Last update:
Tue Apr 1 12:09:15 MDT 2025
Brian J. Winkel Why Cryptologia? . . . . . . . . . . . . 1--3
Greg E. Mellen and
Lloyd Greenwood The Cryptology of Multiplex System: Part
I: Simulation and Cryptanalysis . . . . 4--16
Barbara Harris A Different Kind of Column . . . . . . . 17--19
James A. Reeds ``Cracking'' a Random Number Generator 20--26
David Kahn The Biggest Bibliography . . . . . . . . 27--42
David Shulman A Reply to Kahn's Review . . . . . . . . 43--45
Cipher A. Deavours Unicity Points in Cryptanalysis . . . . 46--68
Louis Kruh Cipher Equipment: Cipher Disks . . . . . 69--75
Jack Levine and
Joel V. Brawley Some Cryptographic Applications of
Permutation Polynomials . . . . . . . . 76--92
Brian J. Winkel Poe Challenge Cipher Finally Broken . . 93--96
Anonymous Biographies of Contributory . . . . . . 97--99
Blanchard Hiatt Age of Decipherment . . . . . . . . . . 101--105
Blanchard Hiatt ``Count Forward Three Score and Ten
\ldots'' . . . . . . . . . . . . . . . . 106--115
Bruce R. Schatz Automated Analysis of Cryptogram Cipher
Equipment . . . . . . . . . . . . . . . 116--142
Louis Kruh Cipher Equipment: Converter M-325(T) . . 143--149
Greg E. Mellen and
Lloyd Greenwood The Cryptology of Multiplex System: Part
II . . . . . . . . . . . . . . . . . . . 150--165
David Kahn ``Get Out Your Secret Decoders, Boys and
Girls \ldots'' . . . . . . . . . . . . . 166--166
Cipher A. Deavours Analysis of the Hebern Cryptograph Using
Isomorphs . . . . . . . . . . . . . . . 167--185
James A. Reeds Rotor Algebra . . . . . . . . . . . . . 186--194
Walter Penney Grille Reconstruction . . . . . . . . . 195--201
Anonymous Biographies of Contributors . . . . . . 202--204
David Kahn The Significance of Codebreaking and
Intelligence in Allied Strategy and
Tactics . . . . . . . . . . . . . . . . 209--222
Cipher A. Deavours The Kappa Test . . . . . . . . . . . . . 223--231
Brian J. Winkel Word Ways, a Journal Worth Going Your
Way . . . . . . . . . . . . . . . . . . 232--234
James A. Reeds Entropy Calculations and Particular
Methods of Cryptanalysis . . . . . . . . 235--254
Louis Kruh Cipher Equipment: Hagelin Pocket
Cryptographer, Type CD-57 . . . . . . . 255--260
Albert C. Leighton The Earliest Use of a Dot Cipher . . . . 261--274
Royal Canadian Mint DPEPE DPJO: a Canadian Coin Piece With a
Message . . . . . . . . . . . . . . . . 275--277
Cipher A. Deavours Kullback's ``Statistical Methods in
Cryptanalysis'', a Book Review . . . . . 278--280
Robert Morris and
Neil J. A. Sloane and
Aaron D. Wyner Assessment of the National Bureau of
Standards Proposed Federal Data
Encryption Standard . . . . . . . . . . 281--291
National Bureau of Standards Proposed Federal Information Processing
Data Encryption Standard . . . . . . . . 292--306
Anonymous Biographies of Contributors . . . . . . 307--308
Brian J. Winkel Epilogue . . . . . . . . . . . . . . . . 309--309
Cipher A. Deavours The Ithaca Connection: Computer
Cryptography in the Making --- a Special
Report . . . . . . . . . . . . . . . . . 312--317
Brian J. Winkel Poe Challenge Cipher Solutions . . . . . 318--325
A. Ross Eckler A Rapid Yes--No Computer-Aided
Communicator . . . . . . . . . . . . . . 326--333
