-
Classifying World War II era ciphers with machine learning Cryptologia (IF 0.6) Pub Date : 2024-03-14 Brooke Dalton, Mark Stamp
We determine the accuracy with which machine learning and deep learning techniques can classify selected World War II era ciphers when only ciphertext is available. The specific ciphers considered ...
-
The Immortal David Kahn Cryptologia (IF 0.6) Pub Date : 2024-03-14
Published in Cryptologia (Ahead of Print, 2024)
-
Review of The Real Special Relationship by Michael Smith Cryptologia (IF 0.6) Pub Date : 2024-02-23 Chris Christensen
Published in Cryptologia (Ahead of Print, 2024)
-
The Japanese Green Machine Cryptologia (IF 0.6) Pub Date : 2024-02-05 Chris Christensen
In May 1945 an Imperial Japanese Army Green cipher machine was captured at Baguio in the Philippines. The machine was unlike any previous Japanese cipher machine that was known to U.S. codebreakers...
-
T.R. Hollcroft’s Problem Cryptologia (IF 0.6) Pub Date : 2024-01-29 Chris Christensen, Sandy Zabell, Conner Ernst, Hanna Schmitt, Matthew Henn
JN-25 was the primary World War II Japanese naval cipher. It was introduced in 1939 and evolved throughout the war, presenting US Navy codebreakers with a succession of challenges. When JN-25N-62 w...
-
An improved cryptanalysis of multi-prime RSA with specific forms of decryption exponent Cryptologia (IF 0.6) Pub Date : 2024-01-05 Santosh Kumar R, Prakash Klnc, Krishna Srm
Multi-prime RSA (MPRSA) is an extended version of RSA in which the modulus is the product of three or more distinct prime numbers. As with the RSA, this variant is also scrutinized for vulnerabilit...
-
Decentralized universally verifiable stake voting system with perfect privacy Cryptologia (IF 0.6) Pub Date : 2023-12-18 Pavithra Gurushankar, Kunwar Singh
Stake voting is a voting system where the vote cast by a voter is proportional to their account balance/asset. We propose the first implementation of an efficient, fully-decentralized, universally-...
-
Review of The Puzzle Master by Danielle Trussoni Cryptologia (IF 0.6) Pub Date : 2023-12-15 John F. Dooley
Published in Cryptologia (Vol. 48, No. 1, 2024)
-
Modifying twist algorithms for determining the key length of a Vigenère cipher Cryptologia (IF 0.6) Pub Date : 2023-12-12 Christian Millichap, Yeeka Yau, Alyssa Pate, Morgan Carns
In this article, we analyze and improve upon the twist-based algorithms introduced by Barr–Simoson and Park–Kim–Cho–Yum for determining the key length of a Vigenère cipher. We provide an in-depth d...
-
Dorabella unMASCed – the Dorabella Cipher is not an English or Latin Mono-Alphabetical Substitution Cipher Cryptologia (IF 0.6) Pub Date : 2023-11-20 Viktor Wase
The Dorabella cipher is an unsolved cipher with only 87 characters. In this study we show that state-of-the-art algorithms are able to solve Mono-Alphabetical Substitution Ciphers with 87 character...
-
The undisclosed history of the Dutch governmental telex-message security 1945–1960 Cryptologia (IF 0.6) Pub Date : 2023-11-02 M. R. Oberman
The information behind the Dutch governmental telex message security 1945–1960 was stored in private hidden archives, our national General Intelligence and Security Service and the National Archive...
-
Review of The Enigma Affair by Charlie Lovett Cryptologia (IF 0.6) Pub Date : 2023-10-25 John F. Dooley
Published in Cryptologia (Ahead of Print, 2023)
-
Why the French military cryptanalysis failed to break Enigma Cryptologia (IF 0.6) Pub Date : 2023-10-19 Jean-Charles Foucrier
In July 1939, when the French military discovered the possibility of breaking Enigma thanks to revelations from the Polish Cipher Service, it came as a complete surprise. Although the French secret...
