共查询到20条相似文献,搜索用时 0 毫秒
1.
C. A. Deavours 《Cryptologia》2013,37(1):66-67
Abstract During the last two centuries, the Mexican diplomatic service produced a huge amount of cryptographic documents. The author has collected, surveyed, and classified nearly 100 since he began to research this subject. In this article, the author shall describe and briefly comment on four different cryptosystems from the first half of the nineteenth century. 相似文献
2.
Louis Kruh 《Cryptologia》2013,37(4):206-209
WordPerfect V4.2, produced by WordPerfect Corporation, is a popular word processing program for the IBM PC series of microcomputers. The program includes an encryption option and, in their handbook, the manufacturers claim that “if you forget the password, there is absolutely no way to retrieve the document.” The encryption is shown to be a simple affine Vigenère cipher with a significant weakness. 相似文献
3.
4.
AbstractIt has been mentioned by Shannon that a Vigenère autokey ciphertext can be transformed into a Vigenère ciphertext, provided the length of the priming key is known. We revisit this transformation and argue that combining it with the Friedman test, in fact, allows revealing of the length of the priming key. Thus, Shannon’s transformation together with the Friedman test allow transforming a Vigenère autokey ciphertext into a Vigenère ciphertext without any prior information. This allows an adversary to solve a Vigenère autokey ciphertext as if it was a Vigenère ciphertext. In addition, we show that the same method can be used to solve a modification of the Vigenère autokey cipher used in the Russian Civil War in 1917–1922. 相似文献
5.
N. J. A. SLOANE 《Cryptologia》2013,37(2):128-153
Charles L. Dodgson, better known as Lewis Carroll, invented several polyal-phabetic ciphers by 1868. The two that he published are put into historical perspective in this paper. His Alphabet Cipher produces a Vigenère enciphered text, while his Telegraph Cipher is equivalent to a Beaufort cipher. In constructing the Telegraph Cipher, Dodgson used two sliding alphabets, similar to the St. Cyr slide invented by Auguste Ker-ckhoff fifteen years later. A program is available to explore these ciphers and another, the Variant Beaufort. 相似文献
6.
Louis Kruh 《Cryptologia》2013,37(4):334-336
Abstract Vigenère ciphers can be broken, if the key length is known. In trying to break the Vigenère cipher, Charles Babbage and Friedrich Wilhelm Kasiski found the length of the key by searching for periodical repetitions in the ciphertext to split the cipher into multiple Caesar ciphers. William Friedman's, “index of coincidence,” also requires an adequate length of the ciphertext to retrieve the key length. Both methods lack, if the ciphertext is short or does not include repetitions and no other effective linguistic solution to break short Vigenère ciphers is known. Massively decreasing the solution space by logic, reverse digram frequency, and language properties allows breaking short and long Vigenère ciphers with and without repetitions. 相似文献
7.
Thomas Kaeding 《Cryptologia》2020,44(3):205-222
AbstractWe present a stochastic method for breaking general periodic polyalphabetic substitution ciphers using only the ciphertext and without using any additional constraints that might come from the cipher’s structure. The method employs a hill-climbing algorithm for individual key alphabets, with occasional slipping down the hill. We implement the method with a computer and achieve reliable results for a sufficiently long ciphertext (150 characters per key alphabet). Because no constraints among the key alphabets are used, this method applies to any periodic polyalphabetic substitution cipher. 相似文献
8.
Augusto Buonafalce 《Cryptologia》2013,37(1):39-51
Abstract A tableau with reciprocal alphabets used with a long keyword is commonly attributed to Della Porta. This cipher had actually been published a decade before by Giovan Battista Bellaso in a rare booklet containing other original ciphers. 相似文献
9.
Kent D. Boklan 《Cryptologia》2013,37(4):340-345
Abstract We study a previously undeciphered Civil War cryptogram, limiting ourselves to pencil and paper, and discover not only a missive of military importance, but in the process, identify a new Confederate codeword. Our methods rely not only upon cryptanalysis of the encryption method but also on the exploitation of an elementary mistake. 相似文献
10.
Kent D. Boklan 《Cryptologia》2016,40(5):406-410
We decrypt a message from Robert E. Lee, which is possibly too short for efficient analysis by classical cryptanalytic techniques, by exploiting the mistake of not encrypting the full contents of the message. 相似文献
11.
AbstractA Vigenère cipher applies a single short key repeatedly to encrypt a plaintext. If a cryptanalyst correctly finds out the key length, the ciphertext can be divided into multiple instances of shift cipher and be broken by frequency analysis. To determine the key length, the twist algorithm, an alternate method to the standard Kasiski and Friedman tests, was recently proposed. In this article, we propose the twist+ algorithm, an improved twist algorithm, which can estimate the key length more accurately than the original twist algorithm. 相似文献
12.
