顺序未知。当匈牙利贵族Guszt av Batthy-any的图书馆被纳入收藏时,该法典就成为了收藏的一部分。手稿的发现在学术界引起了轰动,对写作及其意义的探索也开始了。该法典于19世纪40年代初由J anos Jerney首次审查。
{"title":"Review of The Rohonc Code: Tracing a Historical Riddle by Benedek Láng","authors":"Chris Christensen","doi":"10.1080/01611194.2022.2026841","DOIUrl":"https://doi.org/10.1080/01611194.2022.2026841","url":null,"abstract":"The story of the Rohonc Code begins a little more than 180 years ago. Discovered in the collection of the Hungarian Academy of Sciences was a mysterious codex. It is 448 pages long, handwritten with 9 to 14 lines of writing per page, and heavily illustrated with nearly 90 handdrawn images (Figure 1). Some pages at the beginning and at the end of the codex were detached, and their order was not known. The codex became part of the collection when the library of theHungarian noblemanGuszt av Batthy any was absorbed into the collection. The discovery of the manuscript created excitement in the academic world, and exploration of the writing and its meaning began. The codex was first examined in the early 1840s by J anos Jerney.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"282 - 284"},"PeriodicalIF":0.6,"publicationDate":"2022-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49233610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}