scispace - formally typeset
Search or ask a question

Showing papers in "Cryptologia in 2009"


Journal ArticleDOI
TL;DR: The method involves the administration of an NADPH-oxidase inhibitor in an amount sufficient to treat the cell, tissue, organ or animal for reperfusion injury prophylactically or therapeutically.
Abstract: The present invention is directed to a method for the prophylactic and therapeutic treatment of reperfusion injury or injury due to a distal reperfusion. The method involves the administration of an NADPH-oxidase inhibitor to a cell, tissue, organ or animal in an amount sufficient to treat the cell, tissue, organ or animal for reperfusion injury prophylactically or therapeutically. The NADPH-oxidase inhibitor preferably is an o-methoxycatechol, or a pharmaceutically acceptable salt, derivative, dimer or prodrug thereof. Most preferably, the o-methoxycatechol is apocynin.

102 citations


Journal ArticleDOI
TL;DR: The security of Skipjack is revisited, in particular its resistance to advanced differential-style and related-key distinguishers that were most likely not considered in the original design objectives of the NSA, and first-known related-keys impossible differential, rectangle andrelated-key rectangle distinguishers are constructed.
Abstract: Skipjack is a block cipher designed by the NSA for use in US government phones, and commercial mobile and wireless products by ATT the only one publicly known to date.

48 citations


Journal ArticleDOI
TL;DR: The main objective of this paper is to highlight some of the major security and application issues confronting trusted computing technology, present in a large proportion of new PCs and incorporating a wide range of cryptographic functionality.
Abstract: The main objective of this paper is to highlight some of the major security and application issues confronting trusted computing technology. This technology—now present in a large proportion of new PCs and incorporating a wide range of cryptographic functionality—has the potential to have a major practical impact, but it has not been widely discussed. This paper is an attempt to encourage greater debate about this technology and its possible implications. Following a brief introduction to the history of trusted computing, we provide a summary of its main features. This leads naturally to a consideration of the issues that may impede its use, including potential problems with its cryptographic components. Possible applications of the technology are then discussed.

31 citations


Journal ArticleDOI
TL;DR: A method for solving substitution ciphers using low-order letter n-gram models that enforces global constraints using integer programming, and it guarantees that no decipherment key is overlooked.
Abstract: We introduce a method for solving substitution ciphers using low-order letter n-gram models. This method enforces global constraints using integer programming, and it guarantees that no decipherment key is overlooked. We carry out extensive empirical experiments showing how decipherment accuracy varies as a function of cipher length and n-gram order. We also make an empirical investigation of Shannon's [12] theory of uncertainty in decipherment.

21 citations


Journal ArticleDOI
TL;DR: Algebraic cryptanalysis is a technique that uses modern equation solvers to attack cryptographic algorithms to attack simplified AES.
Abstract: Simplified AES was developed in 2003, as a teaching tool to help students understand AES. It was designed so that the two primary attacks on symmetric-key block ciphers of that time, differential cryptanalysis and linear cryptanalysis, are not trivial on simplified AES. Algebraic cryptanalysis is a technique that uses modern equation solvers to attack cryptographic algorithms. We will use algebraic cryptanalysis to attack simplified AES.

21 citations


Journal ArticleDOI
TL;DR: The evidence encountered so far supports the view that the hypothesis cannot be true for all the KRR text of the ‘SS,’ specifically for sequences other than the “XıYZ” type, leaving many doubts in the minds of epigraphers and suggesting flaws in the method of decipherment.
Abstract: This paper deals with the distributional analysis of a recurring pattern on the Easter Island artifact known as the 'Santiago Staff' ('SS' from now on). It has been claimed that the pattern known as “XiYZ,” arguably to be found in a repetitive fashion in a “recital of pairings,” conveys a model of procreation in line with the Old Rapanui sacral chants, thus giving a clue to a possible decipherment of the SS's document. According to Steven R. Fischer, the scholar who retrieved the pattern in question, the formula “XiYZ” consists of, “X”: the “copulator” God, “i”: the superlinear corresponding to the old Rapanui phrase “copulated with,” “Y”: the “copulatee” Goddess and finally, “Z”: the issue of their “copulation.” Under this assumption, and bearing in mind that Fischer did not offer any sort of count with regard to his claim, the structure “XiYZ” has been tested and replicated to “Atua-Mata-Riri,” viewed by some researchers to be a bilingual for the understanding of the alleged schematized pattern. The evidence encountered so far supports the view that the hypothesis cannot be true for all the KRR text of the 'SS,' specifically for sequences other than the “XiYZ” type, leaving many doubts in the minds of epigraphers and suggesting flaws in the method of decipherment. To the most evident degree, the message encrypted in the 'SS,' i.e., text I, is still resisting decoding by the scholars.