-
Review of The First Enigma Codebreaker: The Untold Story of Marian Rejewski Who Passed the Baton to Alan Turing Cryptologia (IF 0.6) Pub Date : 2023-10-11 Chris Christensen
Published in Cryptologia (Ahead of Print, 2023)
-
Review of Queen of Codes: The Secret Life of Emily Anderson, Britain’s Greatest Female Codebreaker by Jackie Uí Chionna Cryptologia (IF 0.6) Pub Date : 2023-10-14 Chris Christensen
Published in Cryptologia (Ahead of Print, 2023)
-
Leo Marks’ “mental one-time pad”: an experimental cipher for British special operations in World War II Cryptologia (IF 0.6) Pub Date : 2023-10-11 Thomas Larsen
During World War II, Leo Marks designed ciphers for the British Special Operations Executive (SOE). Tasked with ensuring that SOE undercover agents could encrypt radio transmissions from Nazi-occup...
-
Review of the second edition of Craig Bauer’s “Secret History: The Story of Cryptology, Second Edition” Cryptologia (IF 0.6) Pub Date : 2023-09-28 Elonka Dunin, Klaus Schmeh
Published in Cryptologia (Ahead of Print, 2023)
-
Review of The Bletchley Park Codebreakers in their own words by Joel Greenberg Cryptologia (IF 0.6) Pub Date : 2023-08-24 Chris Christensen
Published in Cryptologia (Ahead of Print, 2023)
-
An ultra-lightweight block cipher with string transformations Cryptologia (IF 0.6) Pub Date : 2023-08-24 Dimpy Chauhan, Indivar Gupta, P. R. Mishra, Rashmi Verma
Abstract Security efficiency and hardware efficiency are equally important when designing a block cipher. In this paper, we propose a new block cipher that uses string transformations and requires less memory and fewer computational resources, making it suitable for highly constrained environments. We compare the performance of our design with AES-128 and quasigroup-based block cipher INRU in the cipher
-
Review of No More Secrets: My Part in Codebreaking at Bletchley Park and the Pentagon by Betty Webb Cryptologia (IF 0.6) Pub Date : 2023-08-21 Chris Christensen
Published in Cryptologia (Ahead of Print, 2023)
-
Breaking the Silk Dress cryptogram Cryptologia (IF 0.6) Pub Date : 2023-08-06 Wayne S. Chan
Abstract A solution to the “Silk Dress cryptogram” is presented. The cryptogram was found to be a telegraphic code used for transmitting weather observations by the U.S. Army Signal Service (Signal Corps) and later by the U.S. Weather Bureau. The decoded messages were weather observations for a number of American and Canadian stations in 1888.
-
The Voynich manuscript: discussion of text creation hypotheses Cryptologia (IF 0.6) Pub Date : 2023-07-19 Torsten Timm, Andreas Schinner
Abstract The International Conference on the Voynich Manuscript 2022 at the University of Malta has covered many aspects of the current Voynich manuscript research. We discuss a representative selection of the conference proceedings, in particular the question of existing versus non-existing linguistic structures that indicate some underlying meaningful text.
-
Review of From the Ground Up by Betsy Rohaly Smoot Cryptologia (IF 0.6) Pub Date : 2023-07-10 John F. Dooley
Published in Cryptologia (Vol. 48, No. 1, 2024)
-
Expanded low-rank parity-check codes and their application to cryptography Cryptologia (IF 0.6) Pub Date : 2023-07-02 Kamwa Djomou Franck Rivel, Fouotsa Emmanuel, Tadmon Calvin
Abstract In this paper, we define expanded LRPC codes from LRPC codes with a decoding algorithm using the one of the underlying LRPC codes. Next, we propose to use these codes for cryptography by deriving two cryptosystems in a McEliece setting. in order to reduce the key sizes, we use a generator matrix in systematic form for the first scheme, and an m−m− order quasi-cyclic LRPC code that we define
-
Review of 100 People You Never Knew Were at Bletchley Park by Sinclair McKay Cryptologia (IF 0.6) Pub Date : 2023-05-26 Chris Christensen
Published in Cryptologia (Ahead of Print, 2023)
-
Cryptologic History Symposium, May 8–10, 2024 Cryptologia (IF 0.6) Pub Date : 2023-05-24
Published in Cryptologia (Vol. 47, No. 4, 2023)
-
Cryptanalysis and improvement of Q. Peng et al.’s PVSS scheme Cryptologia (IF 0.6) Pub Date : 2023-04-18 Anindya Kumar Biswas, Mou Dasgupta, Sangram Ray
Abstract A publicly verifiable secret sharing (PVSS) scheme based on the m-multilinear Diffie-Hellman hard assumption was proposed by Q. Peng et al., where the public values published by a dealer are verifiable before reconstructing a secret. In addition, the scheme has the advantages that the shares’ cheating/modification by some dishonest participants and dealer’s malicious behavior in shares’ generation
-
Review of Rongorongo: Inscribed Objects from Rapa Nui Cryptologia (IF 0.6) Pub Date : 2023-04-03 Tomi S. Melka, Robert M. Schoch
Published in Cryptologia (Ahead of Print, 2023)
-
Unicity distance of the Zodiac-340 cipher Cryptologia (IF 0.6) Pub Date : 2023-04-03 Joachim von zur Gathen
Abstract In December 2020, David Oranchak, Jarl Van Eycke, and Sam Blake solved a 51-year old mystery: the Zodiac cipher of 340 symbols. The correctness of their solution has not been seriously doubted, and here we give a further argument in its favor: the unicity distance of the cipher’s system is at most 153.
