Cryptologia最新文献

筛选
英文 中文
Can musical encryption be both? A survey of music-based ciphers 音乐加密能兼而有之吗?基于音乐的密码研究综述
IF 0.6 4区 工程技术
Cryptologia Pub Date : 2022-05-16 DOI: 10.1080/01611194.2021.2021565
D. Code
{"title":"Can musical encryption be both? A survey of music-based ciphers","authors":"D. Code","doi":"10.1080/01611194.2021.2021565","DOIUrl":"https://doi.org/10.1080/01611194.2021.2021565","url":null,"abstract":"Abstract The purpose of this article is to analyze the characteristics of a range of music-based ciphers (from the fifteenth to twentieth centuries) with respect to their intended goals and actual outcomes. Historically, the practitioners of music-based ciphers generally fall into one of two distinct groups: composers and cryptographers. The primary goal of the composers was to create music that embedded extra-musical content by means of musico-alphabetic correspondences. The cryptographers were generally interested in presenting many varieties of cryptographic methods of which ciphers incorporating musical notes were a very small part. The systems used by the former were usually so superficial they should not really be considered encryption; whereas the systems used by the latter were so mechanical that most would not consider the results to be music. Musical encryption can rarely be both because the attributes needed for convincing musicality and strong encryption are not mutually conducive. However, after examining these music-based cryptosystems in detail, I will consider what criteria might be necessary to create a reasonably secure cipher which produces a normatively-musical output and apply these in the form of an original music-based cipher. For most of the ciphers, interactive web applications have been developed which render plaintext into enciphered melodies.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"318 - 364"},"PeriodicalIF":0.6,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47327645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Correction 修正
IF 0.6 4区 工程技术
Cryptologia Pub Date : 2022-04-29 DOI: 10.1080/01611194.2022.2061772
{"title":"Correction","authors":"","doi":"10.1080/01611194.2022.2061772","DOIUrl":"https://doi.org/10.1080/01611194.2022.2061772","url":null,"abstract":"","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"46 1","pages":"290 - 290"},"PeriodicalIF":0.6,"publicationDate":"2022-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44062574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptographic symmetric structures based on quasigroups 基于拟群的密码对称结构
IF 0.6 4区 工程技术
Cryptologia Pub Date : 2022-04-05 DOI: 10.1080/01611194.2021.2022035
G. Teşeleanu
{"title":"Cryptographic symmetric structures based on quasigroups","authors":"G. Teşeleanu","doi":"10.1080/01611194.2021.2022035","DOIUrl":"https://doi.org/10.1080/01611194.2021.2022035","url":null,"abstract":"Abstract In our paper we study the effect of changing the commutative group operation used in Feistel and Lai-Massey symmetric structures into a quasigroup operation. We prove that if the quasigroup operation is isotopic with a group the complexity of mounting a differential attack against our generalization of the Feistel structure is the same as attacking the unkeyed version of the general Feistel iteration based on Also, when is non-commutative, we show that both versions of the Feistel structure are equivalent from a differential point of view. For the Lai-Massey structure, we introduce four non-commutative versions, we argue for the necessity of working over a group and we provide some necessary conditions for the differential equivalency of the four notions.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"365 - 392"},"PeriodicalIF":0.6,"publicationDate":"2022-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41568510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Review of The Rose Code by Kate Quinn 回顾凯特·奎因的《玫瑰密码》
IF 0.6 4区 工程技术
Cryptologia Pub Date : 2022-03-30 DOI: 10.1080/01611194.2022.2043488
J. Dooley
{"title":"Review of The Rose Code by Kate Quinn","authors":"J. Dooley","doi":"10.1080/01611194.2022.2043488","DOIUrl":"https://doi.org/10.1080/01611194.2022.2043488","url":null,"abstract":"","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"393 - 395"},"PeriodicalIF":0.6,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45694546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Complete examples of encryption systems broken by Elizebeth Smith Friedman: 1923–1934 伊丽莎白·史密斯·弗里德曼破解加密系统的完整例子:1923-1934
IF 0.6 4区 工程技术
Cryptologia Pub Date : 2022-02-25 DOI: 10.1080/01611194.2021.2023235
