96 research outputs found

    Secure Volunteer Computing for Distributed Cryptanalysis

    Get PDF
    Zugleich: Dissertation, Universität Kassel, 201

    Two Encrypted Diplomatic Letters Sent by Jan Chodkiewicz to Emperor Maximilian II in 1574-1575

    Get PDF
    This paper presents the work on two encrypted diplomatic letters sent by the Lithuanian nobleman Jan Chodkiewicz to emperor Maximilian II in 1574 and 1575. It describes the decipherment process as well as the content and the context of the letters. Furthermore, it provides linguistic aspects of the used plaintext language. It continues our previous work on Habsburg ciphers where we analyzed and contextualized three diplomatic letters sent by Maximilian II. All presented and analyzed letters relate to the Polish-Lithuanian election in 1575, where Maximilian II, his son Ernst, and his brother Ferdinand were amongst the candidates. The deciphered German plaintexts of all five letters can be accessed via the DECODE database, a storage for historical encrypted manuscripts, which is maintained by members of the DECRYPT project

    Island Ramanacoil a Bridge too Far. A Dutch Ciphertext from 1674

    Get PDF
    The deciphered Ramanacoil ciphertext reveals two Dutch East India Company letters, from 1674 that are, in retrospect, already known in the National Archives as plaintext letters. The letters are written in Dutch. We have been able to relate them. The first letter, from Van Goens senior from Sri Lanka to the Lords Seventeen in The Netherlands, was most important to the sender. He sent his personal secretary Leeuwenson overland with the ciphertext in his pocket and its key in his head. And with additional oral information that had to be delivered in person. Van Goens senior requested to conquer the whole of Sri Lanka, the island Ramanacoil and coastal area around it along with 1,000 more soldiers. This paper shows that by sending Leeuwenson, Van Goens senior wanted to repeat his most successful ‘Vertoog’ from 1655. Substantiate his strategic goals and get approval for them from the Lords Seventeen. In 1655 he got a ‘Go!’ and twenty years later in 1675 he got a ‘No!’. The zeitgeist of expansion had changed. Ramanacoil was a bridge too far

    A Massive Machine-Learning Approach For Classical Cipher Type Detection Using Feature Engineering

    Get PDF
    Cryptanalysis of enciphered documents typically starts with identifying the cipher type. A large number of encrypted historical documents exists, whose decryption can potentially increase the knowledge of historical events. This paper investigates whether machine learning can support the cipher type classification task when only ciphertexts are given. A selection of engineered features for historical ciphertexts and various machine-learning classifiers have been applied for 56 different cipher types specified by the American Cryptogram Association. Different neuronal network models were empirically evaluated. Our best-performing model achieved an accuracy of 80.24% which improves the current state of the art by 37%. Accuracy is calculated by dividing the total number of samples by the number of true positive predictions. The software-suite is published under the name ”Neural Cipher Identifier (NCID)”

    Evaluating GPT-4’s Proficiency in Addressing Cryptography Examinations

    Get PDF
    In the rapidly advancing domain of artificial intelligence, ChatGPT, powered by the GPT-4 model, has emerged as a state-of-the-art interactive agent, exhibiting substantial capabilities across various domains. This paper aims to assess the efficacy of GPT-4 in addressing and solving problems found within cryptographic examinations. We devised a multi-faceted methodology, presenting the model with a series of cryptographic questions of varying complexities derived from real academic examinations. Our evaluation encompasses both classical and modern cryptographic challenges, focusing on the model\u27s ability to understand, interpret, and generate correct solutions while discerning its limitations. The model was challenged with a spectrum of cryptographic tasks, earning 201 out of 208 points by solving fundamental queries inspired by an oral exam, 80.5 out of 90 points on a written Crypto 1 exam, and 287 out of 385 points on advanced exercises from the Crypto 2 course. The results demonstrate that while GPT-4 shows significant promise in grasping fundamental cryptographic concepts and techniques, certain intricate problems necessitate domain-specific knowledge that may sometimes lie beyond the model\u27s general training. Insights from this study can provide educators, researchers, and examiners with a deeper understanding of how cutting-edge AI models can be both an asset and a potential concern in academic settings related to cryptology. To enhance the clarity and coherence of our work, we utilized ChatGPT-4 to help us in formulating sentences in this paper

    Evaluating Deep Learning Techniques for Known-Plaintext Attacks on the Complete Columnar Transposition Cipher

    Get PDF
    This paper examines whether deep neural networks (DNN) can learn knownplaintext attacks on plaintext-ciphertextpairs, that were created by encrypting with complete columnar transposition. We propose a new algorithm that extends pure DNN-based prediction with additional post-processing steps to further enhance key prediction quality. Our approach is easily extensible and currently supports key lengths from 2 to 20 characters. Each key length has been empirically evaluated with plain-/ciphertextpairs of different lengths. For plain- and ciphertexts with a length of five times the key length, our algorithm achieves a success rate of 96% which is, to the best of our knowledge, a new state of the art on deep-learning-based known-plaintext attacks against columnar transposition

    Deciphering three diplomatic letters sent by Maximilian II in 1575

    No full text
    This article presents three newly rediscovered encrypted Habsburg letters that were sent by Maximilian II to his Polish delegates in 1575. We describe the process of deciphering and the principles and peculiarities of the cipher from a cryptographic perspective. Furthermore, content and historical and linguistic context of the letters are explained. The records are held at the Österreichisches Haus-, Hof- und Staatsarchiv and were collected and deciphered in the context of the interdisciplinary and international research project “DECRYPT – Decryption of historical manuscripts”. For cryptanalysis the open-source e-learning program CrypTool 2 was used. The article is the result of a joint effort of a computer scientist and a historical linguist

    Decipherment of a German encrypted letter sent from Sigismund Heusner von Wandersleben to Axel Oxenstierna in 1637

    No full text
    We present our work on an encrypted letter from the Thirty Years’ War written by the ally of the Swedish Empire, Sigismund Heusner von Wandersleben in 1637 and sent from Kassel to the Swedish High Lord Chancellor Axel Oxenstierna. We describe our analysis of the ciphertext including information on the cipher type, the process of cryptanalysis and challenges for the decipherment. We include the edition of the letter in the current state of decipherment and summarize its content

    Send someone to finish Fredenburgh’s works. A Dutch ciphertext (1689) from Suriname

    No full text
    A ciphertext without its corresponding key was found in the archives from the Dutch colony Suriname, in the National Archives at The Hague. We were able to decrypt it through cryptanalysis and with the use of CrypTool2. The revealed plaintext contains a letter with military sensitive information and the name of Fredenburgh, who served as Governor ad interim from 1688 to 1689. It was sent in May 1689 by Governor Van Scharphuijsen to his directors in Amsterdam. Since 1689, the Society of Suriname (SvS) used ciphers for its militarily sensitive information. Ciphertext U3 was sent during the Nine Years’ War (1688-1697) when the Dutch were at war with the French. The letter was encrypted as a precaution against possible interception by the (French) enemy

    Decipherment of an Encrypted Letter from 1724 Found in UCL Special Collections’ Brougham Archive

    No full text
    This paper shows the decipherment of a 1724 encrypted letter, discovered recently in the Brougham Archive at University College London (UCL) Special Collections. The letter’s content hints at political intrigue and possibly relates to the Jacobite movement during George I’s reign in Great Britain. However, as all individuals mentioned in the letter are referred to bycode names, except for Madame de Prie, their true identities remain unknown to the authors. Therefore, any connection to the Jacobites remains speculative. The paper covers the cipher’s security, historical context, and unresolved inquiries surrounding the letter
    corecore