首页 > 最新文献

Cryptologia最新文献

英文 中文
Can musical encryption be both? A survey of music-based ciphers 音乐加密能兼而有之吗?基于音乐的密码研究综述
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-05-16 DOI: 10.1080/01611194.2021.2021565
D. Code
Abstract The purpose of this article is to analyze the characteristics of a range of music-based ciphers (from the fifteenth to twentieth centuries) with respect to their intended goals and actual outcomes. Historically, the practitioners of music-based ciphers generally fall into one of two distinct groups: composers and cryptographers. The primary goal of the composers was to create music that embedded extra-musical content by means of musico-alphabetic correspondences. The cryptographers were generally interested in presenting many varieties of cryptographic methods of which ciphers incorporating musical notes were a very small part. The systems used by the former were usually so superficial they should not really be considered encryption; whereas the systems used by the latter were so mechanical that most would not consider the results to be music. Musical encryption can rarely be both because the attributes needed for convincing musicality and strong encryption are not mutually conducive. However, after examining these music-based cryptosystems in detail, I will consider what criteria might be necessary to create a reasonably secure cipher which produces a normatively-musical output and apply these in the form of an original music-based cipher. For most of the ciphers, interactive web applications have been developed which render plaintext into enciphered melodies.
摘要本文的目的是分析一系列基于音乐的密码(从15世纪到20世纪)的预期目标和实际结果的特征。从历史上看,基于音乐的密码的实践者通常分为两类:作曲家和密码学家。作曲家的主要目标是通过音乐字母对应的方式创作嵌入额外音乐内容的音乐。密码学家通常对呈现多种密码方法感兴趣,其中包含音符的密码只是其中很小的一部分。前者使用的系统通常过于肤浅,不应该真正被视为加密;而后者使用的系统是如此机械,以至于大多数人不会认为结果是音乐。音乐加密很少同时存在,因为令人信服的音乐性和强加密所需的属性并不相互有利。然而,在详细研究了这些基于音乐的密码系统后,我将考虑创建一个合理安全的密码可能需要什么标准,该密码可以产生规范的音乐输出,并以原始基于音乐的加密的形式应用这些密码。对于大多数密码,已经开发了交互式网络应用程序,将明文呈现为加密的旋律。
{"title":"Can musical encryption be both? A survey of music-based ciphers","authors":"D. Code","doi":"10.1080/01611194.2021.2021565","DOIUrl":"https://doi.org/10.1080/01611194.2021.2021565","url":null,"abstract":"Abstract The purpose of this article is to analyze the characteristics of a range of music-based ciphers (from the fifteenth to twentieth centuries) with respect to their intended goals and actual outcomes. Historically, the practitioners of music-based ciphers generally fall into one of two distinct groups: composers and cryptographers. The primary goal of the composers was to create music that embedded extra-musical content by means of musico-alphabetic correspondences. The cryptographers were generally interested in presenting many varieties of cryptographic methods of which ciphers incorporating musical notes were a very small part. The systems used by the former were usually so superficial they should not really be considered encryption; whereas the systems used by the latter were so mechanical that most would not consider the results to be music. Musical encryption can rarely be both because the attributes needed for convincing musicality and strong encryption are not mutually conducive. However, after examining these music-based cryptosystems in detail, I will consider what criteria might be necessary to create a reasonably secure cipher which produces a normatively-musical output and apply these in the form of an original music-based cipher. For most of the ciphers, interactive web applications have been developed which render plaintext into enciphered melodies.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"318 - 364"},"PeriodicalIF":0.6,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47327645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Correction 修正
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-04-29 DOI: 10.1080/01611194.2022.2061772
{"title":"Correction","authors":"","doi":"10.1080/01611194.2022.2061772","DOIUrl":"https://doi.org/10.1080/01611194.2022.2061772","url":null,"abstract":"","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"46 1","pages":"290 - 290"},"PeriodicalIF":0.6,"publicationDate":"2022-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44062574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptographic symmetric structures based on quasigroups 基于拟群的密码对称结构
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-04-05 DOI: 10.1080/01611194.2021.2022035
G. Teşeleanu
Abstract In our paper we study the effect of changing the commutative group operation used in Feistel and Lai-Massey symmetric structures into a quasigroup operation. We prove that if the quasigroup operation is isotopic with a group the complexity of mounting a differential attack against our generalization of the Feistel structure is the same as attacking the unkeyed version of the general Feistel iteration based on Also, when is non-commutative, we show that both versions of the Feistel structure are equivalent from a differential point of view. For the Lai-Massey structure, we introduce four non-commutative versions, we argue for the necessity of working over a group and we provide some necessary conditions for the differential equivalency of the four notions.