-
The new golden age of decipherment Cryptologia (IF 0.6) Pub Date : 2023-03-07 Craig P. Bauer
Published in Cryptologia (Vol. 47, No. 2, 2023)
-
The origin of military cryptanalysis in Czechoslovakia Cryptologia (IF 0.6) Pub Date : 2023-02-21 Eugen Antal
Abstract Josef Růžek was one of the best cryptography and cryptanalysis specialists in Czechoslovakia. In addition to his various achievements in cryptanalysis, he was involved in building the encryption service and training new experts in cryptanalysis in Czechoslovakia. We present detailed information on the origin of cryptanalysis in Czechoslovakia based on documents from Czech and Slovak archives
-
Bit inclusion test: an enhanced avalanche test for stream ciphers Cryptologia (IF 0.6) Pub Date : 2023-02-10 P. R. Mishra, Arvind Kumar, S. K. Pal, Odelu Ojjela
In this paper, we present a new test for stream ciphers named the ‘Bit Inclusion Test (BIT)’. This test provides an enhancement to the conventional avalanche test for stream ciphers. This test is e...
-
Deciphering Mary Stuart’s lost letters from 1578-1584 Cryptologia (IF 0.6) Pub Date : 2023-02-08 George Lasry, Norbert Biermann, Satoshi Tomokiyo
Abstract Mary Stuart, Queen of Scots (1542–1587), has left an extensive corpus of letters held in various archive collections. There is evidence, however that other letters from Mary Stuart are missing from those collections, such as letters referenced in other sources but not found elsewhere. In Under the Molehill – an Elizabethan Spy Story, John Bossy writes that a secret correspondence with her
-
Statistical tests suites analysis methods. Cryptographic recommendations Cryptologia (IF 0.6) Pub Date : 2023-01-30 Elena Almaraz Luengo
Abstract In many applications, it is necessary to work with long sequences of random numbers, or at least those that behave as such (pseudo-random numbers). For this purpose, it is essential to verify the goodness of the sequences under study, e.g., to verify whether the sequences meet the properties of randomness, uniformity, and, in the case of cryptographic applications, unpredictability. To verify
-
Review of Behind the Enigma by John Ferris Cryptologia (IF 0.6) Pub Date : 2023-01-16 Philip Marks
Published in Cryptologia (Ahead of Print, 2023)
-
On security aspects of the ciphers T-310 and SKS with approved long-term keys Cryptologia (IF 0.6) Pub Date : 2023-01-12 Wolfgang Killmann
The cipher T-310 was developed by the Central Cipher Authority of the German Democratic Republic in the 1970s and widely used for protection of teletype communication up to security level secret. A...
-
Keys with nomenclatures in the early modern Europe Cryptologia (IF 0.6) Pub Date : 2022-11-03 Beáta Megyesi, Crina Tudor, Benedek Láng, Anna Lehofer, Nils Kopal, Karl de Leeuw, Michelle Waldispühl
We give an overview of the development of European historical cipher keys originating from early Modern times. We describe the nature and the structure of the keys with a special focus on the nomen...
