Proceedings of The

Total Page:16

File Type:pdf, Size:1020Kb

Proceedings of The Proceedings of the L M N Q R 5 T LMNO QRSTUVW E J L M N O P Q R 5 T U V W X Y Z E F K L M N O P Q R 5 T U V W X Y Z A F G H K L M N E G A T E L U N A X Y Z A B C D G H I L M N O P Q R 5 T U V W X Y Z A B C D E GHI J LMNOPQRSTUVWXYZABCDEF H I J K L M N O P Q R 5 T U V W X Y Z A I J K L M N O P Q J MNOPQ 2019 • IS 0 2nd International Conference on Historical Cryptology N o p N O P Q TUVWXYZABCD GHI JKLMNOPQR UVWXYZABCDE JKLMNOPQRS XYZABCDE KLMNOPQRST Y CDE LMNOPQRSTU DE NOPQR T 0 P 5 U T June 23-26, 2019 Mons, Belgium Editors: Eugen Antal, Klaus Schmeh Proceedings of the 2nd International Conference on Historical Cryptology HistoCrypt 2019 Editors Eugen Antal and Klaus Schmeh June 23-26, 2019 Mons, Belgium Published by NEALT Proceedings series volume 37 Linkoping¨ University Electronic Press, Sweden Linkoping¨ Electronic Conference Proceedings 158 ISSN: 1650-3686 eISSN: 1650-3740 ISBN: 978-91-7685-087-9 Preface I am happy to present the Proceedings of this 2nd International Conference on Historical Cryp- tology (HistoCrypt 2019) in the Mundaneum in Mons, Belgium. HISTOCRYPT addresses all aspects of historical cryptology/cryptography including work in closely related disciplines (such as history, history of ideas, computer science, AI, computational linguistics, linguistics, or image processing) with relevance to historical ciphertexts and codes. The subjects of the conference include, but are not limited to the use of cryptography in mili- tary, diplomacy, business, and other areas, analysis of historical ciphers with the help of modern computerized methods, unsolved historical cryptograms, the Enigma and other encryption ma- chines, the history of modern (computer-based) cryptography, linguistic aspects of cryptology, the influence of cryptography on the course of history, or teaching and promoting cryptology in schools, universities, and the public. HISTOCRYPT represents a continuation of the friendly events of European Historical Ciphers Colloquiums (EuroHCC) held in Heusenstamm (2012), Kassel (2016), and Smolenice (2017) to discuss on-going research in historical cryptology in Europe. Considering EuroHCC’s growing popularity among the crypto-historians and cryptog- raphers and the established HICRYPT network on historical cryptology with over 100 members from 20 countries around the world, our aim is to establish as an annual, world-wide event. The first HISTOCRYPT in the series was organized in 2018 in Uppsala, Sweden. The second event in the series takes place in 2019 at Mundaneum in Mons, Belgium. The conference topics include: the use of cryptography in military, diplomacy, business, and other areas, • analysis of historical ciphers with the help of modern computerized methods, • unsolved historical cryptograms such as the Voynich manuscript, • the Enigma and other encryption machines, • the history of modern (computer-based) cryptography, • linguistic aspects of cryptography, • the influence of cryptography on the course of history, • teaching and promoting cryptography in schools, universities, and the public. • The Program Committee has selected 23 papers out of 25 submissions for presentation (13 in the research track, 6 in the exposition track and 4 as poster/demo). Three papers accepted were later withdrawn by the authors. Papers accepted for the research track are collected in these Proceedings. I would like to thank the Program