Proceedings of The
Total Page:16
File Type:pdf, Size:1020Kb
Proceedings of the L M N Q R 5 T LMNO QRSTUVW E J L M N O P Q R 5 T U V W X Y Z E F K L M N O P Q R 5 T U V W X Y Z A F G H K L M N E G A T E L U N A X Y Z A B C D G H I L M N O P Q R 5 T U V W X Y Z A B C D E GHI J LMNOPQRSTUVWXYZABCDEF H I J K L M N O P Q R 5 T U V W X Y Z A I J K L M N O P Q J MNOPQ 2019 • IS 0 2nd International Conference on Historical Cryptology N o p N O P Q TUVWXYZABCD GHI JKLMNOPQR UVWXYZABCDE JKLMNOPQRS XYZABCDE KLMNOPQRST Y CDE LMNOPQRSTU DE NOPQR T 0 P 5 U T June 23-26, 2019 Mons, Belgium Editors: Eugen Antal, Klaus Schmeh Proceedings of the 2nd International Conference on Historical Cryptology HistoCrypt 2019 Editors Eugen Antal and Klaus Schmeh June 23-26, 2019 Mons, Belgium Published by NEALT Proceedings series volume 37 Linkoping¨ University Electronic Press, Sweden Linkoping¨ Electronic Conference Proceedings 158 ISSN: 1650-3686 eISSN: 1650-3740 ISBN: 978-91-7685-087-9 Preface I am happy to present the Proceedings of this 2nd International Conference on Historical Cryp- tology (HistoCrypt 2019) in the Mundaneum in Mons, Belgium. HISTOCRYPT addresses all aspects of historical cryptology/cryptography including work in closely related disciplines (such as history, history of ideas, computer science, AI, computational linguistics, linguistics, or image processing) with relevance to historical ciphertexts and codes. The subjects of the conference include, but are not limited to the use of cryptography in mili- tary, diplomacy, business, and other areas, analysis of historical ciphers with the help of modern computerized methods, unsolved historical cryptograms, the Enigma and other encryption ma- chines, the history of modern (computer-based) cryptography, linguistic aspects of cryptology, the influence of cryptography on the course of history, or teaching and promoting cryptology in schools, universities, and the public. HISTOCRYPT represents a continuation of the friendly events of European Historical Ciphers Colloquiums (EuroHCC) held in Heusenstamm (2012), Kassel (2016), and Smolenice (2017) to discuss on-going research in historical cryptology in Europe. Considering EuroHCC’s growing popularity among the crypto-historians and cryptog- raphers and the established HICRYPT network on historical cryptology with over 100 members from 20 countries around the world, our aim is to establish as an annual, world-wide event. The first HISTOCRYPT in the series was organized in 2018 in Uppsala, Sweden. The second event in the series takes place in 2019 at Mundaneum in Mons, Belgium. The conference topics include: the use of cryptography in military, diplomacy, business, and other areas, • analysis of historical ciphers with the help of modern computerized methods, • unsolved historical cryptograms such as the Voynich manuscript, • the Enigma and other encryption machines, • the history of modern (computer-based) cryptography, • linguistic aspects of cryptography, • the influence of cryptography on the course of history, • teaching and promoting cryptography in schools, universities, and the public. • The Program Committee has selected 23 papers out of 25 submissions for presentation (13 in the research track, 6 in the exposition track and 4 as poster/demo). Three papers accepted were later withdrawn by the authors. Papers accepted for the research track are collected in these Proceedings. I would like to thank the Program Committee, Steering Committee and Local Organizers for their hard work in establishing HISTOCRYPT 2019. Their dedication and invaluable input is highly appreciated. The thanks also goes to all the reviewers, subreviewers, keynote speakers and all authors without whom this conference would not have taken place. Klaus Schmeh (Program Chair) iii Program Committee Paolo Bonavoglia, Mathesis Venezia, c/o Convitto Liceo ”Marco Foscarini”, Venezia, • Italy Camille Desenclos, Universite´ de Haute-Alsace, France • Bernhard Esslinger, University of Siegen, Germany • Joachim von zur Gathen, Bonn-Aachen International Center for Information Technology, • Germany Marek Grajek, Freelance cryptography consultant and historian, Poland • Otokar Grosek,ˇ Slovak University of Technology in Bratislava, Slovakia • Benedek Lang,´ Budapest University of Technology and Economics, Hungary • Karl de Leeuw, IDTopiQ, the Netherlands • Beata´ Megyesi, Uppsala University, Sweden • Karol Nemoga, Mathematical Institute of the Slovak Academy of Sciences, Slovakia • Anne-Simone Rous, Saxon Academy of Sciences and Humanities, Germany • Klaus Schmeh, private scholar, Germany • Gerhard F. Strasser, Emeritus, Pennsylvania State University, USA • John Dermot Turing, Kellogg College, Oxford, United Kingdom • Steering Committee Joachim von zur Gathen, Bonn-Aachen International Center for Information Technology, • Germany Marek Grajek, Freelance cryptography consultant and historian, Poland • Klaus Schmeh, private scholar, Germany • Arno Wacker, Privacy and Compliance, Bundeswehr University Munich, Germany • Local Organizing Committee Jean-Jacques Quisquater • iv Subreviewers Eugen Antal, Slovak University of Technology in