-
Review of The Woman All Spies Fear by Amy Butler Greenfield and Code Breaker, Spy Hunter by Laurie Wallmark, Illustrated by Brooke Smart Cryptologia (IF 0.6) Pub Date : 2022-10-25 Stuart Boersma, Jean Marie Linhart
Published in Cryptologia (Vol. 47, No. 1, 2023)
-
Shadow IT in higher education: survey and case study for cybersecurity Cryptologia (IF 0.6) Pub Date : 2022-10-12 Selma Gomez Orr, Cyrus Jian Bonyadi, Enis Golaszewski, Alan T. Sherman, Peter A. H. Peterson, Richard Forno, Sydney Johns, Jimmy Rodriguez
We explore shadow information technology (IT) at institutions of higher education through a two-tiered approach involving a detailed case study and comprehensive survey of IT professionals. In its ...
-
Cryptanalysis of RSA with small difference of primes and two decryption exponents: Jochemsz and May approach Cryptologia (IF 0.6) Pub Date : 2022-10-10 R. Santosh Kumar, S. R. M. Krishna
RSA is a well-known cryptosystem in Modern Cryptography and its efficiency is based on the hardness of the Integer Factorization problem. The algorithm is shown to be vulnerable to several attacks ...
-
A study of public key cryptosystems based on quasigroups Cryptologia (IF 0.6) Pub Date : 2022-09-22 Satish Kumar, Indivar Gupta, Ashok Ji Gupta
A public-key cryptosystem is the undoubted spine of present-day communication systems. Many mathematical theories like number theory, group theory, and ring theory were utilized to design various c...
-
A statistical cryptanalysis of the Beale ciphers Cryptologia (IF 0.6) Pub Date : 2022-09-21 Leonardo Campanelli
Abstract The encryption method used to encode the second Beale cipher leads to a ε-Benford’s distribution for the first significant digit of the numbers in the coded message. The relative level of deviation from Benford’s law, ε, is about 0.15 for the second decoded cipher. The other two undeciphered codes show a statistically significant deviation from a 0.15-Benford’s law, suggesting that either
-
Elizebeth Smith Friedman’s recovery of the wiring of two rotors from an enigma D machine Cryptologia (IF 0.6) Pub Date : 2022-09-21 Stuart Boersma
In January 1940, the U.S. Coast Guard intercepted numerous messages that were encrypted on a commercial Enigma D machine using the same key. By solving these messages in depth and examining the res...
-
Review of The Secret Life of an American Codebreaker: Codebreaker Girls by Jan Slimming Cryptologia (IF 0.6) Pub Date : 2022-08-26 Chris Christensen
Published in Cryptologia (Vol. 47, No. 6, 2023)
-
Cracking PURPLE: the identification of homologs in the cryptanalysis of the Angooki Taipu B cipher machine Cryptologia (IF 0.6) Pub Date : 2022-08-16 Kenneth J. Bures
Abstract In 1940 the US Army’s Signal Intelligence Service (SIS) cracked PURPLE, the Japanese diplomatic cipher. Shortly after that accomplishment, William Friedman, legendary cryptographer and civilian head of SIS, wrote his Preliminary Historical Report on the Solution of the “B” Machine. In it he introduced the mysterious “Identification of Homologs” and stated there that it had been a crucial technology
-
The changes in Ottoman diplomatic cryptography and its methods during the 19th century (1811–1877) Cryptologia (IF 0.6) Pub Date : 2022-08-10 Sedat Bingöl
In parallel with the change in the understanding of diplomacy during the reign of Selim III, the Ottoman Empire started to use diplomatic cryptography. However, the efforts which started in 1797 we...
-
A treatise on the Rilke cryptogram Cryptologia (IF 0.6) Pub Date : 2022-08-04 Floe Foxon
The ‘Rilke Cryptogram’ is a possible cipher of German, WWII origin. This study summarises the text’s history, and examines explanations for its nature. Statistical techniques are applied to an upda...