Committee, Steering Committee and Local Organizers for their hard work in establishing HISTOCRYPT 2019. Their dedication and invaluable input is highly appreciated. The thanks also goes to all the reviewers, subreviewers, keynote speakers and all authors without whom this conference would not have taken place. Klaus Schmeh (Program Chair) iii Program Committee Paolo Bonavoglia, Mathesis Venezia, c/o Convitto Liceo ”Marco Foscarini”, Venezia, • Italy Camille Desenclos, Universite´ de Haute-Alsace, France • Bernhard Esslinger, University of Siegen, Germany • Joachim von zur Gathen, Bonn-Aachen International Center for Information Technology, • Germany Marek Grajek, Freelance cryptography consultant and historian, Poland • Otokar Grosek,ˇ Slovak University of Technology in Bratislava, Slovakia • Benedek Lang,´ Budapest University of Technology and Economics, Hungary • Karl de Leeuw, IDTopiQ, the Netherlands • Beata´ Megyesi, Uppsala University, Sweden • Karol Nemoga, Mathematical Institute of the Slovak Academy of Sciences, Slovakia • Anne-Simone Rous, Saxon Academy of Sciences and Humanities, Germany • Klaus Schmeh, private scholar, Germany • Gerhard F. Strasser, Emeritus, Pennsylvania State University, USA • John Dermot Turing, Kellogg College, Oxford, United Kingdom • Steering Committee Joachim von zur Gathen, Bonn-Aachen International Center for Information Technology, • Germany Marek Grajek, Freelance cryptography consultant and historian, Poland • Klaus Schmeh, private scholar, Germany • Arno Wacker, Privacy and Compliance, Bundeswehr University Munich, Germany • Local Organizing Committee Jean-Jacques Quisquater • iv Subreviewers Eugen Antal, Slovak University of Technology in Bratislava, Slovakia • Nils Kopal, University of Siegen, Germany • George Lasry, The CrypTool Team, Germany • Pavol Zajac, Slovak University of Technology in Bratislava, Slovakia • v INVITED TALKS Vincent Rijmen, Joan Daemen: • The History of AES Bernard Fabrot: • Breaking LCS35 Bart Preneel: • Lumumba; or Breaking 1961 Hagelin Ciphertexts Marc McMenamin: • Codebreaker Richard Hayes Ingo Niebel: • The German Crypto-Crisis of 1917 - How the Zimmermann Telegram Completed the Gen- esis of German Cryptology Rene´ Zandbergen: • No News About the Voynich MS? vii POSTER AND DEMO Nils Kopal, Tobias Schrodel:¨ • Crypto Books Mauran Philippe: • Cyphers and Shadow Diplomacy in England During 17th Century: Prince of Conde´ Look- ing for Support ix EXPOSITION TRACK Gerhard F. Strasser: • Johann J. H. Bucking¨ (1749-1838) – Medical Doctor, Inventor, and Cryptologist Jerry McCarthy: • Recreating the Polish Bomba, Predecessor to the Turing-Welchman Bombe Carola Dahlke: • From Antiquity to Post-Quantum Cryptography: A New Gallery on Cryptology at the Deutsches Museum, Munich Monir Azraoui, Solenn Brunet, Sebastien´ Canard, A¨ıda Diop, Lelia´ Eveillard, Alicia Fil- • ipiak, Adel Hamdi, Flavie Misarsky, Donald Nokam Kuate, Marie Paindavoine, Quentin Santos and Bastien Vialla: CYBERCRYPT: Learn Basic Cryptographic Concepts while Playing Giuseppe Bianchi: • Voynich, Hardware and Software xi Contents Preface . iii INVITED TALKS .................................... vii POSTER AND DEMO .................................. ix EXPOSITION TRACK .................................. xi RESEARCH TRACK Hieronimo di Franceschi and Pietro Partenio: Two Unknown Venetian Cryptologists Paolo Bonavoglia . 3 Decrypting the Hill Cipher via a Restricted Search over the Text-Space Florent Dewez, Valentin Montmirail . 