Decrypted Secrets. Friedrich L. Bauer. Methods and Maxims of Cryptology. Fourth, Revised and Extended Edition

Size: px
Start display at page:

Download "Decrypted Secrets. Friedrich L. Bauer. Methods and Maxims of Cryptology. Fourth, Revised and Extended Edition"

Transcription

1 Decrypted Secrets

2 Friedrich L. Bauer Decrypted Secrets Methods and Maxims of Cryptology Fourth, Revised and Extended Edition With 191 Figures, 29 Tables, and 16 Color Plates 123

3 Dr. rer. nat. Dr. ès sc. h.c. Dr. rer. nat. h.c. mult. Friedrich L. Bauer Professor Emeritus of Mathematics and Computer Science Munich Institute of Technology Department of Computer Science Boltzmannstr Garching, Germany ACM Computing Classification (1998): E.3, D.4.6, K.6.5, E.4 Mathematics Subject Classification (1991): 94A60, 68P25 Library of Congress Control Number: ISBN Springer Berlin Heidelberg New York ISBN Springer Berlin Heidelberg New York ISBN rd ed. Springer Berlin Heidelberg New York This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilm or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable for prosecution under the German Copyright Law. Springer is a part of Springer Science+Business Media springer.com Springer-Verlag Berlin Heidelberg 1997, 2000, 2002, 2007 The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. Cover Design: Design & Concept E. Smejkal, Heidelberg Color Photos: Reinhard Krause, Deutsches Museum München Typesetting: By the author in TEX Production: LE-TEX, Jelonek, Schmidt & Vöckler GbR, Leipzig Printed on acid-free paper 33/3100 YL

4 Preface Towards the end of the 1960s, under the influence of the rapid development of microelectronics, electromechanical cryptological machines began to be replaced by electronic data encryption devices using large-scale integrated circuits. This promised more secure encryption at lower prices. Then, in 1976, Diffie and Hellman opened up the new cryptological field of public-key systems. Cryptography, hitherto cloaked in obscurity, was emerging into the public domain. Additionally, ENIGMA revelations awoke the public interest. Computer science was a flourishing new field, too, and computer scientists became interested in several aspects of cryptology. But many of them were not well enough informed about the centuries-long history of cryptology and the high level it had attained. I saw some people starting to reinvent the wheel, and others who had an incredibly naive belief in safe encryption, and I became worried about the commercial and scientific development of professional cryptology among computer scientists and about the unstable situation with respect to official security services. This prompted me to offer lectures on this subject at the Munich Institute of Technology. The first series of lectures in the winter term 1977/78, backed by the comprehensive and reliable book The Codebreakers (1967) by David Kahn, was held under the code name Special Problems of Information Theory and therefore attracted neither too many students nor too many suspicious people from outside the university. Next time, in the summer term of 1981, my lectures on the subject were announced under the open title Cryptology. This was seemingly the first publicly announced lecture series under this title at a German, if not indeed a Continental European, university. The series of lectures was repeated a few times, and in 1986/87 lecture notes were printed which finally developed into Part I of this book. Active interest on the side of the students led to a seminar on cryptanalytic methods in the summer term of 1988, from which Part II of the present book originated. The 1993 first edition (in German) of my book Kryptologie, although written mainly for computer science students, found lively interest also outside the field. It was reviewed favorably by some leading science journalists, and the publisher followed the study book edition with a 1995 hardcover edition under the title Entzifferte Geheimnisse [Decrypted Secrets], which gave me the opportunity to round out some subjects. Reviews in American journals recommended also an English version, which led in 1997 to the present book. It has become customary among cryptologists to explain how they became acquainted with the field. In my case, this was independent of the Second World War. In fact, I was never a member of any official service and I

5 VI Preface consider this my greatest advantage, since I am not bound by any pledge of secrecy. On the other hand, keeping eyes and ears open and reading between the lines, I learned a lot from conversations (where my scientific metier was a good starting point), although I never know exactly whether I am allowed to know what I happen to know. It all started in 1951, when I told my former professor of formal logic at Munich University, Wilhelm Britzelmayr, of my invention of an error-correcting code for teletype lines 1. This caused him to make a wrong association, and he gave me a copy of Sacco s book, which had just appeared 2. I was lucky, for it was the best book I could have encountered at that time although I didn t know that then. I devoured the book. Noticing this, my dear friend and colleague Paul August Mann, who was aware of my acquaintance with Shannon s redundancy-decreasing encoding, gave me a copy of the now-famous paper by Luigi Sacco ( ) Claude Shannon called Communication Theory of Secrecy Systems 3 (which in those days as a Bell Systems Technical Report was almost unavailable in Germany). I was fascinated by this background to Shannon s information theory, which I was already familiar with. This imprinted my interest in cryptology as a subfield of coding theory and formal languages theory, fields that held my academic interest for many years to come. Strange accidents or maybe sharper observation then brought me into contact with more and more people once close to cryptology, starting with Willi Jensen (Flensburg) in 1955, Karl Stein (Munich) in 1955, Hans Rohrbach, my colleague at Mainz University, in 1959, as well as Helmut Grunsky, Gisbert Hasenjäger, and Ernst Witt. In 1957, I became acquainted with Erich Hüttenhain (Bad Godesberg), but our discussions on the suitability of certain computers for cryptological work were in the circumstances limited by certain restrictions. Among the American and British colleagues in numerical analysis and computer science I had closer contact with, some had been involved with cryptology in the Second World War; but no one spoke about that, particularly not before 1974, the year when Winterbotham s book The Ultra Secret appeared. In 1976, I heard B. Randall and I. J. Good reveal some details about the Colossi in a symposium in Los Alamos. As a scienceoriented civilian member of the cryptology academia, my interest in cryptology was then and still is centered on computerized cryptanalysis. Other aspects of signals intelligence ( SIGINT ), for example, traffic analysis and direction finding, are beyond the scope of this book; the same holds for physical devices that screen electromechanical radiation emitted by cipher machines. 1 DBP No , application date January 21, Général Luigi Sacco, Manuel de Cryptographie. Payot, Paris Bell Systems Technical Journal 28, Oct. 1949, pp

