首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
Abstract

During the last two centuries, the Mexican diplomatic service produced a huge amount of cryptographic documents. The author has collected, surveyed, and classified nearly 100 since he began to research this subject. In this article, the author shall describe and briefly comment on four different cryptosystems from the first half of the nineteenth century.  相似文献   

2.
Louis Kruh 《Cryptologia》2013,37(4):206-209
WordPerfect V4.2, produced by WordPerfect Corporation, is a popular word processing program for the IBM PC series of microcomputers. The program includes an encryption option and, in their handbook, the manufacturers claim that “if you forget the password, there is absolutely no way to retrieve the document.” The encryption is shown to be a simple affine Vigenère cipher with a significant weakness.  相似文献   

3.
李珊珊  谭勇  张宏辉 《计算机工程》2008,34(10):144-146
数字图像的置乱技术是图像信息隐藏和伪装的重要的手段之一。该文基于经典的Vigenère密码理论,提出一种数字图像灰度置乱方法,给出利用这种方法进行数字图像置乱的算法流程。仿真实验及结果表明,经这种方法置乱后的图像直方图与白噪声图像的直方图相似度约为0.9,从而验证了该方法的有效性。通过对安全性能的讨论,以及与改进Grey编码进行灰度置乱方法的结果进行比较,证明该方法具有较好的实用性。  相似文献   

4.
Abstract

It has been mentioned by Shannon that a Vigenère autokey ciphertext can be transformed into a Vigenère ciphertext, provided the length of the priming key is known. We revisit this transformation and argue that combining it with the Friedman test, in fact, allows revealing of the length of the priming key. Thus, Shannon’s transformation together with the Friedman test allow transforming a Vigenère autokey ciphertext into a Vigenère ciphertext without any prior information. This allows an adversary to solve a Vigenère autokey ciphertext as if it was a Vigenère ciphertext. In addition, we show that the same method can be used to solve a modification of the Vigenère autokey cipher used in the Russian Civil War in 1917–1922.  相似文献   

5.
Charles L. Dodgson, better known as Lewis Carroll, invented several polyal-phabetic ciphers by 1868. The two that he published are put into historical perspective in this paper. His Alphabet Cipher produces a Vigenère enciphered text, while his Telegraph Cipher is equivalent to a Beaufort cipher. In constructing the Telegraph Cipher, Dodgson used two sliding alphabets, similar to the St. Cyr slide invented by Auguste Ker-ckhoff fifteen years later. A program is available to explore these ciphers and another, the Variant Beaufort.  相似文献   

6.
    
Louis Kruh 《Cryptologia》2013,37(4):334-336
Abstract

Vigenère ciphers can be broken, if the key length is known. In trying to break the Vigenère cipher, Charles Babbage and Friedrich Wilhelm Kasiski found the length of the key by searching for periodical repetitions in the ciphertext to split the cipher into multiple Caesar ciphers. William Friedman's, “index of coincidence,” also requires an adequate length of the ciphertext to retrieve the key length. Both methods lack, if the ciphertext is short or does not include repetitions and no other effective linguistic solution to break short Vigenère ciphers is known. Massively decreasing the solution space by logic, reverse digram frequency, and language properties allows breaking short and long Vigenère ciphers with and without repetitions.  相似文献   

7.
    
Thomas Kaeding 《Cryptologia》2020,44(3):205-222
Abstract

We present a stochastic method for breaking general periodic polyalphabetic substitution ciphers using only the ciphertext and without using any additional constraints that might come from the cipher’s structure. The method employs a hill-climbing algorithm for individual key alphabets, with occasional slipping down the hill. We implement the method with a computer and achieve reliable results for a sufficiently long ciphertext (150 characters per key alphabet). Because no constraints among the key alphabets are used, this method applies to any periodic polyalphabetic substitution cipher.  相似文献   

8.
    
Abstract

A tableau with reciprocal alphabets used with a long keyword is commonly attributed to Della Porta. This cipher had actually been published a decade before by Giovan Battista Bellaso in a rare booklet containing other original ciphers.  相似文献   

9.
    
Kent D. Boklan 《Cryptologia》2013,37(4):340-345
Abstract

We study a previously undeciphered Civil War cryptogram, limiting ourselves to pencil and paper, and discover not only a missive of military importance, but in the process, identify a new Confederate codeword. Our methods rely not only upon cryptanalysis of the encryption method but also on the exploitation of an elementary mistake.  相似文献   

10.
Kent D. Boklan 《Cryptologia》2016,40(5):406-410
We decrypt a message from Robert E. Lee, which is possibly too short for efficient analysis by classical cryptanalytic techniques, by exploiting the mistake of not encrypting the full contents of the message.  相似文献   

11.
Abstract

A Vigenère cipher applies a single short key repeatedly to encrypt a plaintext. If a cryptanalyst correctly finds out the key length, the ciphertext can be divided into multiple instances of shift cipher and be broken by frequency analysis. To determine the key length, the twist algorithm, an alternate method to the standard Kasiski and Friedman tests, was recently proposed. In this article, we propose the twist+ algorithm, an improved twist algorithm, which can estimate the key length more accurately than the original twist algorithm.  相似文献   

12.
The author provides a brief study concerning the kind of cryptosystems which the Irish-American Diplomat James Leander Cathcart could have used during his activities in the Barbary states and a posterior attempt to do business with the governments of Mexico and some South American countries.  相似文献   

13.
    
