首页 > 最新文献

Cryptologia最新文献

英文 中文
Review of The Bombe: The Machine that Defeated Enigma by Dermot Turing 德莫特·图灵的《炸弹机:打败谜机的机器
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-01-26 DOI: 10.1080/01611194.2022.2026840
Chris Christensen
{"title":"Review of The Bombe: The Machine that Defeated Enigma by Dermot Turing","authors":"Chris Christensen","doi":"10.1080/01611194.2022.2026840","DOIUrl":"https://doi.org/10.1080/01611194.2022.2026840","url":null,"abstract":"","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"46 1","pages":"385 - 386"},"PeriodicalIF":0.6,"publicationDate":"2022-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48166538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modern cryptanalysis of the Truppenschlüssel Truppenschlüssel的现代密码分析
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-01-20 DOI: 10.1080/01611194.2021.1998810
O. Ostwald, Frode Weierud
Abstract Truppenschlüssel (troop cipher) was a manual cipher used by the German Army during World War II. Based on more than a hundred authentic messages that survived the war, a cryptanalysis is performed. The exact encryption procedure is investigated via two plaintext-ciphertext compromises. A specific ciphertext-only breaking tool is developed, utilizing the hill climbing technique. This leads to successful breaks of most of the messages.
摘要Truppenschlüssel(部队密码)是第二次世界大战期间德国军队使用的一种手动密码。基于一百多条在战争中幸存下来的真实信息,进行了密码分析。通过两个明文-密文折衷来研究精确的加密过程。利用爬山技术开发了一种专门的纯密文破解工具。这导致了大多数信息的成功中断。
{"title":"Modern cryptanalysis of the Truppenschlüssel","authors":"O. Ostwald, Frode Weierud","doi":"10.1080/01611194.2021.1998810","DOIUrl":"https://doi.org/10.1080/01611194.2021.1998810","url":null,"abstract":"Abstract Truppenschlüssel (troop cipher) was a manual cipher used by the German Army during World War II. Based on more than a hundred authentic messages that survived the war, a cryptanalysis is performed. The exact encryption procedure is investigated via two plaintext-ciphertext compromises. A specific ciphertext-only breaking tool is developed, utilizing the hill climbing technique. This leads to successful breaks of most of the messages.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"261 - 281"},"PeriodicalIF":0.6,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44093533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Elizebeth Smith Friedman and one example of a prohibition era encryption system 伊丽莎白·史密斯·弗里德曼和一个禁令时代加密系统的例子
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-01-12 DOI: 10.1080/01611194.2021.2003913
Stuart Boersma
Abstract A short ciphertext message encrypted using a Prohibition era encryption system is examined. First published in David Kahn’s The Codebreakers, this example appears in two early reports written by Elizebeth Smith Friedman. Some obvious and some not so obvious errors are identified and corrected when possible. Friedman’s cryptanalysis of the ciphertext is given.
摘要研究了一种使用禁酒令时代加密系统加密的短密文报文。这个例子最初发表在大卫·卡恩的《密码破译者》中,后来出现在伊丽莎白·史密斯·弗里德曼写的两篇早期报告中。一些明显的错误和一些不那么明显的错误被识别出来,并在可能的情况下加以纠正。给出了弗里德曼对密文的密码分析。
{"title":"Elizebeth Smith Friedman and one example of a prohibition era encryption system","authors":"Stuart Boersma","doi":"10.1080/01611194.2021.2003913","DOIUrl":"https://doi.org/10.1080/01611194.2021.2003913","url":null,"abstract":"Abstract A short ciphertext message encrypted using a Prohibition era encryption system is examined. First published in David Kahn’s The Codebreakers, this example appears in two early reports written by Elizebeth Smith Friedman. Some obvious and some not so obvious errors are identified and corrected when possible. Friedman’s cryptanalysis of the ciphertext is given.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"227 - 238"},"PeriodicalIF":0.6,"publicationDate":"2022-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45039648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A review of the tropical approach in cryptography 密码学中的热带方法综述
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-01-11 DOI: 10.1080/01611194.2021.1994486
K. Ahmed, S. Pal, R. Mohan
Abstract In this article, we survey and analyze the role of tropical semirings in key-exchange protocols proposed in the past decade. We also present new ideas on cryptanalysis of some tropical key agreement techniques suggested during this period.