6 Preface VII Cryptology is a discipline with an international touch and a particular terminology. It may therefore be helpful sometimes to give in this book some explanations of terms that originated in a language other than English. The first part of this book presents cryptographic methods. The second part covers cryptanalysis, above all the facts that are important for judging cryptographic methods and for saving the user from unexpected pitfalls. This follows from Kerckhoffs maxim: Only a cryptanalyst can judge the security of a cryptosystem. A theoretical course on cryptographic methods alone seems to me to be bloodless. But a course on cryptanalysis is problematic: Either it is not conclusive enough, in which case it is useless, or it is conclusive, but touches a sensitive area. There is little clearance in between. I have tried to cover at least all the essential facts that are in the open literature or can be deduced from it. No censorship took place. Certain difficulties are caused by the fact that governmental restrictions during and after World War II, such as the need to know rule and other gimmicks, misled even people who had been close to the centers of cryptanalysis. Examples include the concept of Banburismus and the concept of a cilli. The word Banburismus the name was coined in Britain was mentioned in 1985 by Deavours and Kruh in their book, but the method was only vaguely described. Likewise, the description Kahn gave in 1991 in his book is rather incomplete. On the other hand, in Kozaczuk s book of 1979 (English edition of 1984), Rejewski gave a description of Różycki s clock method, which turned out to be the same but most of the readers could not know of this connection. Then, in 1993, while giving a few more details on the method, Good (in Codebreakers ) confirmed that Banburism was an elaboration of... the clock method... [of]... Różycki. He also wrote that this elaboration was invented at least mainly by Turing, and referred to a sequential Bayesian process as the method of scoring. For lack of declassified concrete examples, the exposition in Sect of the present book, based on the recently published postwar notes of Alexander and of Mahon and articles by Erskine and by Noskwith in the recent book Action This Day, cannot yet be a fully satisfactory one. And as to cillies, even Gordon Welchman admitted that he had misinterpreted the origin of the word, thinking of silly. Other publications gave other speculations, see Sect. 19.7, fn. 29. Ralph Erskine, in Action This Day, based on the recently declassified Cryptanalytic Report on the Yellow Machine, 71-4 (NACP HCC Box 1009, Nr. 3175), gives the following summary of the method: Discovered by Dilly Knox in late January 1940, cillies reduced enormously the work involved in using the Zygalski sheets, and after 1 May, when the Zygalski sheets became useless, they became a vital part of breaking Enigma by hand during most of They were still valuable in Cillies resulted from a combination of two different mistakes in a multi-part message by some Enigma operators. The first was their practice of leaving the rotors untouched when they reached the end of some part of the message.

7 Since the letter count of each message part was included in the preamble, the message key of the preceding part could be calculated within fine limits. The second error was the use of non-random message keys stereotyped keyboard touches and 3-letter-acronyms. In combination, and in conjunction with the different turnover points of rotors I to V, they allowed one to determine which rotors could, and which could not, be in any given position in the machine. Although Banburismus and cillies were highly important in the war, it is hard to understand why Derek Taunt in 1993 was prevented by the British censor from telling the true story about cillies. Possibly, the same happened to Jack Good about Banburismus. *** My intellectual delight in cryptology found an application in the collection Informatik of the Deutsches Museum in Munich which I built up in , where there is a section on cryptological devices and machines. My thanks go to the Deutsches Museum for providing color plates of some of the pieces on exhibit there. And thanks go to my former students and co-workers in Munich, Manfred Broy, Herbert Ehler, and Anton Gerold for continuing support over the years, moreover to Hugh Casement for linguistic titbits, and to my late brotherin-law Alston S. Householder for enlightenment on my English. Karl Stein and Otto Leiberich gave me details on the ENIGMA story, and I had fruitful discussions and exchanges of letters with Ralph Erskine, Heinz Ulbricht, Tony Sale, Frode Weierud, Kjell-Ove Widman, Otto J. Horak, Gilbert Bloch, Arne Fransén, and Fritz-Rudolf Güntsch. Great help was given to me by Kirk H. Kirchhofer from Crypto AG, Zug (Switzerland). Hildegard Bauer-Vogg supplied translations of difficult Latin texts, Martin Bauer, Ulrich Bauer and Bernhard Bauer made calculations and drawings. Thanks go to all of them. The English version was greatly improved by J. Andrew Ross, with whom working was a pleasure. In particular, my sincere thanks go to David Kahn who encouraged me ( The book is an excellent one and deserves the widest circulation ) and made quite a number of proposals for improvements of the text. For the present edition, additional material that has been made public recently has been included, among others on Bletchley Park, the British attack on Tunny, Colossus and Max Newman s pioneering work. Moreover, my particular thanks go to Ralph Erskine who indefatigably provided me with a lot of additional information and checked some of the dates and wordings. In this respect, my thanks also go to Jack Copeland, Heinz Ulbricht, and Augusto Buonafalce. Finally, I have to thank once more Hans Wössner for a well functioning cooperation of long standing, and the new copy editor Ronan Nugent for very careful work. The publisher is to be thanked for the fine presentation of the book. And I shall be grateful to readers who are kind enough to let me know of errors and omissions. Grafrath, Spring 2006 F. L. Bauer

8 Contents Part I: Cryptography The People Introductory Synopsis Cryptography and Steganography Semagrams Open Code: Masking Cues Open Code: Veiling by Nulls Open Code: Veiling by Grilles Classification of Cryptographic Methods Aims and Methods of Cryptography The Nature of Cryptography Encryption Cryptosystems Polyphony Character Sets Keys Encryption Steps: Simple Substitution Case V (1) W (Unipartite Simple Substitutions) Special Case V V (Permutations) Case V (1) W m (Multipartite Simple Substitutions) The General Case V (1) W (m), Straddling Encryption Steps: Polygraphic Substitution and Coding Case V 2 W (m) (Digraphic Substitutions) Special Cases of Playfair and Delastelle: Tomographic Methods Case V 3 W (m) (Trigraphic Substitutions) The General Case V (n) W (m) : Codes Encryption Steps: Linear Substitution Self-reciprocal Linear Substitutions Homogeneous Linear Substitutions Binary Linear Substitutions General Linear Substitutions Decomposed Linear Substitutions... 87

9 X Contents 5.6 Decimated Alphabets Linear Substitutions with Decimal and Binary Numbers Encryption Steps: Transposition Simplest Methods Columnar Transpositions Anagrams Polyalphabetic Encryption: Families of Alphabets Iterated Substitutions Cyclically Shifted and Rotated Alphabets Rotor Crypto Machines Shifted Standard Alphabets: Vigenère and Beaufort Unrelated Alphabets Polyalphabetic Encryption: Keys Early Methods with Periodic Keys Double Key Vernam Encryption Quasi-nonperiodic Keys Machines that Generate Their Own Key Sequences Off-Line Forming of Key Sequences Nonperiodic Keys Individual, One-Time Keys Key Negotiation and Key Management Composition of Classes of Methods Group Property Superencryption Similarity of Encryption Methods Shannon s Pastry Dough Mixing Confusion and Diffusion by Arithmetical Operations DES and IDEA R Open Encryption Key Systems Symmetric and Asymmetric Encryption Methods One-Way Functions RSA Method Cryptanalytic Attack upon RSA Secrecy Versus Authentication Security of Public Key Systems Encryption Security Cryptographic Faults Maxims of Cryptology Shannon s Yardsticks Cryptology and Human Rights...226