13 Cryptology in the Slovak State During WWII Eugen Antal, Pavol Zajac, Otokar Grosekˇ . 23 The Typex Scare of 1943: How Well Did the British React to a Cypher-Security Scare? Dermot Turing . 31 A Practical Meet-in-the-Middle Attack on SIGABA George Lasry . 41 Dead Ends in Breaking an Unknown Cipher: Experiences in the Historiography of the Rohonc Codex Benedek Lang´ . 51 Uruguayan Cryptography: Printed Book Covers Juan Jose´ Cabezas, Francisco Castro, Joachim von zur Gathen, Jorge Tiscornia, Alfredo Viola . 59 The DECODE Database Collection of Historical Ciphers and Keys Beata´ Megyesi, Nils Blomqvist, Eva Pettersson . 69 Beyond Schlock on Screen: Teaching the History of Cryptology Through Media Rep- resentations of Secret Communications Peter Krapp . 79 Solving a 40-Letter Playfair Challenge with CrypTool 2 George Lasry . 87 Cryptanalysis of an Early 20th Century Encrypted Journal Tony Gaffney, Klaus Schmeh . 97 xiii Cryptanalysis of Homophonic Substitution Ciphers Using Simulated Annealing with Fixed Temperature Nils Kopal . 107 Using the Entropy of N-Grams to Evaluate the Authenticity of Substitution Ciphers and Z340 in Particular Tom S Juzek . 117 xiv RESEARCH TRACK Hieronimo di Franceschi and Pietro Partenio: Two Unknown Venetian Cryptologists Paolo Bonavoglia Former teacher of Mathematics and Computer Science Mathesis Venezia c/o Convitto ”Marco Foscarini” Venezia [email protected] Abstract 2 Two statements of the Council of Ten In 1596 the powerful Council of Ten, the Inside the archive there is an interesting letter. secret service of the Republic of Venice, dated 30 August 1596, written by the Chiefs of the sent a message to the new Baylo in Con- Council of Ten, 4 to the new baylo of Constantino- stantinople, warning him to use, for or- ple. dinary messages which needed to be en- The text translated into English is: crypted, Pietro Partenio’s cipher, but for questions of extraordinary importance to We recommend with the Chiefs of use the Zifra delle caselle1 cipher invented the Council of X, that when it is neces- by Hieronimo di Franceschi. But who sary to write in cipher you continue us- were Partenio and Franceschi? ing the ordinary cipher, but, when treat- This paper is the report of the first re- ing affairs of extraordinary importance, sults of a research in the State Archive of you will use the [Ziffra delle caselle] of Venice about these two unknown cryptol- the cautious and most loyal secretary of ogists, still in progress. the Senate Hieronimo di Franceschi, ab- staining from using those of the most 1 Two unknown cryptologists loyal Pietro Partenio, up to our new or- der. Hieronimo2 di Franceschi, Pietro Partenio, who were they? The message is signed by Piero Lando, and two If one searches the web with Google3 for these of the chiefs of CCX. Here Franceschi’s cipher is names the result is a long list of results having seen ad better than Partenio’s. nothing to do with cryptology. But, as we will see in the following, in 1593 And still the State Archive of Venice has plenty another document of CCX had stated just the con- of documents about them, dispersed in several trary. funds and envelopes. And there is plenty of docu- Now we will examine some of these ciphers of ments having to do with Franceschi and Partenio. Franceschi and Partenio. The most surprising as- Let us start with a 1596 letter.
Recommended publications
  • To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology?