17 citations


Journal ArticleDOI
TL;DR: The evolution of the Arabic cryptologic treatises discovered in Istanbul's Süleymaniye library is presented, linking its various phases to the greater bureaucratic trends of the regimes which produced these treatises.
Abstract: This article presents the evolution of the Arabic cryptologic treatises discovered in Istanbul's Suleymaniye library, linking its various phases to the greater bureaucratic trends of the regimes which produced these treatises.

8 citations


Journal ArticleDOI
TL;DR: This book describes the actions of the 9=11 terrorists prior to the attacks and points out the lack of cooperation between the NSA and the FBI that, perhaps, led to the failure of the government to stop the plot.
Abstract: Bamford, James; The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America, 2008, Doubleday, New York, 416 pages, hardcover, $27.95. The Spy Factory: The National Security A...

7 citations


Journal ArticleDOI
TL;DR: A new forgery attack is constructed and it is shown that Kim-Jeon-Yoo schemes are not secure under the authors' attack.
Abstract: Password authentication is a type of authentication protocol for communications over an insecure network. Recently, Kim, Jeon, and Yoo gave an improvement of Yang-Shieh password authentication schemes to resist an existing forgery attack. However, in this paper, we construct a new forgery attack and show that Kim-Jeon-Yoo schemes are not secure under our attack.

7 citations


Journal ArticleDOI
TL;DR: Modifications to the Prêt à Voter and PunchScan schemes are described so that a voter who can either see or hear, or both, independent of marking ability, may avail of voter-verifiability without revealing her vote.
Abstract: All voter-verifiable voting schemes in the literature require that the voter be able to see and to mark. This paper describes modifications to the Pret a Voter and PunchScan schemes so that a voter who can either see or hear, or both, independent of marking ability, may avail of voter-verifiability without revealing her vote. The modified systems would provide privacy and integrity guarantees that are currently available only to voters who can both see and mark.

7 citations


Journal ArticleDOI
TL;DR: The procedure executed on the Polish Bomba Kryptologiczna is reconstructed on the basis of Marian Rejewski's accounts and simulative experiment and the circuitry of a simplified version of the bomba presented.
Abstract: The procedure executed on the Polish Bomba Kryptologiczna is reconstructed on the basis of Marian Rejewski's accounts and simulative experiment. An original Wehrmacht message from the period in question is broken to illustrate the effectiveness of the hardware and the routines employed. The authenticity of the indicators given in Rejewski's first and later reports is investigated and the circuitry of a simplified version of the bomba presented.

Journal ArticleDOI
TL;DR: A stylometric analysis of Yardley's novels is presented and evidence on the identity of the author(s) of each is given and it is given that at least some of his fiction was written in collaboration with Carl H. Grabo.
Abstract: One of Herbert O. Yardley's many careers was as a writer of short stories and novels of international intrigue. It is widely accepted [12] that Yardley wrote at least some of his fiction in collaboration with Carl H. Grabo, a professor of English at the University of Chicago. What is not completely known is which of Yardley's novels are predominantly Grabo, and which might be predominantly Yardley. This article presents a stylometric analysis of Yardley's novels and gives evidence on the identity of the author(s) of each.

Journal ArticleDOI
TL;DR: Using audio-visual plaintext has the added benefit of more clearly revealing the strengths and weaknesses of classical ciphers since images and sounds are much more error-tolerant than text.
Abstract: Classical ciphers are typically applied to English text, but they can also be used to encrypt images and sound files to add an audio-visual component to cryptology courses that is appealing to both mathematical and general audiences. Using audio-visual plaintext has the added benefit of more clearly revealing the strengths and weaknesses of classical ciphers since images and sounds are much more error-tolerant than text. Finally, we introduce ECrypt, a free program that makes it easy for everyone to encrypt image and sound files.

Journal ArticleDOI
TL;DR: This paper presents a better scoring system for cryptanalysis based on the goodness-of-fit statistics and shows how to apply ciphertext-only attacks to the Hill cipher without knowing the numeric equivalents of the letters of the plaintexts.
Abstract: The Hill cipher, also known as matrix encryption, is a polygraphic substitution cipher, developed by the mathematician Lester S. Hill in 1929. While various attacks had been known on the Hill cipher, the ciphertext-only attack without assumptions about the encryption matrix or probable plaintext words was introduced only recently by Bauer and Millward. They obtained high efficiency of attack by recovering the decryption matrix row by row rather than all rows at once. In this paper, we extend their ciphertext-only attack in two ways. First, we present a better scoring system for cryptanalysis based on the goodness-of-fit statistics. Specifically, we reduce the average number of candidate rows from 24.83 to 7.00 for 3 × 3 matrix and from 4027.78 to 1220.38 for 4 × 4 matrix. Second, we show how to apply our attacks to the Hill cipher without knowing the numeric equivalents of the letters of the plaintexts.