10 Contents XI Part II: Cryptanalysis The Machinery Exhausting Combinatorial Complexity Monoalphabetic Simple Encryptions Monoalphabetic Polygraphic Encryptions Polyalphabetic Encryptions General Remarks on Combinatorial Complexity Cryptanalysis by Exhaustion Unicity Distance Practical Execution of Exhaustion Mechanizing the Exhaustion Anatomy of Language: Patterns Invariance of Repetition Patterns Exclusion of Encryption Methods Pattern Finding Finding of Polygraphic Patterns The Method of the Probable Word Automatic Exhaustion of the Instantiations of a Pattern Pangrams Polyalphabetic Case: Probable Words Non-Coincidence Exhaustion of Probable Word Position Binary Non-Coincidence Exhaustion The De Viaris Attack Zig-Zag Exhaustion of Probable Word Position The Method of Isomorphs A clever brute force method: EINSing Covert Plaintext-Cryptotext Compromise Anatomy of Language: Frequencies Exclusion of Encryption Methods Invariance of Partitions Intuitive Method: Frequency Profile Frequency Ordering Cliques and Matching of Partitions Optimal Matching Frequency of Multigrams The Combined Method of Frequency Matching Frequency Matching for Polygraphic Substitutions Free-Style Methods Unicity Distance Revisited Kappa and Chi Definition and Invariance of Kappa Definition and Invariance of Chi The Kappa-Chi Theorem The Kappa-Phi Theorem Symmetric Functions of Character Frequencies

11 XII Contents 17 Periodicity Examination The Kappa Test of Friedman Kappa Test for Multigrams Cryptanalysis by Machines: Searching for a period Kasiski Examination Building a Depth and Phi Test of Kullback Estimating the Period Length Alignment of Accompanying Alphabets Matching the Profile Aligning Against Known Alphabet Chi Test: Mutual Alignment of Accompanying Alphabets Reconstruction of the Primary Alphabet Kerckhoffs Symmetry of Position Stripping off Superencryption: Difference Method Decryption of Code Reconstruction of the Password Compromises Kerckhoffs Superimposition Superimposition for Encryptions with a Key Group COLOSSUS Adjustment in depth of Messages Cryptotext-Cryptotext Compromises Cryptotext-Cryptotext Compromise: ENIGMA Indicator Doubling Plaintext-Cryptotext Compromise: Feedback Cycle Linear Basis Analysis Reduction of Linear Polygraphic Substitutions Reconstruction of the Key Reconstruction of a Linear Shift Register Anagramming Transposition Double Columnar Transposition Multiple Anagramming Concluding Remarks Success in Breaking Mode of Operation of the Unauthorized Decryptor Illusory Security Importance of Cryptology Appendix: Axiomatic Information Theory Bibliography Index Photo Credits

12 List of Color Plates 4 Plate A Plate B Plate C The disk of Phaistos Brass cipher disks The Cryptograph of Wheatstone Plate D The US Army cylinder device M-94 Plate E Plate F The US strip device M-138-T4 The cipher machine of Kryha Plate G The Hagelin Cryptographer C-36 Plate H Plate I Plate K Plate L Plate M The US Army M-209, Hagelin licensed The cipher machine ENIGMA with four rotors Rotors of the ENIGMA The British rotor machine TYPEX Uhr box of the German Wehrmacht Plate N Cipher teletype machine Lorenz SZ 42 Plate O Plate P Plate Q Russian one-time pad Modern crypto board CRAY Supercomputers 4 In the middle of the book, following page 232.

13 Leone Battista Alberti ( ) Father of Western Cryptology (David Kahn)

CS408 Cryptography & Internet Security

CS408 Cryptography & Internet Security CS408 Cryptography & Internet Security Lecture 4: Rotor Machines Enigma Reza Curtmola Department of Computer Science / NJIT How to move from pencil and paper to more automatic ways of encrypting and decrypting?

More information

Breaking the Enigma. Dmitri Gabbasov. June 2, 2015

Breaking the Enigma. Dmitri Gabbasov. June 2, 2015 Breaking the Enigma Dmitri Gabbasov June 2, 2015 1 Introduction Enigma was an electro-mechanical machine that was used before and during the World War II by Germany to encrypt and decrypt secret messages.

More information

EATCS Monographs on Theoretical Computer Science

EATCS Monographs on Theoretical Computer Science EATCS Monographs on Theoretical Computer Science Volume 23 Editors: W. Brauer G. Rozenberg A. Salomaa Advisory Board: G.Ausiello M.Broy S.Even IHartmanis N.Jones T. Leighton M.Nivat C. Papadimitriou D.

More information

Communicating Science

Communicating Science Communicating Science Pierre Laszlo Communicating Science A Practical Guide 123 Prof. Pierre Laszlo Cloud s Rest Prades F-12320 Senergues France DOI 10.1007/75951 ISBN-10 3-540-31919-0 Springer Berlin

More information

Most people familiar with codes and cryptography have at least heard of the German

Most people familiar with codes and cryptography have at least heard of the German Hunt 1 John Hunt Professor Derek Bruff FYWS Cryptography 28 October 2010 Most people familiar with codes and cryptography have at least heard of the German Enigma Machines. However, very few people have

More information

Texts in Theoretical Computer Science An EATCS Series

Texts in Theoretical Computer Science An EATCS Series Texts in Theoretical Computer Science An EATCS Series Editors: W. Brauer G. Rozenberg A. Salomaa Advisory Board: G. Ausiello M. Broy S. Even J. Hartmanis N. Jones T. Leighton M. Nivat C. Papadimitriou

More information

Zdravko Cvetkovski. Inequalities. Theorems, Techniques and Selected Problems

Zdravko Cvetkovski. Inequalities. Theorems, Techniques and Selected Problems Inequalities Zdravko Cvetkovski Inequalities Theorems, Techniques and Selected Problems Dipl. Math. Zdravko Cvetkovski Informatics Department European University-Republic of Macedonia Skopje, Macedonia

More information

Substitution cipher. Contents

Substitution cipher. Contents Substitution cipher In cryptography, a substitution cipher is a method of encryption by which units of plaintext are replaced with ciphertext according to a regular system; the "units" may be single letters