An algorithm is described for computer generation of a very long series E of numbers suitable for use in a polyalphabetic cryptographic system. Individual numbers in the series range from 0 to C–1, where C is the number of characters in a desired character set (e.g., C=128 for the ASCII characters 0-127; or C=26 for 26 letters of the alphabet). The enciphering series E is formed as in a multiloop Vigenère cipher system and the linear congruential generating function is used to generate component series (“loops”) with exceptionally long periods, as long as 1012. While Vigenère systems are usually considered to be vulnerable to cryptanalysis, it is proposed that the magnitude of the numbers available in the component series can make a multiloop system “computationally secure.” Rates of series E generation, using widely available personal computers and software, appear reasonable. Examples given are based on Spectra Publishing's Power Basic, but similar implementations can be made in other versions of BASIC, or in other languages.  相似文献   

14.
    
  相似文献   

15.
It is shown that a Simmons and Norris cycling attack against an RSA public key cryptosystem can be modified to search for factors of the modulus of the system. The cycling can be accomplished by superencyrption or by repeated applications of a function chosen by the cryptanalyst. Finally, the safest choice of system parameters is discussed.  相似文献   

16.
    
We study globally convergent implementations of the Polak–Ribière (PR) conjugate gradient method for the unconstrained minimization of continuously differentiable functions. More specifically, first we state sufficient convergence conditions, which imply that limit points produced by the PR iteration are stationary points of the objective function and we prove that these conditions are satisfied, in particular, when the objective function has some generalized convexity property and exact line searches are performed. In the general case, we show that the convergence conditions can be enforced by means of various inexact line search schemes where, in addition to the usual acceptance criteria, further conditions are imposed on the stepsize. Then we define a new trust region implementation, which is compatible with the behavior of the PR method in the quadratic case, and may perform different linesearches in dependence of the norm of the search direction. In this framework, we show also that it is possible to define globally convergent modified PR iterations that permit exact linesearches at every iteration. Finally, we report the results of a numerical experimentation on a set of large problems.  相似文献   

17.
In a previous paper, it was proved that the area based affine distance of a convex region in the plane satisfies a non-homogeneous Monge-Ampère differential equation. Based on this equation, in this paper we propose a fast marching method for the computation of this distance. The proposed algorithm has a lower computational complexity than the direct method and we have proved its convergence. And since the algorithm allows one to obtain a connection from any point of the region to the boundary by a path of decreasing distance, it offers a dynamic point of view for the area based affine distance.
Marcos CraizerEmail:
  相似文献   

18.
《创世纪》与《最后的审判》是作为雕塑家的米开朗基罗的两大绘画巨制,也是文艺复兴时期最具盛名的艺术作品,本文通过对两幅作品的欣赏分析,揭示了米开朗基罗英雄式的精神世界和悲天悯人的人文主义思想。  相似文献   

19.
We have recently developed a new conjugate gradient type method, the Generalized Polak-Ribière (GPR) method, for unconstrained minimization. It is based on search directions that are parallel to the Newton direction of the restriction of the objective function f on the two dimensional subspace span{?g p}, with p a suitable direction in span{? g,s?}, where g and s ? are the current gradient and previous search direction respectively. The new approach proved to be considerably more efficient than the original Polak-Ribière method.

In this paper, various implementations of the GPR method are compared with a currently available standard NAG software routine and also with the Nocedal, Buckley-LeNir and Shanno's limited memory algorithms. The results demonstrate the general effectiveness of the new algorithm. We also give a very brief discussion of extensions of the GPR method that generate search directions parallel to Newton directions in subspaces of dimension greater than two.  相似文献   

20.
RS-232与CAN接口卡的设计   总被引:7,自引:0,他引:7  
与传统的RS-232总线相比,CAN总线是一个高速、长距离、多主、经济的网络系统,特别适用于实时系统。其易用性和低成本使得CAN在汽车工业和自动化领域得到广泛的应用。因此设计高性能的RS-232与CAN总线的接口卡以代替传统的PC机的RS-232总线通信具有重要意义。本主要介绍了CAN总线的工作原理和RS-232与CAN接口卡的软硬件设计过程及注意事项。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号