摘要在这篇文章中,我们调查和分析了热带半环在过去十年提出的密钥交换协议中的作用。我们还对这一时期提出的一些热带密钥协商技术的密码分析提出了新的想法。
{"title":"A review of the tropical approach in cryptography","authors":"K. Ahmed, S. Pal, R. Mohan","doi":"10.1080/01611194.2021.1994486","DOIUrl":"https://doi.org/10.1080/01611194.2021.1994486","url":null,"abstract":"Abstract In this article, we survey and analyze the role of tropical semirings in key-exchange protocols proposed in the past decade. We also present new ideas on cryptanalysis of some tropical key agreement techniques suggested during this period.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"63 - 87"},"PeriodicalIF":0.6,"publicationDate":"2022-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44725681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Analysis of a late 19th century french cipher created by Major Josse 对19世纪晚期约斯少校创造的法国密码的分析
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-01-10 DOI: 10.1080/01611194.2021.1996484
G. Lasry
Abstract Rémi Géraud-Stewart and David Naccache have recently discovered historical documents from the late 19th century, written by Major H.D. Josse of the French Army, that describe a proposal for a new cipher. In our paper, we provide an in-depth analysis of the cipher and a revised formal description of the cipher based on the examples given by Josse. We also present classes of cryptologically equivalent keys, and a possible attack based on ciphertext isomorphs, that can be implemented with only pen-and-paper. We also describe a new ciphertext-only stochastic attack, based on simulated annealing, that can recover the key and the plaintext from ciphertexts with only 75 letters. We are planning to implement the cipher in CrypTool 2, an e-learning platform for cryptography.
最近,rsami g - stewart和David Naccache发现了19世纪末的历史文件,这些文件是由法国陆军少校H.D. Josse撰写的,描述了一种新密码的建议。在本文中,我们对该密码进行了深入的分析,并根据Josse给出的例子修改了该密码的形式描述。我们还提出了密码学上等价的密钥类,以及基于密文同构的一种可能的攻击,这种攻击只需要纸笔就可以实现。我们还描述了一种新的基于模拟退火的纯密文随机攻击,该攻击可以从只有75个字母的密文中恢复密钥和明文。我们计划在CrypTool 2(一个密码学的电子学习平台)中实现该密码。
{"title":"Analysis of a late 19th century french cipher created by Major Josse","authors":"G. Lasry","doi":"10.1080/01611194.2021.1996484","DOIUrl":"https://doi.org/10.1080/01611194.2021.1996484","url":null,"abstract":"Abstract Rémi Géraud-Stewart and David Naccache have recently discovered historical documents from the late 19th century, written by Major H.D. Josse of the French Army, that describe a proposal for a new cipher. In our paper, we provide an in-depth analysis of the cipher and a revised formal description of the cipher based on the examples given by Josse. We also present classes of cryptologically equivalent keys, and a possible attack based on ciphertext isomorphs, that can be implemented with only pen-and-paper. We also describe a new ciphertext-only stochastic attack, based on simulated annealing, that can recover the key and the plaintext from ciphertexts with only 75 letters. We are planning to implement the cipher in CrypTool 2, an e-learning platform for cryptography.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"48 - 62"},"PeriodicalIF":0.6,"publicationDate":"2022-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44048490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The first Czechoslovak cipher machine 捷克斯洛伐克第一台密码机
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-12-28 DOI: 10.1080/01611194.2021.1998809
Eugen Antal, Pavol Zajac
Abstract The Štolba cipher machine was the first Czechoslovak cipher machine used in the army after the mid-1930s, and later in Slovakia during WW2. It had a unique design based on pneumatic transmission and complex stepping rules. We present basic facts about the Štolba machine from documents found in Czech and Slovak archives. Although the machine description was incomplete (and in some cases not accurate), we have been able to reconstruct (a highly probable) encryption algorithm, and develop a method to reconstruct (message) key from a known PC pair. Part of the machine configuration, however, still remains unknown due to the large space of possible settings and the complexity of the algorithm.