More information

An Introduction to Cryptography

An Introduction to Cryptography An Introduction to http://www.southernct.edu/~fields/ Terminology is the study of secret writing. This is the only branch of mathematics to be designated by the U.S. government as export-controlled. Cryptographic

More information

The Sound of Silence

The Sound of Silence The Sound of Silence Burkhard Vogel The Sound of Silence Lowest-Noise RIAA Phono-Amps: Designer s Guide 123 Dipl.-Ing. Burkhard Vogel BUVOCON-Burkhard Vogel Consult GmbH 70180 Stuttgart, Germany ISBN 978-3-540-76883-8

More information

Paul M. Gauthier. Lectures on Several Complex

Paul M. Gauthier. Lectures on Several Complex Paul M. Gauthier Lectures on Several Complex Variables Paul M. Gauthier Départment de Mathématiques et de Statistique Université de Montréal Montreal, QC, Canada ISBN 978-3-319-11510-8 ISBN 978-3-319-11511-5

More information

Mathematics, Computer Science and Logic - A Never Ending Story

Mathematics, Computer Science and Logic - A Never Ending Story Mathematics, Computer Science and Logic - A Never Ending Story Peter Paule Editor Mathematics, Computer Science and Logic - A Never Ending Story The Bruno Buchberger Festschrift 123 Editor Peter Paule

More information

VIDEO intypedia001en LESSON 1: HISTORY OF CRYPTOGRAPHY AND ITS EARLY STAGES IN EUROPE. AUTHOR: Arturo Ribagorda Garnacho

VIDEO intypedia001en LESSON 1: HISTORY OF CRYPTOGRAPHY AND ITS EARLY STAGES IN EUROPE. AUTHOR: Arturo Ribagorda Garnacho VIDEO intypedia001en LESSON 1: HISTORY OF CRYPTOGRAPHY AND ITS EARLY STAGES IN EUROPE AUTHOR: Arturo Ribagorda Garnacho Carlos III University of Madrid, Spain Hello and welcome to Intypedia. Today we are

More information

Foundations of Mathematics

Foundations of Mathematics Erwin Engeler Foundations of Mathematics Questions of Analysis, Geometry & Algorithmics Translated by Charles B. Thomas With 29 Figures Springer-Verlag Berlin Heidelberg New York London Paris Tokyo Hong

More information

Formal Concept Analysis

Formal Concept Analysis Formal Concept Analysis Springer Berlin Heidelberg New York Barcelona Hong Kong London Milan Paris Singapore Tokyo Bernhard Ganter Rudolf Wille Formal Concept Analysis Mathematical Foundations With 105

More information

The Evolution of the Cryptologic Bombe. Chris Christensen Department of Mathematics Northern Kentucky University

The Evolution of the Cryptologic Bombe. Chris Christensen Department of Mathematics Northern Kentucky University The Evolution of the Cryptologic Bombe Chris Christensen Department of Mathematics Northern Kentucky University Electronic Communications 1844 Samuel F. B. Morse: What hath God Wrought? Telegraph. 1876

More information

How to Write Technical Reports

How to Write Technical Reports How to Write Technical Reports Lutz Hering Heike Hering How to Write Technical Reports Understandable Structure, Good Design, Convincing Presentation 123 Dr. Lutz Hering Am Ricklinger Holze 14 30966 Hemmingen

More information

Cryptology Notes ~ 1. Frank Tapson 2003 [trolc0:2]

Cryptology Notes ~ 1. Frank Tapson 2003 [trolc0:2] CRYPTOLOGY Notes & Cryptology is the study of 'hidden writing', but is more generally thought of as being to do with codes and ciphers. It involves working with both language and mathematics. For that

More information

Ergebnisse der Mathematik und ihrer Grenzgebiete

Ergebnisse der Mathematik und ihrer Grenzgebiete Ergebnisse der Mathematik und ihrer Grenzgebiete 3. Folge. Band 26 A Series of Modem Surveys in Mathematics Editorial Board E. Bombieri, Princeton S. Feferman, Stanford M. Gromov, Bures-sur-Yvette H.W.

More information

Multicriteria Optimization

Multicriteria Optimization Multicriteria Optimization Matthias Ehrgott Multicriteria Optimization Second edition With 88 Figures and 12 Tables 12 Dr. habil. Matthias Ehrgott, Associate Professor The University of Auckland Department

More information

Facts and Myths of Enigma: Breaking Stereotypes

Facts and Myths of Enigma: Breaking Stereotypes Facts and Myths of Enigma: Breaking Stereotypes Kris Gaj 1 and Arkadiusz Oráowski 2 1 George Mason University, Electrical and Computer Engineering 4400 University Drive, Fairfax, VA 22030, U.S.A. kgaj@gmu.edu

More information

Lecture 8: Cracking the Codes based on Tony Sale s Codes & Ciphers Web Page. History of Computing. Today s Topics. History of Computing Cipher Systems

Lecture 8: Cracking the Codes based on Tony Sale s Codes & Ciphers Web Page. History of Computing. Today s Topics. History of Computing Cipher Systems Lecture 8: Cracking the Codes based on Tony Sale s Codes & Ciphers Web Page Today s Topics Cipher Systems Substitution Ciphers Cracking Caesar s Cipher Polyalphabetic Substitution The Enigma Machine Rotors,

More information

Baudot code channels

Baudot code channels BLETCHLEY PARK The Testery and the contribution made by the Intelligence Corps The battle to break Enigma was not the only one being fought in 1942. Much of the high level traffic believed to be from Hitler

More information

CSc 466/566. Computer Security. 4 : Cryptography Introduction

CSc 466/566. Computer Security. 4 : Cryptography Introduction 1/51 CSc 466/566 Computer Security 4 : Cryptography Introduction Version: 2012/02/06 16:06:05 Department of Computer Science University of Arizona collberg@gmail.com Copyright c 2012 Christian Collberg

More information

FOR OFFICIAL USE ONLY

FOR OFFICIAL USE ONLY *FM 34-40-2 FIELD MANUAL NO 34-40-2 HEADQUARTERS DEPARTMENT OF THE ARMY Washington, DC, 13 September 1990 FOR OFFICIAL USE ONLY i ii iii PREFACE This field manual is intended as a training text in basic

More information

Protecting Chips Against Hold Time Violations Due to Variability

Protecting Chips Against Hold Time Violations Due to Variability Protecting Chips Against Hold Time Violations Due to Variability Gustavo Neuberger Ricardo Reis Gilson Wirth Protecting Chips Against Hold Time Violations Due to Variability Gustavo Neuberger Instituto