摘要在本文中,我们研究了将Feistel和Lai-Massey对称结构中使用的交换群运算变为拟群运算的效果。我们证明了如果准群运算与群是同位素的,那么针对我们对Feistel结构的推广进行微分攻击的复杂性与攻击基于的一般Feistel迭代的unkeyed版本是相同的。此外,当是非交换的时,我们从微分的角度证明了Feistel结构的两个版本是等价的。对于Lai-Massey结构,我们引入了四个非交换形式,我们论证了在群上工作的必要性,并为这四个概念的微分等价性提供了一些必要条件。
{"title":"Cryptographic symmetric structures based on quasigroups","authors":"G. Teşeleanu","doi":"10.1080/01611194.2021.2022035","DOIUrl":"https://doi.org/10.1080/01611194.2021.2022035","url":null,"abstract":"Abstract In our paper we study the effect of changing the commutative group operation used in Feistel and Lai-Massey symmetric structures into a quasigroup operation. We prove that if the quasigroup operation is isotopic with a group the complexity of mounting a differential attack against our generalization of the Feistel structure is the same as attacking the unkeyed version of the general Feistel iteration based on Also, when is non-commutative, we show that both versions of the Feistel structure are equivalent from a differential point of view. For the Lai-Massey structure, we introduce four non-commutative versions, we argue for the necessity of working over a group and we provide some necessary conditions for the differential equivalency of the four notions.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"365 - 392"},"PeriodicalIF":0.6,"publicationDate":"2022-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41568510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Review of The Rose Code by Kate Quinn 回顾凯特·奎因的《玫瑰密码》
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-03-30 DOI: 10.1080/01611194.2022.2043488
J. Dooley
{"title":"Review of The Rose Code by Kate Quinn","authors":"J. Dooley","doi":"10.1080/01611194.2022.2043488","DOIUrl":"https://doi.org/10.1080/01611194.2022.2043488","url":null,"abstract":"","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"393 - 395"},"PeriodicalIF":0.6,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45694546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Complete examples of encryption systems broken by Elizebeth Smith Friedman: 1923–1934 伊丽莎白·史密斯·弗里德曼破解加密系统的完整例子:1923-1934
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-02-25 DOI: 10.1080/01611194.2021.2023235
Stuart Boersma
Abstract Elizebeth Smith Friedman has been credited with breaking hundreds of encryption systems during Prohibition, yet few complete examples exist. Using material available in the Elizebeth Smith Friedman archives at the Marshall Library, examples of a variety of encryption systems are presented. Complete examples include original ciphertext, plaintext, and a description of the encryption process. Friedman’s cryptanalysis of some of these messages is described.