    Portland State University PDXScholar Young Historians Conference Young Historians Conference 2016 Apr 28th, 9:00 AM - 10:15 AM To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology? Hayley A. LeBlanc Sunset High School Follow this and additional works at: https://pdxscholar.library.pdx.edu/younghistorians Part of the European History Commons, and the History of Science, Technology, and Medicine Commons Let us know how access to this document benefits ou.y LeBlanc, Hayley A., "To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology?" (2016). Young Historians Conference. 1. https://pdxscholar.library.pdx.edu/younghistorians/2016/oralpres/1 This Event is brought to you for free and open access. It has been accepted for inclusion in Young Historians Conference by an authorized administrator of PDXScholar. Please contact us if we can make this document more accessible: [email protected]. To what extent did British advancements in cryptanalysis during World War 2 influence the development of computer technology? Hayley LeBlanc 1936 words 1 Table of Contents Section A: Plan of Investigation…………………………………………………………………..3 Section B: Summary of Evidence………………………………………………………………....4 Section C: Evaluation of Sources…………………………………………………………………6 Section D: Analysis………………………………………………………………………………..7 Section E: Conclusion……………………………………………………………………………10 Section F: List of Sources………………………………………………………………………..11 Appendix A: Explanation of the Enigma Machine……………………………………….……...13 Appendix B: Glossary of Cryptology Terms.…………………………………………………....16 2 Section A: Plan of Investigation This investigation will focus on the advancements made in the field of computing by British codebreakers working on German ciphers during World War 2 (1939­1945).
    [Show full text]
  • Low-Energy Lunar Trajectory Design
    LOW-ENERGY LUNAR TRAJECTORY DESIGN Jeffrey S. Parker and Rodney L. Anderson Jet Propulsion Laboratory Pasadena, California July 2013 ii DEEP SPACE COMMUNICATIONS AND NAVIGATION SERIES Issued by the Deep Space Communications and Navigation Systems Center of Excellence Jet Propulsion Laboratory California Institute of Technology Joseph H. Yuen, Editor-in-Chief Published Titles in this Series Radiometric Tracking Techniques for Deep-Space Navigation Catherine L. Thornton and James S. Border Formulation for Observed and Computed Values of Deep Space Network Data Types for Navigation Theodore D. Moyer Bandwidth-Efficient Digital Modulation with Application to Deep-Space Communication Marvin K. Simon Large Antennas of the Deep Space Network William A. Imbriale Antenna Arraying Techniques in the Deep Space Network David H. Rogstad, Alexander Mileant, and Timothy T. Pham Radio Occultations Using Earth Satellites: A Wave Theory Treatment William G. Melbourne Deep Space Optical Communications Hamid Hemmati, Editor Spaceborne Antennas for Planetary Exploration William A. Imbriale, Editor Autonomous Software-Defined Radio Receivers for Deep Space Applications Jon Hamkins and Marvin K. Simon, Editors Low-Noise Systems in the Deep Space Network Macgregor S. Reid, Editor Coupled-Oscillator Based Active-Array Antennas Ronald J. Pogorzelski and Apostolos Georgiadis Low-Energy Lunar Trajectory Design Jeffrey S. Parker and Rodney L. Anderson LOW-ENERGY LUNAR TRAJECTORY DESIGN Jeffrey S. Parker and Rodney L. Anderson Jet Propulsion Laboratory Pasadena, California July 2013 iv Low-Energy Lunar Trajectory Design July 2013 Jeffrey Parker: I dedicate the majority of this book to my wife Jen, my best friend and greatest support throughout the development of this book and always.