More information

Nomenclators. Nomenclator Example. Alberti s Cipher Disk. Early code/cipher combination, popular form 1400s-1800s. Philip of Spain (1589, see Kahn):

Nomenclators. Nomenclator Example. Alberti s Cipher Disk. Early code/cipher combination, popular form 1400s-1800s. Philip of Spain (1589, see Kahn): Nomenclators Early code/cipher combination, popular form 1400s-1800s. Philip of Spain (1589, see Kahn): LO = Spain POM = King of Spain 64 = confederation overlined two-digit groups = null + substitution

More information

The Paper Enigma Machine

The Paper Enigma Machine The Paper Enigma Machine http://mckoss.com/crypto/enigma.htm Mike Koss mike04@mckoss.com Wednesday, April 28, 2004 Introduction Having been fascinated with codes and secret writing since I was young, I

More information

Introduction to the Representation Theory of Algebras

Introduction to the Representation Theory of Algebras Introduction to the Representation Theory of Algebras Michael Barot Introduction to the Representation Theory of Algebras 123 Michael Barot Instituto de Matemáticas Universidad Nacional Autónoma de México

More information

Problem Books in Mathematics

Problem Books in Mathematics Problem Books in Mathematics Series Editor: Peter Winkler Department of Mathematics Dartmouth College Hanover, NH 03755 USA More information about this series at http://www.springer.com/series/714 Hayk

More information

Damage Mechanics with Finite Elements

Damage Mechanics with Finite Elements Damage Mechanics with Finite Elements Springer-Verlag Berlin Heidelberg GmbH P. 1. Kattan. G. Z. Voyiadjis Damage Mechanics with Finite Elements Practical Applications with Computer Tools With 28 Figures

More information

Phase Equilibria, Crystallographic and Thermodynamic Data of Binary Alloys

Phase Equilibria, Crystallographic and Thermodynamic Data of Binary Alloys Landolt-Börnstein Numerical Data and Functional Relationships in Science and Technology New Series / Editor in Chief: W. Martienssen Group IV: Physical Chemistry Volume 12 Phase Equilibria, Crystallographic

More information

PART FOUR. Polyalphabetic Substitution Systems PERIODIC POLYALPHABETIC SUBSTITUTION SYSTEMS

PART FOUR. Polyalphabetic Substitution Systems PERIODIC POLYALPHABETIC SUBSTITUTION SYSTEMS PART FOUR Polyalphabetic Substitution Systems PERIODIC POLYALPHABETIC SUBSTITUTION SYSTEMS CHAPTER 8 Section I Characteristics of Periodic Systems 8-1. Types of Polyalphabetic Systems All the substitution

More information

Exploring the Enigma [The MATH Connection]

Exploring the Enigma [The MATH Connection] Exploring the Enigma [The MATH Connection] by Claire Ellis, from Issue 34 of PLUS Magazine As long ago as the Ancient Greeks, warring armies have encrypted their communications in an attempt to keep their

More information

The Swiss cipher machine NeMa

The Swiss cipher machine NeMa Faculty of Science, Technology and Communication The Swiss cipher machine NeMa Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Master in Information and Computer Sciences

More information

Burkhard Vogel. How to Gain Gain. A Reference Book on Triodes in Audio Pre-Amps

Burkhard Vogel. How to Gain Gain. A Reference Book on Triodes in Audio Pre-Amps How to Gain Gain Burkhard Vogel How to Gain Gain A Reference Book on Triodes in Audio Pre-Amps 123 Dipl. -Ing. Burkhard Vogel BUVOCON GmbH 70180 Stuttgart Germany ISBN: 978-3-540-69502-8 e-isbn: 978-3-540-69505-9

More information

Quantum Theory and Local Causality

Quantum Theory and Local Causality SPRINGER BRIEFS IN PHILOSOPHY Gábor Hofer-Szabó Péter Vecsernyés Quantum Theory and Local Causality SpringerBriefs in Philosophy SpringerBriefs present concise summaries of cutting-edge research and practical

More information

A Algorithms and Combinatorics 13

A Algorithms and Combinatorics 13 A Algorithms and Combinatorics 13 Editorial Board R. L. Graham, Murray Hill B. Korte, Bonn L. Lovasz, Budapest A.Wigderson, Jerusalem G. M. Ziegler, Berlin Springer Berlin Heidelberg New York Barcelona

More information

Enigma. Developed and patented (in 1918) by Arthur Scherbius Many variations on basic design Eventually adopted by Germany

Enigma. Developed and patented (in 1918) by Arthur Scherbius Many variations on basic design Eventually adopted by Germany Enigma Enigma 1 Enigma Developed and patented (in 1918) by Arthur Scherbius Many variations on basic design Eventually adopted by Germany o For both military and diplomatic use o Many variations used Broken

More information

Encyclopedia of Marine Sciences

Encyclopedia of Marine Sciences 1. G. Baretta-Bekker. E. K. Duursma B. R. Kuipers (Eds.) Encyclopedia of Marine Sciences With 127 Figures Springer-Verlag Berlin Heidelberg New York London Paris Tokyo Hong Kong Barcelona Budapest Drs.

More information

PA Substitution Cipher

PA Substitution Cipher Anuj Kumar 1 PA Substitution Cipher Ankur Kumar Varshney 2 Pankaj Kumar 3 1 M.Tech*, Computer Science & Engineering IEC CET, Greater Noida, (U.P.) India 2 M.Tech*, Computer Science & Engineering B.S.A

More information

Pseudorandom bit Generators for Secure Broadcasting Systems

Pseudorandom bit Generators for Secure Broadcasting Systems +00? IE.Nfejb~lV 4 Pseudorandom bit Generators for Secure Broadcasting Systems Chung-Huang Yang m Computer & Communication Research Laboratories Industrial Technology Research Institute Chutung, Hsinchu

More information

Marxism and Education. Series Editor Anthony Green Institute of Education University of London London, United Kingdom

Marxism and Education. Series Editor Anthony Green Institute of Education University of London London, United Kingdom Marxism and Education Series Editor Anthony Green Institute of Education University of London London, United Kingdom This series assumes the ongoing relevance of Marx s contributions to critical social

More information

NEUROANATOMY 3D-Stereoscopic Atlas of the Human Brain

NEUROANATOMY 3D-Stereoscopic Atlas of the Human Brain Martin C. Hirsch Thomas Kramer NEUROANATOMY 3D-Stereoscopic Atlas of the Human Brain Springer-Verlag Berlin Heidelberg GmbH Martin C. Hirsch Thomas Kramer NEUROANATOMY 3D-Stereoscopic Atlas of the Human

More information

Companion to European Heritage Revivals / edited by Linde Egberts and Koos Bosma

Companion to European Heritage Revivals / edited by Linde Egberts and Koos Bosma Companion to European Heritage Revivals / edited by Linde Egberts and Koos Bosma Companion to European Heritage Revivals / edited by Linde Egberts and Koos Bosma Linde Egberts and Koos Bosma (eds.) CLUE

More information

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver.