伊丽莎白·史密斯·弗里德曼被认为在禁酒令期间破解了数百个加密系统,但很少有完整的例子存在。利用马歇尔图书馆的伊丽莎白·史密斯·弗里德曼档案中可用的材料,介绍了各种加密系统的示例。完整的示例包括原始密文、明文和加密过程的描述。本文描述了弗里德曼对其中一些信息的密码分析。
{"title":"Complete examples of encryption systems broken by Elizebeth Smith Friedman: 1923–1934","authors":"Stuart Boersma","doi":"10.1080/01611194.2021.2023235","DOIUrl":"https://doi.org/10.1080/01611194.2021.2023235","url":null,"abstract":"Abstract Elizebeth Smith Friedman has been credited with breaking hundreds of encryption systems during Prohibition, yet few complete examples exist. Using material available in the Elizebeth Smith Friedman archives at the Marshall Library, examples of a variety of encryption systems are presented. Complete examples include original ciphertext, plaintext, and a description of the encryption process. Friedman’s cryptanalysis of some of these messages is described.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"397 - 418"},"PeriodicalIF":0.6,"publicationDate":"2022-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44181648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Review of codebreaker by Marc McMenamin Marc McMenamin的代码破解评论
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-02-21 DOI: 10.1080/01611194.2022.2037929
J. Dooley
Historian and documentarian Marc McMenamin’s first book, Codebreaker, tells the story of Dr. Richard Hayes, the long-time Director of the National Library of Ireland, and his work assisting Irish military intelligence (G2) as a cryptanalyst and interrogator during World War II. The book is less a biography of Richard Hayes, than a treatment of the efforts of German military intelligence (the Abwehr) to influence the Irish Republican Army to ally with the Germans to expand the war against the British into Ireland. It covers quite well the Irish government’s response to the German espionage threat and the continuing threat of the radical members of the Irish Republican Army (IRA). Hayes was an integral part of G2’s response to the incursion of German spies into Ireland during the war. From the outset of World War II, Nazi Germany sought to open a second front against Great Britain through Ireland. The British were using Northern Ireland as a staging ground for both army and naval forces, and the Americans would do the same after they joined the conflict. The State of Ireland, headed by Prime Minister (Taoiseach) Eamon De Valera had declared its neutrality in the conflict early on. However, that did not mean that there was no conflict in Ireland itself. One opening the Nazis hoped to exploit was the continuing presence of a radical part of the Irish Republican Army that was conspiring against both the government of Ireland, and the British. The Nazis hoped to use the IRA as a destabilizing force within Ireland and as a terrorist organization to undermine and sabotage British rule in the north. To this end, the Abwehr plotted to insert German spies into Ireland to connect with the IRA, arrange to supply them with weapons and explosives, and use them as allies in a possible invasion of either Northern Ireland, the State of Ireland, or both. The German spies who were dropped into Ireland by parachute or put on shore via U-boat were generally incompetent. All but two of them were arrested within 48 hours of their illegal arrival in Ireland. Their associates in the IRA were slightly more capable, but still not up to the caliber of spies portrayed in either literature or in military history books. The most interesting thing about this book is the revelations about the lengths that members of the IRA were willing to go in order to get the British out of Ireland and to disrupt the Irish government. At least one faction of the IRA was nearly constantly trying to convince the Nazis to supply them with arms and ammunition and were