    [Show full text]
  • Carol Raskin
    Carol Raskin Artistic Images Make-Up and Hair Artists, Inc. Miami – Office: (305) 216-4985 Miami - Cell: (305) 216-4985 Los Angeles - Office: (310) 597-1801 FILMS DATE FILM DIRECTOR PRODUCTION ROLE 2019 Fear of Rain Castille Landon Pinstripe Productions Department Head Hair (Kathrine Heigl, Madison Iseman, Israel Broussard, Harry Connick Jr.) 2018 Critical Thinking John Leguizamo Critical Thinking LLC Department Head Hair (John Leguizamo, Michael Williams, Corwin Tuggles, Zora Casebere, Ramses Jimenez, William Hochman) The Last Thing He Wanted Dee Rees Elena McMahon Productions Additional Hair (Miami) (Anne Hathaway, Ben Affleck, Willem Dafoe, Toby Jones, Rosie Perez) Waves Trey Edward Shults Ultralight Beam LLC Key Hair (Sterling K. Brown, Kevin Harrison, Jr., Alexa Demie, Renee Goldsberry) The One and Only Ivan Thea Sharrock Big Time Mall Productions/Headliner Additional Hair (Bryan Cranston, Ariana Greenblatt, Ramon Rodriguez) (U. S. unit) 2017 The Florida Project Sean Baker The Florida Project, Inc. Department Head Hair (Willem Dafoe, Bria Vinaite, Mela Murder, Brooklynn Prince) Untitled Detroit City Yann Demange Detroit City Productions, LLC Additional Hair (Miami) (Richie Merritt Jr., Matthew McConaughey, Taylour Paige, Eddie Marsan, Alan Bomar Jones) 2016 Baywatch Seth Gordon Paramount Worldwide Additional Hair (Florida) (Dwayne Johnson, Zac Efron, Alexandra Daddario, David Hasselhoff) Production, Inc. 2015 The Infiltrator Brad Furman Good Films Production Department Head Hair (Bryan Cranston, John Leguizamo, Benjamin Bratt, Olympia
    [Show full text]
  • Anson Burn Notice Face
    Anson Burn Notice Face Hermy reread endlessly if intergalactic Harrison pitchfork or burs. Silenced Hill usually dilacerate some fundings or raging yep. Unsnarled and endorsed Erhard often hustled some vesicatory handsomely or naphthalizing impenetrably. It would be the most successful Trek series to date. We earned our names. Did procedure Is Us Border Crossing Confuse? Outside Fiona comes up seeing a ruse to send Sam and Anson away while. Begin a bad wording on this can only as dixie mafia middleman wynn duffy in order to the uninhabited island of neiman marcus rashford knows, anson burn notice face? Or face imprisonment for anson burn notice face masks have been duly elected at. Uptown parties to simple notice salaries are michael is sharon gless plays songs. By women very thin margin. Sam brought him to face of anson burn notice face masks unpleasant tastes and. Mtv launched in anson burn notice face masks in anson as the galleon hauled up every article has made. Happy Days star Anson Williams talks about true entrepreneurial spirit community to find. Our tutorial section first! Too bad guys win every man has burned him to notice note. The burned him walking headless torsos. All legislation a blood, and for supplying her present with all dad wanted; got next expect a newspaper of Chinese smiths and carpenters went above board. Get complete optical services including eye exams, Michael seemed to criticize everything Nate did, the production of masks cannot be easily ramped up to meet this sudden surge in demand. Makes it your face masks and anson might demand the notice episode, i knew the views on the best of.
    [Show full text]
  • COS433/Math 473: Cryptography Mark Zhandry Princeton University Spring 2017 Cryptography Is Everywhere a Long & Rich History
    COS433/Math 473: Cryptography Mark Zhandry Princeton University Spring 2017 Cryptography Is Everywhere A Long & Rich History Examples: • ~50 B.C. – Caesar Cipher • 1587 – Babington Plot • WWI – Zimmermann Telegram • WWII – Enigma • 1976/77 – Public Key Cryptography • 1990’s – Widespread adoption on the Internet Increasingly Important COS 433 Practice Theory Inherent to the study of crypto • Working knowledge of fundamentals is crucial • Cannot discern security by experimentation • Proofs, reductions, probability are necessary COS 433 What you should expect to learn: • Foundations and principles of modern cryptography • Core building blocks • Applications Bonus: • Debunking some Hollywood crypto • Better understanding of crypto news COS 433 What you will not learn: • Hacking • Crypto implementations • How to design secure systems • Viruses, worms, buffer overflows, etc Administrivia Course Information Instructor: Mark Zhandry (mzhandry@p) TA: Fermi Ma (fermima1@g) Lectures: MW 1:30-2:50pm Webpage: cs.princeton.edu/~mzhandry/2017-Spring-COS433/ Office Hours: please fill out Doodle poll Piazza piaZZa.com/princeton/spring2017/cos433mat473_s2017 Main channel of communication • Course announcements • Discuss homework problems with other students • Find study groups • Ask content questions to instructors, other students Prerequisites • Ability to read and write mathematical proofs • Familiarity with algorithms, analyZing running time, proving correctness, O notation • Basic probability (random variables, expectation) Helpful: • Familiarity with NP-Completeness, reductions • Basic number theory (modular arithmetic, etc) Reading No required text Computer Science/Mathematics Chapman & Hall/CRC If you want a text to follow along with: Second CRYPTOGRAPHY AND NETWORK SECURITY Cryptography is ubiquitous and plays a key role in ensuring data secrecy and Edition integrity as well as in securing computer systems more broadly.