Journal ArticleDOI
TL;DR: The mathematician-to-be was assigned the task of examining the security of Enigma, but he could not foresee that the Allies had long since been taking advantage of these weaknesses.
Abstract: In World War II, Prof. Dr. Gisbert Hasenjaeger (1919–2006), was the youngest employee of the coding department of the High Command of the German Armed Forces (OKW/Chi). The mathematician-to-be was assigned the task of examining the security of Enigma. He detected weak points, but he could not foresee that the Allies had long since been taking advantage of these weaknesses.

Journal ArticleDOI
TL;DR: A former communist Polish SIGINT document suggests that messages encrypted with Hagelin CX–52 machines were read by the Poles during the 1960s.
Abstract: A former communist Polish SIGINT document suggests that messages encrypted with Hagelin CX–52 machines were read by the Poles during the 1960s.

Journal ArticleDOI
TL;DR: This paper presents an example of how to introduce the topic of zero-knowledge protocols as an interactive classroom activity to an undergraduate mathematics class in a way that sets the stage for discussing several important topics of concern in this and other modern cryptographic applications.
Abstract: From the simple example of Ali Baba proving he knows a magic word to complex digital signature schemes, the ideas behind zero-knowledge protocols can be used as fun cryptographic examples for undergraduate students at different levels. In this paper, I present an example of how to introduce the topic as an interactive classroom activity to an undergraduate mathematics class in a way that sets the stage for discussing several important topics of concern in this and other modern cryptographic applications.

Journal ArticleDOI
TL;DR: This paper explores the use of Maple worksheets in a course on modern cryptography for undergraduate sophomores and juniors, and the author's evaluation of the Use of computer algebra in teaching cryptography.
Abstract: This paper explores the use of Maple worksheets in a course on modern cryptography for undergraduate sophomores and juniors. The worksheets allow students to explore deep topics without requiring many prerequisites. A sample worksheet, where students examine the effectiveness of the Fermat test is considered in some detail, and a sample list of other explorations done by the students is given. The paper concludes with the author's evaluation of the use of computer algebra in teaching cryptography.

Journal ArticleDOI
TL;DR: The role of code-breaking, in particular the decryption of secret signals transmitted by German Enigma machines, is the focus of Roy Nesbit’s fascinating new account of The Battle of the Atlantic.
Abstract: Keeping the Atlantic sea-lanes open was a vital factor in the fight against Nazi Germany. The story of the extraordinary measures that were taken to combat the [U-boat threat] has often been told. But there is one crucial element in this prolonged campaign that has still not been fully appreciated – the role of code-breaking, in particular the decryption of secret signals transmitted by German Enigma machines. And this is the focus of Roy Nesbit’s fascinating new account of The Battle of the Atlantic.

Journal ArticleDOI
TL;DR: Lipid lowering dosage units, to be used once a day, produce minimal side effects and contain a combination of microspheres formulated to co-deliver a HMG-CoA reductase inhibitor component and a niacin component.
Abstract: Lipid lowering dosage units, to be used once a day, produce minimal side effects. They contain a combination of microspheres formulated to co-deliver a HMG-CoA reductase inhibitor component and a niacin component.

Journal ArticleDOI
TL;DR: It is demonstrated that the cryptographic hash function Codefish is insecure for cryptographic applications by presenting practical attacks for solving the problems Second Preimage and Collision.
Abstract: The cryptographic hash function Codefish is an outcome of a research project led by the company KRIPTO Research and the University of Debrecen in Hungary and sponsored by the European Union and the Hungarian Government. It is commercialised by KRIPTO Research for use in security protocols like digital signature, authentication, or message checksum. Codefish benefits from strong mathematical foundations, since it grounds its security on the difficulty of solving norm form equations. This paper demonstrates that it is insecure for cryptographic applications by presenting practical attacks for solving the problems Second Preimage and Collision.

Journal ArticleDOI
TL;DR: The inventive methods and compositions overcome numerous problems in the art by enabling the efficient recycling of coated polymer articles whereby clear and/or colorless recycled polymers may be obtained.
Abstract: So begins the first contribution (by Bernstein) to Bernstein-Buchmann-Dahmen Post-Quantum Cryptography. Bernstein continues: Imagine that it's fifteen years from now and someone announces the succe...