-
Review of Parker Hitt: The Father of American Military Cryptology by Betsy Rohaly Smoot Cryptologia (IF 0.6) Pub Date : 2022-07-26 Chris Christensen
Published in Cryptologia (Vol. 47, No. 5, 2023)
-
Resource guide for teaching post-quantum cryptography Cryptologia (IF 0.6) Pub Date : 2022-07-19 Joshua Holden
Abstract Public-key cryptography has become a popular way to motivate the teaching of concepts in elementary number theory, abstract algebra, and introduction to proof courses, as well as in cryptography courses. Unfortunately, many experts expect quantum computers to make common forms of public-key cryptography obsolete in the near future. Fortunately, there are several systems being evaluated to
-
Arithmetic autocorrelation of binary m-sequences Cryptologia (IF 0.6) Pub Date : 2022-07-12 Zhixiong Chen, Zhihua Niu, Yuqi Sang, Chenhuang Wu
Abstract An m-sequence is the one of the largest period among those produced by a linear feedback shift register. It possesses several desirable features of pseudorandomness such as balance, uniform pattern distribution and ideal autocorrelation for applications to communications. However, it also possesses undesirable features such as low linear complexity. Here we prove a nontrivial upper bound on
-
Genevieve Grotjan’s “great discovery” Cryptologia (IF 0.6) Pub Date : 2022-06-20 Chris Christensen
Abstract On 20 February 1939, a new Japanese diplomatic cipher machine that U.S. Army codebreakers would name PURPLE came into use. By 10 April 1939, the Army’s Signal Intelligence Service (SIS) had made startling progress. SIS codebreakers had discovered that, for no cryptographic reason, PURPLE maintained the split of the Roman alphabet into a set of 6 letters and a set of 20 letters—the sixes and
-
Analysis of rotation and shift based diffusion functions Cryptologia (IF 0.6) Pub Date : 2022-05-18 Arvind Kumar, P. R. Mishra, Odelu Ojjela
Abstract ‘Rotation and shift’ based diffusion functions are used in modern ciphers especially in ARX (Addition, Rotation, and XOR) based designs. They are preferred over other alternatives as they are efficient and lightweight. Usually, such diffusion functions map an n-bit block to another n-bit block. One of the requirements for an n-bit to n-bit diffusion function is that, it should be invertible
-
Can musical encryption be both? A survey of music-based ciphers Cryptologia (IF 0.6) Pub Date : 2022-05-16 David Løberg Code
Abstract The purpose of this article is to analyze the characteristics of a range of music-based ciphers (from the fifteenth to twentieth centuries) with respect to their intended goals and actual outcomes. Historically, the practitioners of music-based ciphers generally fall into one of two distinct groups: composers and cryptographers. The primary goal of the composers was to create music that embedded
-
Correction Cryptologia (IF 0.6) Pub Date : 2022-05-06
(2022). Correction. Cryptologia: Vol. 46, No. 3, pp. 290-290.
-
Cryptographic symmetric structures based on quasigroups Cryptologia (IF 0.6) Pub Date : 2022-04-05 George Teşeleanu
Abstract In our paper we study the effect of changing the commutative group operation used in Feistel and Lai-Massey symmetric structures into a quasigroup operation. We prove that if the quasigroup operation is isotopic with a group G,G, the complexity of mounting a differential attack against our generalization of the Feistel structure is the same as attacking the unkeyed version of the general Feistel
-
Review of The Rose Code by Kate Quinn Cryptologia (IF 0.6) Pub Date : 2022-03-30 John F. Dooley
Published in Cryptologia (Vol. 47, No. 4, 2023)
-
Complete examples of encryption systems broken by Elizebeth Smith Friedman: 1923–1934 Cryptologia (IF 0.6) Pub Date : 2022-02-25 Stuart Boersma
Abstract Elizebeth Smith Friedman has been credited with breaking hundreds of encryption systems during Prohibition, yet few complete examples exist. Using material available in the Elizebeth Smith Friedman archives at the Marshall Library, examples of a variety of encryption systems are presented. Complete examples include original ciphertext, plaintext, and a description of the encryption process
-
Review of codebreaker by Marc McMenamin Cryptologia (IF 0.6) Pub Date : 2022-02-21 John F. Dooley
Published in Cryptologia (Vol. 46, No. 6, 2022)
-
Review of Eavesdropping on the Emperor: Interrogators and Codebreakers in Britain’s War with Japan by Peter Kornicki Cryptologia (IF 0.6) Pub Date : 2022-02-11 Chris Christensen
Published in Cryptologia (Vol. 46, No. 6, 2022)
-
Review of Codebreaker Girls: A Secret Life at Bletchley Park by Jan Slimming Cryptologia (IF 0.6) Pub Date : 2022-02-11 Chris Christensen
Published in Cryptologia (Vol. 47, No. 1, 2023)