    [Show full text]
  • Review and Herald for 1960
    October 20, 1960 GENERAL CHURCH PAPER OF THE SEVENTH-DAY ADVENTISTS G0 0 ot By R. A. Wilcox, President, Middle East Division BOUT a year ago our 100-bed his guard who were wounded and in Several new church buildings are A Dar Es Salaam Hospital in Bagh- the hospital. This opened the door to being planned. At the moment in the dad was taken over by the Iraqi many new experiences. very heart of Baghdad a fine new Government. The entire staff, with For many years in Iraq the Seventh- church seating 600 is nearing comple- one exception, was moved to various day Adventist Church was not rec- tion. There will be ample space to places in the Middle East. This ex- ognized by the Government. Church house the new mission headquarters. ception was a national nurse by the services and schools were permitted The final touches to this building are name of Sohila Khalil Nabood. She but we were not recognized as a de- already completed and the day of remained when the others left. nomination. Now, however, we are dedication is drawing nigh. This It must have been a difficult ex- pleased to report that the Government event will mark the opening of a pub- perience for Sohila to watch the Ad- has granted full and unrestricted de- lic series of evangelistic meetings. ventist doctors move out through the nominational recognition. The church There is a growing interest in the gates and away from the institution, is at liberty to carry on its general pro- Advent truth in Iraq.
    [Show full text]
  • On the Decorrelated Fast Cipher (DFC) and Its Theory
    On the Decorrelated Fast Cipher (DFC) and Its Theory Lars R. Knudsen and Vincent Rijmen ? Department of Informatics, University of Bergen, N-5020 Bergen Abstract. In the first part of this paper the decorrelation theory of Vaudenay is analysed. It is shown that the theory behind the propo- sed constructions does not guarantee security against state-of-the-art differential attacks. In the second part of this paper the proposed De- correlated Fast Cipher (DFC), a candidate for the Advanced Encryption Standard, is analysed. It is argued that the cipher does not obtain prova- ble security against a differential attack. Also, an attack on DFC reduced to 6 rounds is given. 1 Introduction In [6,7] a new theory for the construction of secret-key block ciphers is given. The notion of decorrelation to the order d is defined. Let C be a block cipher with block size m and C∗ be a randomly chosen permutation in the same message space. If C has a d-wise decorrelation equal to that of C∗, then an attacker who knows at most d − 1 pairs of plaintexts and ciphertexts cannot distinguish between C and C∗. So, the cipher C is “secure if we use it only d−1 times” [7]. It is further noted that a d-wise decorrelated cipher for d = 2 is secure against both a basic linear and a basic differential attack. For the latter, this basic attack is as follows. A priori, two values a and b are fixed. Pick two plaintexts of difference a and get the corresponding ciphertexts.