Stuart Boersma
{"title":"Complete examples of encryption systems broken by Elizebeth Smith Friedman: 1923–1934","authors":"Stuart Boersma","doi":"10.1080/01611194.2021.2023235","DOIUrl":"https://doi.org/10.1080/01611194.2021.2023235","url":null,"abstract":"Abstract Elizebeth Smith Friedman has been credited with breaking hundreds of encryption systems during Prohibition, yet few complete examples exist. Using material available in the Elizebeth Smith Friedman archives at the Marshall Library, examples of a variety of encryption systems are presented. Complete examples include original ciphertext, plaintext, and a description of the encryption process. Friedman’s cryptanalysis of some of these messages is described.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"397 - 418"},"PeriodicalIF":0.6,"publicationDate":"2022-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44181648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Review of codebreaker by Marc McMenamin Marc McMenamin的代码破解评论
IF 0.6 4区 工程技术
Cryptologia Pub Date : 2022-02-21 DOI: 10.1080/01611194.2022.2037929
J. Dooley
{"title":"Review of codebreaker by Marc McMenamin","authors":"J. Dooley","doi":"10.1080/01611194.2022.2037929","DOIUrl":"https://doi.org/10.1080/01611194.2022.2037929","url":null,"abstract":"Historian and documentarian Marc McMenamin’s first book, Codebreaker, tells the story of Dr. Richard Hayes, the long-time Director of the National Library of Ireland, and his work assisting Irish military intelligence (G2) as a cryptanalyst and interrogator during World War II. The book is less a biography of Richard Hayes, than a treatment of the efforts of German military intelligence (the Abwehr) to influence the Irish Republican Army to ally with the Germans to expand the war against the British into Ireland. It covers quite well the Irish government’s response to the German espionage threat and the continuing threat of the radical members of the Irish Republican Army (IRA). Hayes was an integral part of G2’s response to the incursion of German spies into Ireland during the war. From the outset of World War II, Nazi Germany sought to open a second front against Great Britain through Ireland. The British were using Northern Ireland as a staging ground for both army and naval forces, and the Americans would do the same after they joined the conflict. The State of Ireland, headed by Prime Minister (Taoiseach) Eamon De Valera had declared its neutrality in the conflict early on. However, that did not mean that there was no conflict in Ireland itself. One opening the Nazis hoped to exploit was the continuing presence of a radical part of the Irish Republican Army that was conspiring against both the government of Ireland, and the British. The Nazis hoped to use the IRA as a destabilizing force within Ireland and as a terrorist organization to undermine and sabotage British rule in the north. To this end, the Abwehr plotted to insert German spies into Ireland to connect with the IRA, arrange to supply them with weapons and explosives, and use them as allies in a possible invasion of either Northern Ireland, the State of Ireland, or both. The German spies who were dropped into Ireland by parachute or put on shore via U-boat were generally incompetent. All but two of them were arrested within 48 hours of their illegal arrival in Ireland. Their associates in the IRA were slightly more capable, but still not up to the caliber of spies portrayed in either literature or in military history books. The most interesting thing about this book is the revelations about the lengths that members of the IRA were willing to go in order to get the British out of Ireland and to disrupt the Irish government. At least one faction of the IRA was nearly constantly trying to convince the Nazis to supply them with arms and ammunition and were","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"46 1","pages":"556 - 560"},"PeriodicalIF":0.6,"publicationDate":"2022-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46257710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of Eavesdropping on the Emperor: Interrogators and Codebreakers in Britain’s War with Japan by Peter Kornicki 《窃听天皇:英国对日战争中的审问者和密码破译者》述评
IF 0.6 4区 工程技术
Cryptologia Pub Date : 2022-02-11 DOI: 10.1080/01611194.2022.2026839
Chris Christensen