历史学家和纪录片导演马克·麦克梅纳明的第一本书《密码破解者》讲述了理查德·海斯博士的故事,他长期担任爱尔兰国家图书馆馆长,在第二次世界大战期间,他作为密码分析师和审讯员协助爱尔兰军事情报机构(G2)工作。这本书与其说是理查德·海斯的传记,不如说是对德国军事情报机构(Abwehr)努力影响爱尔兰共和军与德国结盟,将对抗英国的战争扩大到爱尔兰的处理。它很好地描述了爱尔兰政府对德国间谍威胁的反应,以及爱尔兰共和军(IRA)激进分子的持续威胁。海耶斯是G2对战争期间德国间谍入侵爱尔兰的反应中不可或缺的一部分。从第二次世界大战开始,纳粹德国就试图通过爱尔兰开辟对抗英国的第二条战线。英国人把北爱尔兰作为陆军和海军的集结地,美国人在加入冲突后也会这样做。以总理埃蒙·德瓦莱拉为首的爱尔兰国一开始就宣布在冲突中保持中立。然而,这并不意味着爱尔兰内部没有冲突。纳粹希望利用的一个机会是,爱尔兰共和军中激进分子的持续存在,他们密谋反对爱尔兰政府和英国。纳粹希望利用爱尔兰共和军作为爱尔兰内部的不稳定力量,并作为一个恐怖组织来破坏英国在北部的统治。为此,阿布韦尔计划在爱尔兰安插德国间谍,与爱尔兰共和军联系,安排向他们提供武器和炸药,并利用他们作为盟友,可能入侵北爱尔兰、爱尔兰国,或两者兼而有之。用降落伞空投到爱尔兰或用u型潜艇上岸的德国间谍一般都是不称职的。除两人外,他们都在非法抵达爱尔兰的48小时内被捕。他们在爱尔兰共和军的同伙略强一些,但仍达不到文学作品或军事历史书中所描绘的间谍水平。这本书最有趣的地方在于揭露了爱尔兰共和军成员为了把英国人赶出爱尔兰并破坏爱尔兰政府而不惜一切代价。爱尔兰共和军中至少有一个派别几乎一直在试图说服纳粹向他们提供武器和弹药
{"title":"Review of codebreaker by Marc McMenamin","authors":"J. Dooley","doi":"10.1080/01611194.2022.2037929","DOIUrl":"https://doi.org/10.1080/01611194.2022.2037929","url":null,"abstract":"Historian and documentarian Marc McMenamin’s first book, Codebreaker, tells the story of Dr. Richard Hayes, the long-time Director of the National Library of Ireland, and his work assisting Irish military intelligence (G2) as a cryptanalyst and interrogator during World War II. The book is less a biography of Richard Hayes, than a treatment of the efforts of German military intelligence (the Abwehr) to influence the Irish Republican Army to ally with the Germans to expand the war against the British into Ireland. It covers quite well the Irish government’s response to the German espionage threat and the continuing threat of the radical members of the Irish Republican Army (IRA). Hayes was an integral part of G2’s response to the incursion of German spies into Ireland during the war. From the outset of World War II, Nazi Germany sought to open a second front against Great Britain through Ireland. The British were using Northern Ireland as a staging ground for both army and naval forces, and the Americans would do the same after they joined the conflict. The State of Ireland, headed by Prime Minister (Taoiseach) Eamon De Valera had declared its neutrality in the conflict early on. However, that did not mean that there was no conflict in Ireland itself. One opening the Nazis hoped to exploit was the continuing presence of a radical part of the Irish Republican Army that was conspiring against both the government of Ireland, and the British. The Nazis hoped to use the IRA as a destabilizing force within Ireland and as a terrorist organization to undermine and sabotage British rule in the north. To this end, the Abwehr plotted to insert German spies into Ireland to connect with the IRA, arrange to supply them with weapons and explosives, and use them as allies in a possible invasion of either Northern Ireland, the State of Ireland, or both. The German spies who were dropped into Ireland by parachute or put on shore via U-boat were generally incompetent. All but two of them were arrested within 48 hours of their illegal arrival in Ireland. Their associates in the IRA were slightly more capable, but still not up to the caliber of spies portrayed in either literature or in military history books. The most interesting thing about this book is the revelations about the lengths that members of the IRA were willing to go in order to get the British out of Ireland and to disrupt the Irish government. At least one faction of the IRA was nearly constantly trying to convince the Nazis to supply them with arms and ammunition and were","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"46 1","pages":"556 - 560"},"PeriodicalIF":0.6,"publicationDate":"2022-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46257710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of Eavesdropping on the Emperor: Interrogators and Codebreakers in Britain’s War with Japan by Peter Kornicki 《窃听天皇:英国对日战争中的审问者和密码破译者》述评
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-02-11 DOI: 10.1080/01611194.2022.2026839
Chris Christensen