Štolba密码机是20世纪30年代中期后捷克斯洛伐克军队使用的第一台密码机,后来在二战期间在斯洛伐克使用。它具有基于气动传动和复杂步进规则的独特设计。我们从捷克和斯洛伐克档案中发现的文件中介绍了关于Štolba机器的基本事实。尽管机器描述不完整(在某些情况下不准确),但我们已经能够重建(一种极有可能的)加密算法,并开发出一种从已知的PC对重建(消息)密钥的方法。然而,由于可能的设置空间大和算法的复杂性,部分机器配置仍然未知。
{"title":"The first Czechoslovak cipher machine","authors":"Eugen Antal, Pavol Zajac","doi":"10.1080/01611194.2021.1998809","DOIUrl":"https://doi.org/10.1080/01611194.2021.1998809","url":null,"abstract":"Abstract The Štolba cipher machine was the first Czechoslovak cipher machine used in the army after the mid-1930s, and later in Slovakia during WW2. It had a unique design based on pneumatic transmission and complex stepping rules. We present basic facts about the Štolba machine from documents found in Czech and Slovak archives. Although the machine description was incomplete (and in some cases not accurate), we have been able to reconstruct (a highly probable) encryption algorithm, and develop a method to reconstruct (message) key from a known PC pair. Part of the machine configuration, however, still remains unknown due to the large space of possible settings and the complexity of the algorithm.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"239 - 260"},"PeriodicalIF":0.6,"publicationDate":"2021-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42944556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Review of Crypto Wars—The Fight for Privacy in the Digital Age: A Political History of Digital Encryption 数字时代的隐私之战:数字加密的政治史
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-12-16 DOI: 10.1080/01611194.2021.2002977
P. Anderson
{"title":"Review of Crypto Wars—The Fight for Privacy in the Digital Age: A Political History of Digital Encryption","authors":"P. Anderson","doi":"10.1080/01611194.2021.2002977","DOIUrl":"https://doi.org/10.1080/01611194.2021.2002977","url":null,"abstract":"","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"285 - 298"},"PeriodicalIF":0.6,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44951320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cracking SIGABA in less than 24 hours on a consumer PC 在不到24小时内破解SIGABA 在消费电脑上的小时数
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-12-16 DOI: 10.1080/01611194.2021.1989522
G. Lasry
Abstract The SIGABA was an electromechanical encryption device used by the US during WWII and in the 1950s. Also known as ECM Mark II, Converter M-134-C, CSP-889, and CSP-2900, the SIGABA was considered highly secure and was employed for strategic communications, such as between Churchill and Roosevelt. The SIGABA encrypts and decrypts with a set of five rotors and implements irregular stepping with two additional sets of five rotors. Its full keyspace, as used during WWII on some circuits, was in the order of It is believed that the German codebreaking services were unable to make any inroads into the cryptanalysis of SIGABA. The most efficient modern attack on SIGABA published so far is a known-plaintext attack that requires at least steps and extensive computing power. In this paper, the author presents a novel divide-and-conquer known-plaintext attack that can recover the key in less than 24 hours on a high-end consumer PC, taking advantage of multiple weaknesses in the design of SIGABA. With this attack, the author solved several series of full-keyspace challenges.
