Cryptologia最新文献

筛选
英文 中文
Classifying World War II era ciphers with machine learning 利用机器学习对二战时期的密码进行分类
IF 0.6 4区 工程技术
Cryptologia Pub Date : 2024-03-14 DOI: 10.1080/01611194.2024.2304888
Brooke Dalton, Mark Stamp
{"title":"Classifying World War II era ciphers with machine learning","authors":"Brooke Dalton, Mark Stamp","doi":"10.1080/01611194.2024.2304888","DOIUrl":"https://doi.org/10.1080/01611194.2024.2304888","url":null,"abstract":"We determine the accuracy with which machine learning and deep learning techniques can classify selected World War II era ciphers when only ciphertext is available. The specific ciphers considered ...","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"69 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2024-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140151411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of The Real Special Relationship by Michael Smith 迈克尔-史密斯《真正的特殊关系》评论
IF 0.6 4区 工程技术
Cryptologia Pub Date : 2024-02-23 DOI: 10.1080/01611194.2024.2316705
Chris Christensen
{"title":"Review of The Real Special Relationship by Michael Smith","authors":"Chris Christensen","doi":"10.1080/01611194.2024.2316705","DOIUrl":"https://doi.org/10.1080/01611194.2024.2316705","url":null,"abstract":"Published in Cryptologia (Ahead of Print, 2024)","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"88 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2024-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139947596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Japanese Green Machine 日本绿色机器
IF 0.6 4区 工程技术
Cryptologia Pub Date : 2024-02-05 DOI: 10.1080/01611194.2023.2263001
Chris Christensen
{"title":"The Japanese Green Machine","authors":"Chris Christensen","doi":"10.1080/01611194.2023.2263001","DOIUrl":"https://doi.org/10.1080/01611194.2023.2263001","url":null,"abstract":"In May 1945 an Imperial Japanese Army Green cipher machine was captured at Baguio in the Philippines. The machine was unlike any previous Japanese cipher machine that was known to U.S. codebreakers...","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"18 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2024-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139752472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
T.R. Hollcroft’s Problem T.R. 霍尔克罗夫特的问题
IF 0.6 4区 工程技术
Cryptologia Pub Date : 2024-01-29 DOI: 10.1080/01611194.2023.2277276
Chris Christensen, Sandy Zabell, Conner Ernst, Hanna Schmitt, Matthew Henn
{"title":"T.R. Hollcroft’s Problem","authors":"Chris Christensen, Sandy Zabell, Conner Ernst, Hanna Schmitt, Matthew Henn","doi":"10.1080/01611194.2023.2277276","DOIUrl":"https://doi.org/10.1080/01611194.2023.2277276","url":null,"abstract":"JN-25 was the primary World War II Japanese naval cipher. It was introduced in 1939 and evolved throughout the war, presenting US Navy codebreakers with a succession of challenges. When JN-25N-62 w...","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"30 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2024-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139662844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An improved cryptanalysis of multi-prime RSA with specific forms of decryption exponent 利用特定形式的解密指数改进多质数 RSA 的密码分析
IF 0.6 4区 工程技术
Cryptologia Pub Date : 2024-01-05 DOI: 10.1080/01611194.2023.2271463
Santosh Kumar R, Prakash Klnc, Krishna Srm
{"title":"An improved cryptanalysis of multi-prime RSA with specific forms of decryption exponent","authors":"Santosh Kumar R, Prakash Klnc, Krishna Srm","doi":"10.1080/01611194.2023.2271463","DOIUrl":"https://doi.org/10.1080/01611194.2023.2271463","url":null,"abstract":"Multi-prime RSA (MPRSA) is an extended version of RSA in which the modulus is the product of three or more distinct prime numbers. As with the RSA, this variant is also scrutinized for vulnerabilit...","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"209 1 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2024-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139105437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decentralized universally verifiable stake voting system with perfect privacy 具有完美隐私的去中心化、普遍可验证的股权投票系统
IF 0.6 4区 工程技术
Cryptologia Pub Date : 2023-12-18 DOI: 10.1080/01611194.2023.2279147
Pavithra Gurushankar, Kunwar Singh
{"title":"Decentralized universally verifiable stake voting system with perfect privacy","authors":"Pavithra Gurushankar, Kunwar Singh","doi":"10.1080/01611194.2023.2279147","DOIUrl":"https://doi.org/10.1080/01611194.2023.2279147","url":null,"abstract":"Stake voting is a voting system where the vote cast by a voter is proportional to their account balance/asset. We propose the first implementation of an efficient, fully-decentralized, universally-...","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"29 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138742197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modifying twist algorithms for determining the key length of a Vigenère cipher 修改确定维基涅尔密码密钥长度的扭转算法