Preparing for war requires training. Codebreaking and intelligence require training a sufficient number of translators of enemy languages. On 7 December 1941 when Japan attacked British territories in the Southwest Pacific and the U.S. Navy base in Pearl Harbor, Britain did not have the necessary translators of Japanese. It was necessary for Britain to establish training programs to supply the translators who would be needed for codebreaking, interrogating prisoners of war, translating captured documents, and interpreting unenciphered voice. Eavesdropping on the Emperor is the story of how Britain trained Japanese translators for the war and the tasks that those translators undertook. It is an interesting story but one that has been explored too late. The author Peter Kornicki, who is an Emeritus Professor of Japanese at the University of Cambridge and a Fellow of the British Academy, notes that:
备战需要训练。破译密码和情报需要培训足够数量的敌方语言翻译人员。1941年12月7日,当日本袭击西南太平洋的英国领土和珍珠港的美国海军基地时,英国没有必要的日语翻译。英国有必要建立培训项目,为破译密码、审问战俘、翻译被俘文件和翻译未加密语音提供所需的翻译。《窃听天皇》讲述了英国如何为战争培训日本翻译以及这些翻译所承担的任务。这是一个有趣的故事,但探索得太晚了。作者Peter Kornicki是剑桥大学日语名誉教授和英国科学院院士,他指出:
{"title":"Review of Eavesdropping on the Emperor: Interrogators and Codebreakers in Britain’s War with Japan by Peter Kornicki","authors":"Chris Christensen","doi":"10.1080/01611194.2022.2026839","DOIUrl":"https://doi.org/10.1080/01611194.2022.2026839","url":null,"abstract":"Preparing for war requires training. Codebreaking and intelligence require training a sufficient number of translators of enemy languages. On 7 December 1941 when Japan attacked British territories in the Southwest Pacific and the U.S. Navy base in Pearl Harbor, Britain did not have the necessary translators of Japanese. It was necessary for Britain to establish training programs to supply the translators who would be needed for codebreaking, interrogating prisoners of war, translating captured documents, and interpreting unenciphered voice. Eavesdropping on the Emperor is the story of how Britain trained Japanese translators for the war and the tasks that those translators undertook. It is an interesting story but one that has been explored too late. The author Peter Kornicki, who is an Emeritus Professor of Japanese at the University of Cambridge and a Fellow of the British Academy, notes that:","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"46 1","pages":"552 - 555"},"PeriodicalIF":0.6,"publicationDate":"2022-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49426121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of Codebreaker Girls: A Secret Life at Bletchley Park by Jan Slimming 简·斯利明的《破解密码的女孩:布莱切利公园的秘密生活》评论
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-02-11 DOI: 10.1080/01611194.2022.2026838
Chris Christensen
{"title":"Review of Codebreaker Girls: A Secret Life at Bletchley Park by Jan Slimming","authors":"Chris Christensen","doi":"10.1080/01611194.2022.2026838","DOIUrl":"https://doi.org/10.1080/01611194.2022.2026838","url":null,"abstract":"","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"93 - 96"},"PeriodicalIF":0.6,"publicationDate":"2022-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45672002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Codebreakers war: David Kahn, Macmillan, the government, and the making of a cryptologic history masterpiece 密码破译者之战:大卫·卡恩、麦克米伦、政府和密码历史杰作的制作
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-02-03 DOI: 10.1080/01611194.2021.1998808
David Sherman
Abstract David Kahn’s The Codebreakers, published in 1967, is the first modern comprehensive history of cryptology. Based on extensive research, including interviews with former government cryptologists in the United States and Europe, Kahn’s volume blazed a trail that numerous historians would follow. It also attracted the attention of intelligence officials in Washington and London, who sought to excise or edit passages in the book. In one of these, Kahn made but agreed to remove a claim that during World War II the Allies had broken the supposedly invulnerable Enigma, a feat that would remain secret until the following decade.