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver. Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl www.crypto-textbook.com Chapter 2 Stream Ciphers ver. October 29, 2009 These slides were prepared by

More information

Theory of Digital Automata

Theory of Digital Automata Theory of Digital Automata International Series on INTELLIGENT SYSTEMS, CONTROL AND AUTOMATION: SCIENCE AND ENGINEERING VOLUME 63 Editor Professor S. G. Tzafestas, National Technical University of Athens,

More information

Springer-Verlag Berlin Heidelberg GmbH

Springer-Verlag Berlin Heidelberg GmbH Reporting on Income Distribution and Poverty Springer-Verlag Berlin Heidelberg GmbH Richard Hauser Irene Becker Editors Reporting on Incotne Distribution and Poverty Perspectives from a German and a European

More information

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver.

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver. Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl www.crypto-textbook.com Chapter 2 Stream Ciphers ver. October 29, 2009 These slides were prepared by

More information

New Address Shift Linear Feedback Shift Register Generator

New Address Shift Linear Feedback Shift Register Generator New Address Shift Linear Feedback Shift Register Generator Kholood J. Moulood Department of Mathematical, Tikrit University, College of Education for Women, Salahdin. E-mail: khmsc2006@yahoo.com. Abstract

More information

A reprint from American Scientist

A reprint from American Scientist A reprint from American Scientist the magazine of Sigma Xi, The Scientific Research Society This reprint is provided for personal and noncommercial use. For any other use, please send a request to Permissions,

More information

Köhler s Invention Birkhäuser Verlag Basel Boston Berlin

Köhler s Invention Birkhäuser Verlag Basel Boston Berlin Klaus Eichmann Köhler s Invention Birkhäuser Verlag Basel Boston Berlin Prof. Dr. Klaus Eichmann Max-Planck-Institut für Immunbiologie Stübeweg 51 D-79108 Freiburg Library of Congress Cataloging-in-Publication

More information

CRYPTOGRAPHY AND STATISTICS: A DIDACTICAL PROJECT. Massimo BORELLI, Anna FIORETTO, Andrea SGARRO, Luciana ZUCCHERI

CRYPTOGRAPHY AND STATISTICS: A DIDACTICAL PROJECT. Massimo BORELLI, Anna FIORETTO, Andrea SGARRO, Luciana ZUCCHERI CRYPTOGRAPHY AND STATISTICS: A DIDACTICAL PROJECT Massimo BORELLI, Anna FIORETTO, Andrea SGARRO, Luciana ZUCCHERI DSM (Department of Mathematical Sciences) University of Trieste, 34100 Trieste (Italy)

More information

Landolt-Börnstein Numerical Data and Functional Relationships in Science and Technology New Series / Editor in Chief: W.

Landolt-Börnstein Numerical Data and Functional Relationships in Science and Technology New Series / Editor in Chief: W. Landolt-Börnstein Numerical Data and Functional Relationships in Science and Technology New Series / Editor in Chief: W. Martienssen Group III: Condensed Matter Volume 44 Semiconductors Subvolume C New

More information

STA4000 Report Decrypting Classical Cipher Text Using Markov Chain Monte Carlo

STA4000 Report Decrypting Classical Cipher Text Using Markov Chain Monte Carlo STA4000 Report Decrypting Classical Cipher Text Using Markov Chain Monte Carlo Jian Chen Supervisor: Professor Jeffrey S. Rosenthal May 12, 2010 Abstract In this paper, we present the use of Markov Chain

More information

Playfair Cipher. From the earliest forms of stenography to the most advanced forms of encryption, the

Playfair Cipher. From the earliest forms of stenography to the most advanced forms of encryption, the Baldwin 1 Erin Baldwin Dr. Bruff FYWS Cryptology October 27, 2010 Playfair Cipher From the earliest forms of stenography to the most advanced forms of encryption, the field of cryptography has advanced

More information

Institute of Southern Punjab, Multan

Institute of Southern Punjab, Multan Institute of Southern Punjab, Multan Network Security Substitution Techniques Lecture#4 Mazhar Hussain E-mail: mazhar.hussain@isp.edu.pk Lecture 4: Substitution Techniques Polybius Cipher Playfair Cipher

More information

Sherlock Holmes and the adventures of the dancing men

Sherlock Holmes and the adventures of the dancing men Sherlock Holmes and the adventures of the dancing men Kseniya Garaschuk May 30, 2013 1 Overview Cryptography (from Greek for hidden, secret ) is the practice and study of hiding information. A cipher is

More information

The National Cryptologic Museum Library

The National Cryptologic Museum Library Cross References The National Cryptologic Museum Library Eugene Becker Last year, a widely published German technical author, Klaus Schmeh, e-mailed the library of the National Cryptologic Museum from

More information

Landolt-Börnstein / New Series

Landolt-Börnstein / New Series Landolt-Börnstein / New Series Landolt-Börnstein Numerical Data and Functional Relationships in Science and Technology New Series Editor in Chief: W. Martienssen Units and Fundamental Constants in Physics

More information

Update to 8 June 2011 Press Release

Update to 8 June 2011 Press Release 19 August 2011 Update to 8 June 2011 Press Release In June 2011, the National Security Agency (NSA) declassified and released to the National Archives and Records Administration (NARA) over 50,000 pages

More information

Landolt-Börnstein Numerical Data and Functional Relationships in Science and Technology New Series / Editor in Chief: W.

Landolt-Börnstein Numerical Data and Functional Relationships in Science and Technology New Series / Editor in Chief: W. Landolt-Börnstein Numerical Data and Functional Relationships in Science and Technology New Series / Editor in Chief: W. Martienssen Group III: Condensed Matter Volume 44 Semiconductors Subvolume D New

More information

Racial Profiling and the NYPD

Racial Profiling and the NYPD Racial Profiling and the NYPD Jay L. Newberry Racial Profiling and the NYPD The Who, What, When, and Why of Stop and Frisk Jay L. Newberry Department of Geography Binghamton University Binghamton, NY USA

More information

Collected Papers VI. Literary Reality and Relationships

Collected Papers VI. Literary Reality and Relationships Collected Papers VI. Literary Reality and Relationships PHAENOMENOLOGICA SERIES FOUNDED BY H.L. VAN BREDA AND PUBLISHED UNDER THE AUSPICES OF THE HUSSERL-ARCHIVES 206 ALFRED SCHUTZ COLLECTED PAPERS VI.