IF 0.6 4区 工程技术
Cryptologia Pub Date : 2023-12-12 DOI: 10.1080/01611194.2023.2275583
Christian Millichap, Yeeka Yau, Alyssa Pate, Morgan Carns
{"title":"Modifying twist algorithms for determining the key length of a Vigenère cipher","authors":"Christian Millichap, Yeeka Yau, Alyssa Pate, Morgan Carns","doi":"10.1080/01611194.2023.2275583","DOIUrl":"https://doi.org/10.1080/01611194.2023.2275583","url":null,"abstract":"In this article, we analyze and improve upon the twist-based algorithms introduced by Barr–Simoson and Park–Kim–Cho–Yum for determining the key length of a Vigenère cipher. We provide an in-depth d...","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"90 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138573830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dorabella unMASCed – the Dorabella Cipher is not an English or Latin Mono-Alphabetical Substitution Cipher Dorabella unMASCed - Dorabella密码不是英语或拉丁语单字母替代密码
IF 0.6 4区 工程技术
Cryptologia Pub Date : 2023-11-20 DOI: 10.1080/01611194.2023.2271466
Viktor Wase
{"title":"Dorabella unMASCed – the Dorabella Cipher is not an English or Latin Mono-Alphabetical Substitution Cipher","authors":"Viktor Wase","doi":"10.1080/01611194.2023.2271466","DOIUrl":"https://doi.org/10.1080/01611194.2023.2271466","url":null,"abstract":"The Dorabella cipher is an unsolved cipher with only 87 characters. In this study we show that state-of-the-art algorithms are able to solve Mono-Alphabetical Substitution Ciphers with 87 character...","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"120 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138540576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The undisclosed history of the Dutch governmental telex-message security 1945–1960 1945-1960年荷兰政府电报安全的未公开历史
4区 工程技术
Cryptologia Pub Date : 2023-11-02 DOI: 10.1080/01611194.2023.2258877
M. R. Oberman
{"title":"The undisclosed history of the Dutch governmental telex-message security 1945–1960","authors":"M. R. Oberman","doi":"10.1080/01611194.2023.2258877","DOIUrl":"https://doi.org/10.1080/01611194.2023.2258877","url":null,"abstract":"AbstractThe information behind the Dutch governmental telex message security 1945–1960 was stored in private hidden archives, our national General Intelligence and Security Service and the National Archive. Therefore, it became unknow information. The article describes the reasons behind the need for a national developed secure cryptosystem. But also, the obstacles and politics behind the developing and the producing of the OTP-systems at the national PTT for the Ministry of Foreign affairs and the Royal Dutch Navy. It also reveals the politics to transfer the subject cryptography to the national IT industry: Philips, which became the start of the commercial crypto industry in the Netherlands in 1957.Keywords: EcolexObermanDutch historyone time padClaude ShannonCold WarSignal CorpsWorld War II Disclosure statementNo potential conflict of interest was reported by the author(s).About the inventor as described in this documentMy father1928–1935 TU-Delft Mechanical and Electrical Engineering1936–1957 PTT1947–1980 TU-Delft1976 Prof. Oberman cycling at his department after his restart as extraordinary professor.Notes1 www.cryptomuseum.com.2 PTT was in that time a state-owned entity, the national monopolist on telecom in the Netherlands.3 A. Snijders cooperated closely with Oberman on cryptography from 1946 on at PTT and he ended up as a professor at TU-Delft.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"1 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135973685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of The Enigma Affair by Charlie LovettLovett, Charlie. The Enigma Affair . Ashland, OR: Blackstone Publishing. 2022. 323 pages, Hardcover, $26.99. ISBN 978-1-66504-707-4. https://www.blackstonepublishing.com 《谜机事件》书评查理·洛维特,查理·洛维特。谜机事件。俄勒冈州阿什兰:黑石出版社,2022。323页,精装版,26.99美元。ISBN 978-1-66504-707-4。https://www.blackstonepublishing.com
4区 工程技术
Cryptologia Pub Date : 2023-10-25 DOI: 10.1080/01611194.2023.2267563
John F. Dooley
{"title":"Review of <i>The Enigma Affair</i> by Charlie LovettLovett, Charlie. <i>The Enigma Affair</i> . Ashland, OR: Blackstone Publishing. 2022. 323 pages, Hardcover, $26.99. ISBN 978-1-66504-707-4. https://www.blackstonepublishing.com","authors":"John F. Dooley","doi":"10.1080/01611194.2023.2267563","DOIUrl":"https://doi.org/10.1080/01611194.2023.2267563","url":null,"abstract":"","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135169236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信