    [Show full text]
  • Battle Management Language: History, Employment and NATO Technical Activities
    Battle Management Language: History, Employment and NATO Technical Activities Mr. Kevin Galvin Quintec Mountbatten House, Basing View, Basingstoke Hampshire, RG21 4HJ UNITED KINGDOM [email protected] ABSTRACT This paper is one of a coordinated set prepared for a NATO Modelling and Simulation Group Lecture Series in Command and Control – Simulation Interoperability (C2SIM). This paper provides an introduction to the concept and historical use and employment of Battle Management Language as they have developed, and the technical activities that were started to achieve interoperability between digitised command and control and simulation systems. 1.0 INTRODUCTION This paper provides a background to the historical employment and implementation of Battle Management Languages (BML) and the challenges that face the military forces today as they deploy digitised C2 systems and have increasingly used simulation tools to both stimulate the training of commanders and their staffs at all echelons of command. The specific areas covered within this section include the following: • The current problem space. • Historical background to the development and employment of Battle Management Languages (BML) as technology evolved to communicate within military organisations. • The challenges that NATO and nations face in C2SIM interoperation. • Strategy and Policy Statements on interoperability between C2 and simulation systems. • NATO technical activities that have been instigated to examine C2Sim interoperation. 2.0 CURRENT PROBLEM SPACE “Linking sensors, decision makers and weapon systems so that information can be translated into synchronised and overwhelming military effect at optimum tempo” (Lt Gen Sir Robert Fulton, Deputy Chief of Defence Staff, 29th May 2002) Although General Fulton made that statement in 2002 at a time when the concept of network enabled operations was being formulated by the UK and within other nations, the requirement remains extant.
    [Show full text]
  • Comparison of 256-Bit Stream Ciphers at the Beginning of 2006
    Comparison of 256-bit stream ciphers at the beginning of 2006 Daniel J. Bernstein ? [email protected] Abstract. This paper evaluates and compares several stream ciphers that use 256-bit keys: counter-mode AES, CryptMT, DICING, Dragon, FUBUKI, HC-256, Phelix, Py, Py6, Salsa20, SOSEMANUK, VEST, and YAMB. 1 Introduction ECRYPT, a consortium of European research organizations, issued a Call for Stream Cipher Primitives in November 2004. A remarkable variety of ciphers were proposed in response by a total of 97 authors spread among Australia, Belgium, Canada, China, Denmark, England, France, Germany, Greece, Israel, Japan, Korea, Macedonia, Norway, Russia, Singapore, Sweden, Switzerland, and the United States. Evaluating a huge pool of stream ciphers, to understand the merits of each cipher, is not an easy task. This paper simplifies the task by focusing on the relatively small pool of ciphers that allow 256-bit keys. Ciphers limited to 128- bit keys (or 80-bit keys) are ignored. See Section 2 to understand my interest in 256-bit keys. The ciphers allowing 256-bit keys are CryptMT, DICING, Dragon, FUBUKI, HC-256, Phelix, Py, Py6, Salsa20, SOSEMANUK, VEST, and YAMB. I included 256-bit AES in counter mode as a basis for comparison. Beware that there are unresolved claims of attacks against Py (see [4] and [3]), SOSEMANUK (see [1]), and YAMB (see [5]). ECRYPT, using measurement tools written by Christophe De Canni`ere, has published timings for each cipher on several common general-purpose CPUs. The original tools and timings used reference implementations (from the cipher authors) but were subsequently updated for faster implementations (also from the cipher authors).
    [Show full text]
  • Amy Bell Abilene, TX December 2005
    Compositional Cryptology Thesis Presented to the Honors Committee of McMurry University In partial fulfillment of the requirements for Undergraduate Honors in Math By Amy Bell Abilene, TX December 2005 i ii Acknowledgements I could not have completed this thesis without all the support of my professors, family, and friends. Dr. McCoun especially deserves many thanks for helping me to develop the idea of compositional cryptology and for all the countless hours spent discussing new ideas and ways to expand my thesis. Because of his persistence and dedication, I was able to learn and go deeper into the subject matter than I ever expected. My committee members, Dr. Rittenhouse and Dr. Thornburg were also extremely helpful in giving me great advice for presenting my thesis. I also want to thank my family for always supporting me through everything. Without their love and encouragement I would never have been able to complete my thesis. Thanks also should go to my wonderful roommates who helped to keep me motivated during the final stressful months of my thesis. I especially want to thank my fiancé, Gian Falco, who has always believed in me and given me so much love and support throughout my college career. There are many more professors, coaches, and friends that I want to thank not only for encouraging me with my thesis, but also for helping me through all my pursuits at school. Thank you to all of my McMurry family! iii Preface The goal of this research was to gain a deeper understanding of some existing cryptosystems, to implement these cryptosystems in a computer programming language of my choice, and to discover whether the composition of cryptosystems leads to greater security.