Roberto Narváez 《Cryptologia》2016,40(4):316-326
The author provides a brief study concerning the kind of cryptosystems which the Irish-American Diplomat James Leander Cathcart could have used during his activities in the Barbary states and a posterior attempt to do business with the governments of Mexico and some South American countries. 相似文献
13.
Chris Christensen 《Cryptologia》2013,37(4):356-358
An algorithm is described for computer generation of a very long series E of numbers suitable for use in a polyalphabetic cryptographic system. Individual numbers in the series range from 0 to C–1, where C is the number of characters in a desired character set (e.g., C=128 for the ASCII characters 0-127; or C=26 for 26 letters of the alphabet). The enciphering series E is formed as in a multiloop Vigenère cipher system and the linear congruential generating function is used to generate component series (“loops”) with exceptionally long periods, as long as 1012. While Vigenère systems are usually considered to be vulnerable to cryptanalysis, it is proposed that the magnitude of the numbers available in the component series can make a multiloop system “computationally secure.” Rates of series E generation, using widely available personal computers and software, appear reasonable. Examples given are based on Spectra Publishing's Power Basic, but similar implementations can be made in other versions of BASIC, or in other languages. 相似文献
14.
15.
SHIMSHON BERKOVITS 《Cryptologia》2013,37(3):229-237
It is shown that a Simmons and Norris cycling attack against an RSA public key cryptosystem can be modified to search for factors of the modulus of the system. The cycling can be accomplished by superencyrption or by repeated applications of a function chosen by the cryptanalyst. Finally, the safest choice of system parameters is discussed. 相似文献
16.
《Optimization methods & software》2012,27(1):71-98
We study globally convergent implementations of the Polak–Ribière (PR) conjugate gradient method for the unconstrained minimization of continuously differentiable functions. More specifically, first we state sufficient convergence conditions, which imply that limit points produced by the PR iteration are stationary points of the objective function and we prove that these conditions are satisfied, in particular, when the objective function has some generalized convexity property and exact line searches are performed. In the general case, we show that the convergence conditions can be enforced by means of various inexact line search schemes where, in addition to the usual acceptance criteria, further conditions are imposed on the stepsize. Then we define a new trust region implementation, which is compatible with the behavior of the PR method in the quadratic case, and may perform different linesearches in dependence of the norm of the search direction. In this framework, we show also that it is possible to define globally convergent modified PR iterations that permit exact linesearches at every iteration. Finally, we report the results of a numerical experimentation on a set of large problems. 相似文献
17.
Moacyr A. H. B. da Silva Ralph Teixeira Sinésio Pesco Marcos Craizer 《Journal of Mathematical Imaging and Vision》2008,30(1):1-12
In a previous paper, it was proved that the area based affine distance of a convex region in the plane satisfies a non-homogeneous
Monge-Ampère differential equation. Based on this equation, in this paper we propose a fast marching method for the computation
of this distance. The proposed algorithm has a lower computational complexity than the direct method and we have proved its
convergence. And since the algorithm allows one to obtain a connection from any point of the region to the boundary by a path
of decreasing distance, it offers a dynamic point of view for the area based affine distance.
相似文献
Marcos CraizerEmail: |
18.
刘冬梅 《艺术与设计.数码设计》2007,(3)
《创世纪》与《最后的审判》是作为雕塑家的米开朗基罗的两大绘画巨制,也是文艺复兴时期最具盛名的艺术作品,本文通过对两幅作品的欣赏分析,揭示了米开朗基罗英雄式的精神世界和悲天悯人的人文主义思想。 相似文献
19.
《国际计算机数学杂志》2012,89(1-2):53-61
We have recently developed a new conjugate gradient type method, the Generalized Polak-Ribière (GPR) method, for unconstrained minimization. It is based on search directions that are parallel to the Newton direction of the restriction of the objective function f on the two dimensional subspace span{?g p}, with p a suitable direction in span{? g,s?}, where g and s ? are the current gradient and previous search direction respectively. The new approach proved to be considerably more efficient than the original Polak-Ribière method. In this paper, various implementations of the GPR method are compared with a currently available standard NAG software routine and also with the Nocedal, Buckley-LeNir and Shanno's limited memory algorithms. The results demonstrate the general effectiveness of the new algorithm. We also give a very brief discussion of extensions of the GPR method that generate search directions parallel to Newton directions in subspaces of dimension greater than two. 相似文献