{"title":"Review of Eavesdropping on the Emperor: Interrogators and Codebreakers in Britain’s War with Japan by Peter Kornicki","authors":"Chris Christensen","doi":"10.1080/01611194.2022.2026839","DOIUrl":"https://doi.org/10.1080/01611194.2022.2026839","url":null,"abstract":"Preparing for war requires training. Codebreaking and intelligence require training a sufficient number of translators of enemy languages. On 7 December 1941 when Japan attacked British territories in the Southwest Pacific and the U.S. Navy base in Pearl Harbor, Britain did not have the necessary translators of Japanese. It was necessary for Britain to establish training programs to supply the translators who would be needed for codebreaking, interrogating prisoners of war, translating captured documents, and interpreting unenciphered voice. Eavesdropping on the Emperor is the story of how Britain trained Japanese translators for the war and the tasks that those translators undertook. It is an interesting story but one that has been explored too late. The author Peter Kornicki, who is an Emeritus Professor of Japanese at the University of Cambridge and a Fellow of the British Academy, notes that:","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"46 1","pages":"552 - 555"},"PeriodicalIF":0.6,"publicationDate":"2022-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49426121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of Codebreaker Girls: A Secret Life at Bletchley Park by Jan Slimming 简·斯利明的《破解密码的女孩:布莱切利公园的秘密生活》评论
IF 0.6 4区 工程技术
Cryptologia Pub Date : 2022-02-11 DOI: 10.1080/01611194.2022.2026838
Chris Christensen
{"title":"Review of Codebreaker Girls: A Secret Life at Bletchley Park by Jan Slimming","authors":"Chris Christensen","doi":"10.1080/01611194.2022.2026838","DOIUrl":"https://doi.org/10.1080/01611194.2022.2026838","url":null,"abstract":"","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"93 - 96"},"PeriodicalIF":0.6,"publicationDate":"2022-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45672002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Codebreakers war: David Kahn, Macmillan, the government, and the making of a cryptologic history masterpiece 密码破译者之战:大卫·卡恩、麦克米伦、政府和密码历史杰作的制作
IF 0.6 4区 工程技术
Cryptologia Pub Date : 2022-02-03 DOI: 10.1080/01611194.2021.1998808
David Sherman
{"title":"The Codebreakers war: David Kahn, Macmillan, the government, and the making of a cryptologic history masterpiece","authors":"David Sherman","doi":"10.1080/01611194.2021.1998808","DOIUrl":"https://doi.org/10.1080/01611194.2021.1998808","url":null,"abstract":"Abstract David Kahn’s The Codebreakers, published in 1967, is the first modern comprehensive history of cryptology. Based on extensive research, including interviews with former government cryptologists in the United States and Europe, Kahn’s volume blazed a trail that numerous historians would follow. It also attracted the attention of intelligence officials in Washington and London, who sought to excise or edit passages in the book. In one of these, Kahn made but agreed to remove a claim that during World War II the Allies had broken the supposedly invulnerable Enigma, a feat that would remain secret until the following decade.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"205 - 226"},"PeriodicalIF":0.6,"publicationDate":"2022-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49551025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of The Rohonc Code: Tracing a Historical Riddle by Benedek Láng 回顾《罗洪克密码:探寻一个历史之谜》,作者:贝内德克Láng
IF 0.6 4区 工程技术
Cryptologia Pub Date : 2022-01-26 DOI: 10.1080/01611194.2022.2026841
Chris Christensen
{"title":"Review of The Rohonc Code: Tracing a Historical Riddle by Benedek Láng","authors":"Chris Christensen","doi":"10.1080/01611194.2022.2026841","DOIUrl":"https://doi.org/10.1080/01611194.2022.2026841","url":null,"abstract":"The story of the Rohonc Code begins a little more than 180 years ago. Discovered in the collection of the Hungarian Academy of Sciences was a mysterious codex. It is 448 pages long, handwritten with 9 to 14 lines of writing per page, and heavily illustrated with nearly 90 handdrawn images (Figure 1). Some pages at the beginning and at the end of the codex were detached, and their order was not known. The codex became part of the collection when the library of theHungarian noblemanGuszt av Batthy any was absorbed into the collection. The discovery of the manuscript created excitement in the academic world, and exploration of the writing and its meaning began. The codex was first examined in the early 1840s by J anos Jerney.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"47 1","pages":"282 - 284"},"PeriodicalIF":0.6,"publicationDate":"2022-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49233610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信