摘要SIGABA是美国在二战期间和20世纪50年代使用的一种机电加密设备。SIGABA也被称为ECM Mark II、Converter M-134-C、CSP-889和CSP-2900,被认为是高度安全的,用于战略通信,如丘吉尔和罗斯福之间的通信。SIGABA使用一组五个转子进行加密和解密,并使用两组额外的五个转子实现不规则步进。第二次世界大战期间在一些电路上使用的完整密钥空间是按顺序的。据信,德国密码破译服务无法对SIGABA的密码分析进行任何突破。迄今为止,对SIGABA最有效的现代攻击是一种已知的明文攻击,它至少需要步骤和强大的计算能力。在本文中,作者提出了一种新颖的分治已知明文攻击,可以在24小时内恢复密钥 利用SIGABA设计中的多个弱点,在高端消费PC上运行数小时。通过这次攻击,作者解决了一系列完整的密钥空间挑战。
{"title":"Cracking SIGABA in less than 24 hours on a consumer PC","authors":"G. Lasry","doi":"10.1080/01611194.2021.1989522","DOIUrl":"https://doi.org/10.1080/01611194.2021.1989522","url":null,"abstract":"Abstract The SIGABA was an electromechanical encryption device used by the US during WWII and in the 1950s. Also known as ECM Mark II, Converter M-134-C, CSP-889, and CSP-2900, the SIGABA was considered highly secure and was employed for strategic communications, such as between Churchill and Roosevelt. The SIGABA encrypts and decrypts with a set of five rotors and implements irregular stepping with two additional sets of five rotors. Its full keyspace, as used during WWII on some circuits, was in the order of It is believed that the German codebreaking services were unable to make any inroads into the cryptanalysis of SIGABA. The most efficient modern attack on SIGABA published so far is a known-plaintext attack that requires at least steps and extensive computing power. In this paper, the author presents a novel divide-and-conquer known-plaintext attack that can recover the key in less than 24 hours on a high-end consumer PC, taking advantage of multiple weaknesses in the design of SIGABA. With this attack, the author solved several series of full-keyspace challenges.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"1 - 37"},"PeriodicalIF":0.6,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46956824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Solving the Olum 2 cipher: a new approach to cryptanalysis of transposition ciphers 解Olum 2密码:一种新的转置密码的密码分析方法
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-12-16 DOI: 10.1080/01611194.2021.1992686
Paul W. Relkin
Abstract Olum 2 is one of two ciphers created more than 75 years ago by mathematician Paul Olum to challenge his Manhattan Project officemate, physicist Richard Feynman. In this manuscript, I describe the first successful decryption of Olum 2 using a novel approach to cryptanalysis of transposition ciphers. To decrypt Olum 2, I generated the bigrams and trigrams for all possible transposition intervals. I then identified transposition intervals with multiple bigrams and trigrams that occur frequently in English. I calculated the ratios of their English frequencies to the frequencies of bigrams and trigrams generated by a random reordering of the ciphertext. This enabled me to identify letter sequences with the highest probability of being true cipher message components rather than occurring by chance. In Olum 2, Professor Olum divided the message into sections of thirty-five letters and applied a rotating key to change the order of transposition for each successive section. His strategy not only confounded Professor Feynman but also proved impervious to several decryption programs in use today that assume a uniform transposition has been applied throughout the cipher. The decryption methods described in this manuscript can assist in the decryption of other ciphers employing a variety of transposition methods.
Olum 2是数学家Paul Olum在75年前为挑战他的曼哈顿计划同事、物理学家Richard Feynman而创造的两个密码之一。在这份手稿中,我描述了使用一种新的方法对置换密码进行密码分析的第一次成功解密Olum 2。为了解密Olum 2,我为所有可能的换位间隔生成了双字符和三字符。然后,我识别了在英语中经常出现的多个双字母和三字母的换位间隔。我计算了它们的英文频率与随机重新排列密文所产生的双字母和三字母的频率之比。这使我能够以最高的概率识别字母序列是真正的密码信息组件,而不是偶然发生的。在《奥鲁姆2》中,奥鲁姆教授将信息分成35个字母的部分,并使用旋转键来改变每个连续部分的换位顺序。他的策略不仅让费曼教授感到困惑,而且被证明无法破解目前使用的几种解密程序,这些程序假设整个密码都采用了统一的换位。本手稿中描述的解密方法可以协助采用各种换位方法的其他密码的解密。