More information

Cryptography. The Codebreakers: The Story of Secret Writing. by David Kahn A Bit of History. Seminal Text on Cryptography

Cryptography. The Codebreakers: The Story of Secret Writing. by David Kahn A Bit of History. Seminal Text on Cryptography Cryptography A Bit of History 1 Seminal Text on Cryptography The Codebreakers: The Story of Secret Writing by David Kahn 1967 2 Early Cryptology - India Secret writing was well known and practiced in India

More information

Calculation of Demographic Parameters in Tropical Livestock Herds

Calculation of Demographic Parameters in Tropical Livestock Herds Matthieu Lesnoff Renaud Lancelot Charles-Henri Moulin Samir Messad Xavier Juanès Christian Sahut Calculation of Demographic Parameters in Tropical Livestock Herds A discrete time approach with LASER animal-based

More information

Eric Roberts and Jerry Cain Handout #36 CS 106J May 15, The Enigma Machine

Eric Roberts and Jerry Cain Handout #36 CS 106J May 15, The Enigma Machine Eric Roberts and Jerry Cain Handout #36 CS 106J May 15, 2017 The Enigma Machine In World War II, a team of British mathematicians working at a secret facility called Bletchley Park was able to break the

More information

1 Introduction 2. 3 Zygalski Sheets Using Zygalski Sheets Programmatic Replication Weaknesses/Problems 7

1 Introduction 2. 3 Zygalski Sheets Using Zygalski Sheets Programmatic Replication Weaknesses/Problems 7 Breaking Enigma Samantha Briasco-Stewart, Kathryn Hendrickson, and Jeremy Wright 1 Introduction 2 2 The Enigma Machine 2 2.1 Encryption and Decryption Process 3 2.2 Enigma Weaknesses 4 2.2.1 Encrypting

More information

A Hybrid Theory of Metaphor

A Hybrid Theory of Metaphor A Hybrid Theory of Metaphor A Hybrid Theory of Metaphor Relevance Theory and Cognitive Linguistics Markus Tendahl University of Dortmund, Germany Markus Tendahl 2009 Softcover reprint of the hardcover

More information

The Tentatve List of Enigma and Other Machine Usages, formatted by Tony Sale. (c) July March l945 page 1

The Tentatve List of Enigma and Other Machine Usages, formatted by Tony Sale. (c) July March l945 page 1 30 March l945 page 1 TENTATIVE LIST OF ENIGMA AND OTHER MACHINE USAGES Contents 1. Naval Enigma. 2. German Army and Air Force Enigma (including a few other miscellaneous devices). 3. Commercial Type Machines.

More information

PART FIVE. Transposition Systems TYPES OF TRANSPOSITION SYSTEMS

PART FIVE. Transposition Systems TYPES OF TRANSPOSITION SYSTEMS PART FIVE Transposition Systems TYPES OF TRANSPOSITION SYSTEMS CHAPTER 11 11-1. Nature of Transposition Transposition systems are fundamentally different from substitution systems. In substitution systems,

More information

Innovations Lead to Economic Crises

Innovations Lead to Economic Crises Innovations Lead to Economic Crises Jon-Arild Johannessen Innovations Lead to Economic Crises Explaining the Bubble Economy Jon-Arild Johannessen Kristiania University College and Nord University Oslo/Bodø,

More information

Sequences and Cryptography

Sequences and Cryptography Sequences and Cryptography Workshop on Shift Register Sequences Honoring Dr. Solomon W. Golomb Recipient of the 2016 Benjamin Franklin Medal in Electrical Engineering Guang Gong Department of Electrical

More information

USAGE OF FIREFLY ALGORITHM IN VIGNERE CIPHER TO REDUCE VARIABLE LENGTH KEY SEARCH TIME

USAGE OF FIREFLY ALGORITHM IN VIGNERE CIPHER TO REDUCE VARIABLE LENGTH KEY SEARCH TIME USAGE OF FIREFLY ALGORITHM IN VIGNERE CIPHER TO REDUCE VARIABLE LENGTH KEY SEARCH TIME 1 V.RAJENDRAN, 2 DR.T.PURUSOTHAMAN 1 Research Scholar, Anna university, Coimbatore, Tamilnadu, India. 2 Faculty Of

More information

Randomness analysis of A5/1 Stream Cipher for secure mobile communication

Randomness analysis of A5/1 Stream Cipher for secure mobile communication Randomness analysis of A5/1 Stream Cipher for secure mobile communication Prof. Darshana Upadhyay 1, Dr. Priyanka Sharma 2, Prof.Sharada Valiveti 3 Department of Computer Science and Engineering Institute

More information

The Code Book: The Science Of Secrecy From Ancient Egypt To Quantum Cryptography Download Free (EPUB, PDF)

The Code Book: The Science Of Secrecy From Ancient Egypt To Quantum Cryptography Download Free (EPUB, PDF) The Code Book: The Science Of Secrecy From Ancient Egypt To Quantum Cryptography Download Free (EPUB, PDF) In his first book since the bestselling Fermat's Enigma, Simon Singh offers the first sweeping

More information

Trends in Mathematics

Trends in Mathematics Trends in Mathematics Trends in Mathematics is a series devoted to the publication of volumes arising from conferences and lecture series focusing on a particular topic from any area of mathematics. Its

More information

Edward Simpson: Bayes at Bletchley Park

Edward Simpson: Bayes at Bletchley Park Edward Simpson: Bayes at Bletchley Park Edward Simpson CB ceased being an active statistician in 1947, when he joined the Civil Service. But statistics owes him much. He is the Simpson of Simpson s index

More information

Benedetto Cotrugli The Book of the Art of Trade

Benedetto Cotrugli The Book of the Art of Trade Benedetto Cotrugli The Book of the Art of Trade Carlo Carraro Giovanni Favero Editors Benedetto Cotrugli The Book of the Art of Trade With Scholarly Essays from Niall Ferguson, Giovanni Favero, Mario Infelise,

More information

E. Kowalski. Nuclear Electronics. With 337 Figures. Springer-Verlag New York Heidelberg Berlin 1970

E. Kowalski. Nuclear Electronics. With 337 Figures. Springer-Verlag New York Heidelberg Berlin 1970 E. Kowalski Nuclear Electronics With 337 Figures Springer-Verlag New York Heidelberg Berlin 1970 Dr. Emil Kowalski Lecturer, Institute of Applied Physics, University of Berne, Switzerland Nucleonics Division,