Journal ArticleDOI
TL;DR: There are no books, good or bad, on cryptanalysis; a student simply has to break algorithm after algorithm, inventing new techniques and modifying existing ones, and the only way to learn cryptanalysis is through practice.
Abstract: In 2000, Bruce Schneier, responding to requests for him to recommend a book on cryptanalysis, wrote “A Self-Study Course in Block-Cipher Cryptanalysis [4].” In his introduction, Schneier's response...

Journal ArticleDOI
TL;DR: How William F. Friedman, unbeknownst to Candela, persuaded Columbia University Press not to Publish his book, The Military Cipher of Commandant Bazeries, their subsequent correspondence, and much more are revealed.
Abstract: How William F. Friedman, unbeknownst to Candela, persuaded Columbia University Press not to Publish his book, The Military Cipher of Commandant Bazeries, their subsequent correspondence, and much more.

Journal ArticleDOI
TL;DR: A Cold War spy case involving a Bulgarian national according to the documents preserved at the Polish Institute of National Remembrance is discussed, which details the modus operandi of both the US and Eastern Block secret services and the mistakes committed by both parties, which led to an agent's disclosure.
Abstract: The article discusses a Cold War spy case involving a Bulgarian national according to the documents preserved at the Polish Institute of National Remembrance. It details the modus operandi of both the US and Eastern Block secret services and the mistakes committed by both parties, which led to an agent's disclosure. The article also details measures and conclusions drawn by the Eastern Block services in the aftermath of the case.

Journal ArticleDOI
TL;DR: The true identity of Joaquín García Carmona, the famous Spanish cryptologist, author Treaty of Cryptography with Special Application to the Army, is revealed in this paper and biographical details are provided.
Abstract: The true identity of Joaquin Garcia Carmona, the famous Spanish cryptologist, author Treaty of Cryptography with Special Application to the Army, is revealed in this paper and biographical details are provided.

Journal ArticleDOI
TL;DR: Neal Koblitz is co-inventor of elliptic curve cryptosystems, and has written two books and several articles on applications of number theory in cryptography.
Abstract: Neal Koblitz received his PhD in 1974 from Princeton. His thesis and early research were concerned with arithmetic algebraic geometry and p-adic analysis. Since 1985 his main area of work has been in cryptography. He is co-inventor of elliptic curve cryptosystems, and has written two books and several articles on applications of number theory in cryptography. Along with his wife Ann, who directs a small foundation [The Kovaleskaia Fund] for women in science in developing countries, he travels widely in different parts of the world. Besides visiting universities and institutes, whenever possible he gives math enrichment classes. . . . [7, p. 326]

Journal ArticleDOI
TL;DR: It will be shown how other campuses can implement similar programs to engender an increased supply of students who are appreciative users of mathematics and comment on the positive career effect on undergraduate mathematics teaching majors employed as staff.
Abstract: During the last decade, the author has been privileged to run 8 years of Summer academies serving students aged 13-15 and focused on elementary cryptology as a hook for involving them in preparation for a future college career in the STEM (science, technology, engineering, or mathematical) disciplines. Students have been highly enthusiastic about this program and it has often had over 100 applicants for 60 spaces. These students learn the meaning of number congruences, and how to solve them algebraically. They use this knowledge to encrypt and decrypt messages using both the Euler Phi-function and the Chinese Remainder Theorem. They also prepare extensive reviews of possible collegiate futures for themselves, including both academic and financial planning for those futures. We will show how other campuses can implement similar programs to engender an increased supply of students who are appreciative users of mathematics. We also comment on the positive career effect on undergraduate mathematics teaching majors employed as staff.

Journal ArticleDOI
TL;DR: A book whose premise—looking for an unknown Shakespearean play—has all the possibilities of being dull, turns out to be a real page-turner.
Abstract: Eglin, Anthony. 2004. The Blue Rose. St. Martin's Press. 175 Fifth Avenue, New York, NY 10010. ISBN 0312328702. 304 pages. $23.95. Roses red and roses white Plucked I for my love's delight. She wou...

Journal ArticleDOI
TL;DR: Whether a final Saturday Evening Post article, Cryptograms and Their Solution, was, in fact, written by Herbert Yardley is examined.
Abstract: In 1931, Herbert Yardley published his best selling tell-all book The American Black Chamber (ABC). Preparatory to the publication of ABC, Yardley excerpted parts of the book in three Saturday Evening Post articles: Secret Inks, Codes, and Ciphers. During the same year, Yardley also published two more articles in Liberty Magazine, “Are We Giving Away Our State Secrets?” and “Double Crossing America”. Six months after the ABC was released, a final Saturday Evening Post article, Cryptograms and Their Solution, was published. This last article differs substantially in style from the other articles. This paper examines whether that article was, in fact, written by Herbert Yardley.