{"title":"Solving the Olum 2 cipher: a new approach to cryptanalysis of transposition ciphers","authors":"Paul W. Relkin","doi":"10.1080/01611194.2021.1992686","DOIUrl":"https://doi.org/10.1080/01611194.2021.1992686","url":null,"abstract":"Abstract Olum 2 is one of two ciphers created more than 75 years ago by mathematician Paul Olum to challenge his Manhattan Project officemate, physicist Richard Feynman. In this manuscript, I describe the first successful decryption of Olum 2 using a novel approach to cryptanalysis of transposition ciphers. To decrypt Olum 2, I generated the bigrams and trigrams for all possible transposition intervals. I then identified transposition intervals with multiple bigrams and trigrams that occur frequently in English. I calculated the ratios of their English frequencies to the frequencies of bigrams and trigrams generated by a random reordering of the ciphertext. This enabled me to identify letter sequences with the highest probability of being true cipher message components rather than occurring by chance. In Olum 2, Professor Olum divided the message into sections of thirty-five letters and applied a rotating key to change the order of transposition for each successive section. His strategy not only confounded Professor Feynman but also proved impervious to several decryption programs in use today that assume a uniform transposition has been applied throughout the cipher. The decryption methods described in this manuscript can assist in the decryption of other ciphers employing a variety of transposition methods.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"38 - 47"},"PeriodicalIF":0.6,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46051318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On latin squares, invariant differentials, random permutations and historical Enigma rotors 关于拉丁平方,不变微分,随机排列和历史恩尼格玛转子
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-12-07 DOI: 10.1080/01611194.2021.1920070
N. Courtois, M. Grajek
Abstract In this article we study the quality of permutations in historical cipher machines from Germany, Spain, Italy, Norway, Switzerland, Japan, Hungary, Croatia, Poland, Czechoslovakia, Russia and the United States. We show that numerous real-life rotors have been made in order to imitate or tend to a certain ideal property related to latin squares. Rotors from the same source and the same period have consistent properties deeply rooted in classical cryptography of polyalphabetical ciphers. We demonstrate this based on probabilities: random occurrence of permutations having such features is unlikely, or would amount to winning in a lottery several times in row. We put all this in the context of known historical sources on how cipher machines and cryptanalysis have developed on both German and Allied sides. We also exhibit strong linear and differential properties. The same occurs in Fialka cipher machines. Finally, a stronger property holds for the historical block cipher T-310.
摘要本文研究了德国、西班牙、意大利、挪威、瑞士、日本、匈牙利、克罗地亚、波兰、捷克斯洛伐克、俄罗斯和美国的历史密码机的排列质量。我们表明,为了模仿或倾向于与拉丁平方相关的某种理想性质,已经制造了许多现实生活中的转子。同一来源、同一时期的转子具有根植于多字母密码经典密码学的一致性。我们基于概率证明了这一点:具有这些特征的排列不太可能随机出现,或者相当于连续几次中彩票。我们把所有这些放在已知的历史资料的背景下,关于密码机和密码分析是如何在德国和盟军方面发展起来的。我们也表现出很强的线性和微分性质。Fialka密码机也是如此。最后,历史分组密码T-310有一个更强的特性。
{"title":"On latin squares, invariant differentials, random permutations and historical Enigma rotors","authors":"N. Courtois, M. Grajek","doi":"10.1080/01611194.2021.1920070","DOIUrl":"https://doi.org/10.1080/01611194.2021.1920070","url":null,"abstract":"Abstract In this article we study the quality of permutations in historical cipher machines from Germany, Spain, Italy, Norway, Switzerland, Japan, Hungary, Croatia, Poland, Czechoslovakia, Russia and the United States. We show that numerous real-life rotors have been made in order to imitate or tend to a certain ideal property related to latin squares. Rotors from the same source and the same period have consistent properties deeply rooted in classical cryptography of polyalphabetical ciphers. We demonstrate this based on probabilities: random occurrence of permutations having such features is unlikely, or would amount to winning in a lottery several times in row. We put all this in the context of known historical sources on how cipher machines and cryptanalysis have developed on both German and Allied sides. We also exhibit strong linear and differential properties. The same occurs in Fialka cipher machines. Finally, a stronger property holds for the historical block cipher T-310.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"46 1","pages":"387 - 421"},"PeriodicalIF":0.6,"publicationDate":"2021-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46302331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Cryptologia
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1