scispace - formally typeset
G

George Lasry

Researcher at University of Kassel

Publications -  22
Citations -  107

George Lasry is an academic researcher from University of Kassel. The author has contributed to research in topics: Cryptanalysis & Computer science. The author has an hindex of 5, co-authored 18 publications receiving 72 citations.

Papers
More filters
Journal ArticleDOI

Decryption of historical manuscripts: the DECRYPT project

TL;DR: The DECRYPT project is described, aiming at the creation of resources and tools for historical cryptology by bringing the expertise of various disciplines together for collecting data, exchanging methods for faster progress to transcribe, decrypt and contextualize historical encrypted manuscripts.
Journal ArticleDOI

Solving the Double Transposition Challenge with a Divide-and-Conquer Approach

TL;DR: The authors solve the challenge using a ciphertext-only hill climbing attack and a dictionary attack based on a “divide-and-conquer” approach and discuss the impact of their solutions with respect to the general security of the double transposition cipher.
Journal ArticleDOI

Cryptanalysis of columnar transposition cipher with long keys

TL;DR: This ciphertext-only method allows for the recovery of transposition keys with up to 1,000 elements, and up to 120 elements for worst case transposition rectangles, and is based on a two-phase hill climbing algorithm, aTwo-dimensional fitness score, and special transformations on key segments.
Journal ArticleDOI

Deciphering papal ciphers from the 16th to the 18th Century

TL;DR: How a large collection of original papal ciphertexts from the Vatican archives were obtained, transcribed, and how they were able to recover most of the keys, and to decipher the original plaintexts using novel cryptanalysis methods and the open-source e-learning CrypTool platform is described.
Journal ArticleDOI

Deciphering ADFGVX messages from the Eastern Front of World War I

TL;DR: The authors present a new computerized method for the ciphertext-only cryptanalysis of ADFGVX messages which they developed for that purpose and provide details on how all the keys were recovered and almost all the messages decrypted, despite the low quality of significant parts of the intercepted material.