More information

The Scientific iemper

The Scientific iemper Yellow Buttons at the Top and Bottom of pages indicate links Anthony R.Michaelis The Scientific iemper An Anthology of Stories on Matters of Science To _ Synopsis If you wish to skip introductoly matter

More information

Stream Cipher. Block cipher as stream cipher LFSR stream cipher RC4 General remarks. Stream cipher

Stream Cipher. Block cipher as stream cipher LFSR stream cipher RC4 General remarks. Stream cipher Lecturers: Mark D. Ryan and David Galindo. Cryptography 2015. Slide: 90 Stream Cipher Suppose you want to encrypt a stream of data, such as: the data from a keyboard the data from a sensor Block ciphers

More information

Appendix Cryptograms

Appendix Cryptograms Fall 2006 Chris Christensen MAT/CSC 483 Appendix Cryptograms Here is a more detailed discussion of the history and techniques for solution of aristocrats and patristocrats (the generic term for them is

More information

SpringerBriefs in Electrical and Computer Engineering

SpringerBriefs in Electrical and Computer Engineering SpringerBriefs in Electrical and Computer Engineering More information about this series at http://www.springer.com/series/10059 Fatima Hussain Internet of Things Building Blocks and Business Models 123

More information

The Discourse of Peer Review

The Discourse of Peer Review The Discourse of Peer Review Brian Paltridge The Discourse of Peer Review Reviewing Submissions to Academic Journals Brian Paltridge Sydney School of Education & Social Work University of Sydney Sydney,

More information

The Language of Suspense in Crime Fiction

The Language of Suspense in Crime Fiction The Language of Suspense in Crime Fiction Reshmi Dutta-Flanders The Language of Suspense in Crime Fiction A Linguistic Stylistic Approach Reshmi Dutta-Flanders English Language and Linguistics School of

More information

Springer Series in Information Sciences 22

Springer Series in Information Sciences 22 Springer Series in Information Sciences 22 Springer Series in Information Sciences Editors: Thomas S. Huang Teuvo Kohonen Manfred R. Schroeder 30 Self-Organizing Maps By T. Kohonen 3rd Edition 3 I Music

More information

J. Andrew Hubbell. Byron s Nature. A Romantic Vision of Cultural Ecology

J. Andrew Hubbell. Byron s Nature. A Romantic Vision of Cultural Ecology Byron s Nature Given the important role that Lord Byron s short but massively influential poem Darkness played in the development of eco-criticism, the lack of a systematic examination of Lord Byron s

More information

Appendix B: Project Literature Review

Appendix B: Project Literature Review Appendix B: Project Literature Review Student: Jonathan Wong Supervisor: Dr. Peter Smith Course Title: MSc Object Orientated Software Systems Introduction...ii 1. Pre-War History of the Enigma...ii 2.

More information

cryptography, plaintext; ciphertext. key,

cryptography, plaintext; ciphertext. key, Cryptography C omputers are most valuable when they are used to solve problems that humans cannot easily solve for themselves. Charles Babbage, for example, wanted to automate the production of mathematical

More information

Jane Dowson. Carol Ann Duffy. Poet for Our Times

Jane Dowson. Carol Ann Duffy. Poet for Our Times Carol Ann Duffy Jane Dowson Carol Ann Duffy Poet for Our Times Jane Dowson De Montfort University Leicester, UK ISBN 978-1-137-41562-2 ISBN 978-1-137-41563-9 (ebook) DOI 10.1057/978-1-137-41563-9 Library

More information

Guide to Computing for Expressive Music Performance

Guide to Computing for Expressive Music Performance Guide to Computing for Expressive Music Performance Alexis Kirke Eduardo R. Miranda Editors Guide to Computing for Expressive Music Performance Editors Alexis Kirke Interdisciplinary Centre for Computer

More information

Modified Version of Playfair Cipher Using Linear Feedback Shift Register and Transpose Matrix Concept

Modified Version of Playfair Cipher Using Linear Feedback Shift Register and Transpose Matrix Concept Modified Version of Playfair Cipher Using Linear Feedback Shift Register and Transpose Matrix Concept Vinod Kumar,Santosh kr Upadhyay,Satyam Kishore Mishra,Devesh Singh Abstract In this paper we are presenting

More information

The Hegel Marx Connection

The Hegel Marx Connection The Hegel Marx Connection Also by Tony Burns NATURAL LAW AND POLITICAL IDEOLOGY IN THE PHILOSOPHY OF HEGEL Also by Ian Fraser HEGEL AND MARX: The Concept of Need The Hegel Marx Connection Edited by Tony

More information

Lecture Notes in Mathematics 2164

Lecture Notes in Mathematics 2164 Lecture Notes in Mathematics 2164 Editors-in-Chief: Jean-Michel Morel, Cachan Bernard Teissier, Paris Advisory Board: Michel Brion, Grenoble Camillo De Lellis, Zurich Alessio Figalli, Zurich Davar Khoshnevisan,

More information

Shame and Modernity in Britain

Shame and Modernity in Britain Shame and Modernity in Britain Anne-Marie Kilday David S. Nash Shame and Modernity in Britain 1890 to the Present Anne-Marie Kilday Department of History, Philosophy and Religion Oxford Brookes University

More information

How to Predict the Output of a Hardware Random Number Generator

How to Predict the Output of a Hardware Random Number Generator How to Predict the Output of a Hardware Random Number Generator Markus Dichtl Siemens AG, Corporate Technology Markus.Dichtl@siemens.com Abstract. A hardware random number generator was described at CHES

More information

Propaganda and Hogarth s Line of Beauty in the First World War

Propaganda and Hogarth s Line of Beauty in the First World War Propaganda and Hogarth s Line of Beauty in the First World War Georgina Williams Propaganda and Hogarth s Line of Beauty in the First World War Georgina Williams ISBN 978-1-137-57193-9 ISBN 978-1-137-57194-6

More information

The Language of Cosmetics Advertising

The Language of Cosmetics Advertising The Language of Cosmetics Advertising aheuhiuea Helen Ringrow The Language of Cosmetics Advertising Helen Ringrow School of Languages and Area Studies University of Portsmouth Portsmouth, United Kingdom

More information

Dickens the Journalist

Dickens the Journalist Dickens the Journalist Other titles by this author: DICKENS' JOURNALISM, VOLUME 4: The Uncommercial Traveller and Other Papers, 1859-70 (edited by Michael Slater and John Drew) Dickens the Journalist John

More information