摘要大卫·卡恩于1967年出版的《密码破译者》是第一部现代密码学综合史。基于广泛的研究,包括对美国和欧洲前政府密码学家的采访,卡恩的著作开辟了一条众多历史学家都会追随的道路。这也引起了华盛顿和伦敦情报官员的注意,他们试图删除或编辑书中的段落。在其中一个案例中,卡恩提出但同意删除一个说法,即在第二次世界大战期间,盟军破解了所谓的无懈可击的谜,这一壮举将一直保密到接下来的十年。
{"title":"The Codebreakers war: David Kahn, Macmillan, the government, and the making of a cryptologic history masterpiece","authors":"David Sherman","doi":"10.1080/01611194.2021.1998808","DOIUrl":"https://doi.org/10.1080/01611194.2021.1998808","url":null,"abstract":"Abstract David Kahn’s The Codebreakers, published in 1967, is the first modern comprehensive history of cryptology. Based on extensive research, including interviews with former government cryptologists in the United States and Europe, Kahn’s volume blazed a trail that numerous historians would follow. It also attracted the attention of intelligence officials in Washington and London, who sought to excise or edit passages in the book. In one of these, Kahn made but agreed to remove a claim that during World War II the Allies had broken the supposedly invulnerable Enigma, a feat that would remain secret until the following decade.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"205 - 226"},"PeriodicalIF":0.6,"publicationDate":"2022-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49551025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of The Rohonc Code: Tracing a Historical Riddle by Benedek Láng 回顾《罗洪克密码:探寻一个历史之谜》,作者:贝内德克Láng
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-01-26 DOI: 10.1080/01611194.2022.2026841
Chris Christensen
The story of the Rohonc Code begins a little more than 180 years ago. Discovered in the collection of the Hungarian Academy of Sciences was a mysterious codex. It is 448 pages long, handwritten with 9 to 14 lines of writing per page, and heavily illustrated with nearly 90 handdrawn images (Figure 1). Some pages at the beginning and at the end of the codex were detached, and their order was not known. The codex became part of the collection when the library of theHungarian noblemanGuszt av Batthy any was absorbed into the collection. The discovery of the manuscript created excitement in the academic world, and exploration of the writing and its meaning began. The codex was first examined in the early 1840s by J anos Jerney.
Rohonc密码的故事始于180多年前。在匈牙利科学院的收藏品中发现了一个神秘的密码。它长达448页,手写,每页有9到14行文字,并用近90幅手绘图像进行了大量插图(图1)。法典开头和结尾的一些页面是分离的,它们的顺序未知。当匈牙利贵族Guszt av Batthy-any的图书馆被纳入收藏时,该法典就成为了收藏的一部分。手稿的发现在学术界引起了轰动,对写作及其意义的探索也开始了。该法典于19世纪40年代初由J anos Jerney首次审查。
{"title":"Review of The Rohonc Code: Tracing a Historical Riddle by Benedek Láng","authors":"Chris Christensen","doi":"10.1080/01611194.2022.2026841","DOIUrl":"https://doi.org/10.1080/01611194.2022.2026841","url":null,"abstract":"The story of the Rohonc Code begins a little more than 180 years ago. Discovered in the collection of the Hungarian Academy of Sciences was a mysterious codex. It is 448 pages long, handwritten with 9 to 14 lines of writing per page, and heavily illustrated with nearly 90 handdrawn images (Figure 1). Some pages at the beginning and at the end of the codex were detached, and their order was not known. The codex became part of the collection when the library of theHungarian noblemanGuszt av Batthy any was absorbed into the collection. The discovery of the manuscript created excitement in the academic world, and exploration of the writing and its meaning began. The codex was first examined in the early 1840s by J anos Jerney.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"282 - 284"},"PeriodicalIF":0.6,"publicationDate":"2022-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49233610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Cryptologia
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1