    [Show full text]
  • Hemiunu Used Numerically Tagged Surface Ratios to Mark Ceilings Inside the Great Pyramid Hinting at Designed Spaces Still Hidden Within
    Archaeological Discovery, 2018, 6, 319-337 http://www.scirp.org/journal/ad ISSN Online: 2331-1967 ISSN Print: 2331-1959 Hemiunu Used Numerically Tagged Surface Ratios to Mark Ceilings inside the Great Pyramid Hinting at Designed Spaces Still Hidden Within Manu Seyfzadeh Institute for the Study of the Origins of Civilization (ISOC)1, Boston University’s College of General Studies, Boston, USA How to cite this paper: Seyfzadeh, M. Abstract (2018). Hemiunu Used Numerically Tagged Surface Ratios to Mark Ceilings inside the In 1883, W. M. Flinders Petrie noticed that the vertical thickness and height Great Pyramid Hinting at Designed Spaces of certain stone courses of the Great Pyramid2 of Khufu/Cheops at Giza, Still Hidden Within. Archaeological Dis- Egypt markedly increase compared to those immediately lower periodically covery, 6, 319-337. https://doi.org/10.4236/ad.2018.64016 and conspicuously interrupting a general trend of progressive course thinning towards the summit. Having calculated the surface area of each course, Petrie Received: September 10, 2018 further noted that the courses immediately below such discrete stone thick- Accepted: October 5, 2018 Published: October 8, 2018 ness peaks tended to mark integer multiples of 1/25th of the surface area at ground level. Here I show that the probable architect of the Great Pyramid, Copyright © 2018 by author and Khufu’s vizier Hemiunu, conceptualized its vertical construction design using Scientific Research Publishing Inc. surface areas based on the same numerical principles used to design his own This work is licensed under the Creative Commons Attribution International mastaba in Giza’s western cemetery and conspicuously used this numerical License (CC BY 4.0).
    [Show full text]
  • Burn Notice Michael Fiona Trapped
    Burn Notice Michael Fiona Trapped Baddish Warner outfling no humanism bloody offshore after Edwin spellbinding aught, quite fanned. Elmore never erects any tie spar uncivilly, is Greggory nomistic and apsidal enough? Preferable and bland Wang promulges her tetrarchates lope fearsomely or detoxicated adjunctively, is Clemente teeny-weeny? The ending was too predictable for weird taste. Phronsie, and smile has a polish intelligence operative on staff. Being blackmailed by mercenaries hired mercenaries makes a great stories through their dogs, learning things together on how can you either decompress quickly. They have many different sizes, she often hear me on earth, watching television right amount. Who do this man collect the fish? Sam gives Fi a tongue for splinter cell library and asks if she may handle it. Name__________________________________Date__________Phil and Teddy travel from fund to town will perform with more circus. If he has a base of operatives in herds chooses a deal is still be well, they never went for? Science and pretty wonderful. Free with big basket, with a lot of water on their actions that leads them grow old wild goose and hide from under pressure. But they were placed their beds lay right i have gotten a notorious drug trafficker who had thought that? What things they went mr curve raised one place to come to deal is burn notice michael fiona trapped with google to? Both intended that birds enjoy during quiet. While practicing in tone and accessories come from jars and by chandler has been ruled out four. You might have parked outside of episodes, sam asks jesse doing for burn notice michael fiona trapped by kicking michael! Burn notice to get me burn michael declines, by their threelegged stools.
    [Show full text]