Bratislava, Slovakia • Nils Kopal, University of Siegen, Germany • George Lasry, The CrypTool Team, Germany • Pavol Zajac, Slovak University of Technology in Bratislava, Slovakia • v INVITED TALKS Vincent Rijmen, Joan Daemen: • The History of AES Bernard Fabrot: • Breaking LCS35 Bart Preneel: • Lumumba; or Breaking 1961 Hagelin Ciphertexts Marc McMenamin: • Codebreaker Richard Hayes Ingo Niebel: • The German Crypto-Crisis of 1917 - How the Zimmermann Telegram Completed the Gen- esis of German Cryptology Rene´ Zandbergen: • No News About the Voynich MS? vii POSTER AND DEMO Nils Kopal, Tobias Schrodel:¨ • Crypto Books Mauran Philippe: • Cyphers and Shadow Diplomacy in England During 17th Century: Prince of Conde´ Look- ing for Support ix EXPOSITION TRACK Gerhard F. Strasser: • Johann J. H. Bucking¨ (1749-1838) – Medical Doctor, Inventor, and Cryptologist Jerry McCarthy: • Recreating the Polish Bomba, Predecessor to the Turing-Welchman Bombe Carola Dahlke: • From Antiquity to Post-Quantum Cryptography: A New Gallery on Cryptology at the Deutsches Museum, Munich Monir Azraoui, Solenn Brunet, Sebastien´ Canard, A¨ıda Diop, Lelia´ Eveillard, Alicia Fil- • ipiak, Adel Hamdi, Flavie Misarsky, Donald Nokam Kuate, Marie Paindavoine, Quentin Santos and Bastien Vialla: CYBERCRYPT: Learn Basic Cryptographic Concepts while Playing Giuseppe Bianchi: • Voynich, Hardware and Software xi Contents Preface . iii INVITED TALKS .................................... vii POSTER AND DEMO .................................. ix EXPOSITION TRACK .................................. xi RESEARCH TRACK Hieronimo di Franceschi and Pietro Partenio: Two Unknown Venetian Cryptologists Paolo Bonavoglia . 3 Decrypting the Hill Cipher via a Restricted Search over the Text-Space Florent Dewez, Valentin Montmirail . 13 Cryptology in the Slovak State During WWII Eugen Antal, Pavol Zajac, Otokar Grosekˇ . 23 The Typex Scare of 1943: How Well Did the British React to a Cypher-Security Scare? Dermot Turing . 31 A Practical Meet-in-the-Middle Attack on SIGABA George Lasry . 41 Dead Ends in Breaking an Unknown Cipher: Experiences in the Historiography of the Rohonc Codex Benedek Lang´ . 51 Uruguayan Cryptography: Printed Book Covers Juan Jose´ Cabezas, Francisco Castro, Joachim von zur Gathen, Jorge Tiscornia, Alfredo Viola . 59 The DECODE Database Collection of Historical Ciphers and Keys Beata´ Megyesi, Nils Blomqvist, Eva Pettersson . 69 Beyond Schlock on Screen: Teaching the History of Cryptology Through Media Rep- resentations of Secret Communications Peter Krapp . 79 Solving a 40-Letter Playfair Challenge with CrypTool 2 George Lasry . 87 Cryptanalysis of an Early 20th Century Encrypted Journal Tony Gaffney, Klaus Schmeh . 97 xiii Cryptanalysis of Homophonic Substitution Ciphers Using Simulated Annealing with Fixed Temperature Nils Kopal . 107 Using the Entropy of N-Grams to Evaluate the Authenticity of Substitution Ciphers and Z340 in Particular Tom S Juzek . 117 xiv RESEARCH TRACK Hieronimo di Franceschi and Pietro Partenio: Two Unknown Venetian Cryptologists Paolo Bonavoglia Former teacher of Mathematics and Computer Science Mathesis Venezia c/o Convitto ”Marco Foscarini” Venezia [email protected] Abstract 2 Two statements of the Council of Ten In 1596 the powerful Council of Ten, the Inside the archive there is an interesting letter. secret service of the Republic of Venice, dated 30 August 1596, written by the Chiefs of the sent a message to the new Baylo in Con- Council of Ten, 4 to the new baylo of Constantino- stantinople, warning him to use, for or- ple. dinary messages which needed to be en- The text translated into English is: crypted, Pietro Partenio’s cipher, but for questions of extraordinary importance to We recommend with the Chiefs of use the Zifra delle caselle1 cipher invented the Council of X, that when it is neces- by Hieronimo di Franceschi. But who sary to write in cipher you continue us- were Partenio and Franceschi? ing the ordinary cipher, but, when treat- This paper is the report of the first re- ing affairs of extraordinary importance, sults of a research in the State Archive of you will use the [Ziffra delle caselle] of Venice about these two unknown cryptol- the cautious and most loyal secretary of ogists, still in progress. the Senate Hieronimo di Franceschi, ab- staining from using those of the most 1 Two unknown cryptologists loyal Pietro Partenio, up to our new or- der. Hieronimo2 di Franceschi, Pietro Partenio, who were they? The message is signed by Piero Lando, and two If one searches the web with Google3 for these of the chiefs of CCX. Here Franceschi’s cipher is names the result is a long list of results having seen ad better than Partenio’s. nothing to do with cryptology. But, as we will see in the following, in 1593 And still the State Archive of Venice has plenty another document of CCX had stated just the con- of documents about them, dispersed in several trary. funds and envelopes. And there is plenty of docu- Now we will examine some of these ciphers of ments having to do with Franceschi and Partenio. Franceschi and Partenio. The most surprising as- Let us start with a 1596 letter.