Louis Kruh Cipher Equipment: MA4210 Alphanumeric
Pocket Cipher . . . . . . . . . . . . . 334--336
David Kahn Ecclesiastical Cryptography --- a Review 337--337
Joel V. Brawley and
Jack Levine Equivalence of Vigen\`ere Systems . . . 338--361
D. C. B. Marsh Courses in Cryptology --- Cryptography
at the Colorado School of Mines . . . . 362--363
David W. Straight Courses in Cryptology --- Cryptanalysis
and Data Security Course at the
University of Tennessee . . . . . . . . 363--365
Herbert S. Bright Cryptanalytic Attack and Defense:
Cipher-Text Only, Known-Plaintext,
Chosen-Plaintext . . . . . . . . . . . . 366--370
David Kahn Reports From the Reich . . . . . . . . . 371--371
Louis Kruh The Churchyard Ciphers . . . . . . . . . 372--375
Harold Joseph Highland CENSORED: a Simulation Exercise . . . . 376--377
David Kahn German Military Eavesdroppers . . . . . 378--380
Cipher A. Deavours and
James A. Reeds The Enigma: Part I: Historical
Perspectives . . . . . . . . . . . . . . 381--391
Brian J. Winkel Solution . . . . . . . . . . . . . . . . 391--391
Peter P. Fagone A Message in Cipher Written by General
Cornwallis During the Revolutionary War 392--395
Brian J. Winkel There and There --- a Department . . . . 396--405
Unknown They Should Be Paranoid . . . . . . . . 400--401
Gustavus J. Simmons and
Michael J. Norris Preliminary Comments on the M.I.T.
Public-Key Cryptosystem . . . . . . . . 406--414
Anonymous Biographies of Contributors . . . . . . 415--417
Unknown Letter from the Editor . . . . . . . . . ??
Wayne G. Barker Solving a Hagelin, Type CD-57, Cipher 1--8
David Wilson Courses in Cryptology --- Cryptanalysis
Course Down Under . . . . . . . . . . . 9--11
David Kahn The Forschungsamt: Nazi Germany's Most
Secret Communications Intelligence
Agency . . . . . . . . . . . . . . . . . 12--19
Hans Rohrbach Mathematical and Mechanical Methods in
Cryptography. I . . . . . . . . . . . . 20--37
Louis Kruh The Inventions of William F. Friedman 38--61
Ronald L. Rivest Remarks on a Proposed Cryptanalytic
Attack on the M.I.T. Public-Key
Cryptosystem . . . . . . . . . . . . . . 62--65
Cipher A. Deavours A Book Review: \booktitleCryptanalysis
of the Hagelin Cryptograph, by Wayne G.
Barker . . . . . . . . . . . . . . . . . 66--67
H. Gary Knight Cryptanalyst's Corner . . . . . . . . . 68--74
Ralph E. Weber James Lovell and Secret Ciphers During
the American Revolution . . . . . . . . 75--88
Brian J. Winkel There and There --- a Department . . . . 89--94
Anonymous Biographies of Contributors . . . . . . 95--96
Hans Rohrbach Mathematical and Mechanical Methods in
Cryptography. II . . . . . . . . . . . . 101--121
David Kahn Friedman's Life: a Book Review . . . . . 122--123
H. Gary Knight Cryptanalyst's Corner . . . . . . . . . 124--129
Louis Kruh Who Wrote ``The American Black
Chamber''? . . . . . . . . . . . . . . . 130--133
Cipher A. Deavours Courses in Cryptology --- Cryptology at
Kean College . . . . . . . . . . . . . . 134--138
David Kahn Nuggets from the Archives: Yardley Tries
Again . . . . . . . . . . . . . . . . . 139--143
Wayne G. Barker The Unsolved D'Agapeyeff Cipher . . . . 144--147
David Straight ``Modern Methods for Computer Security
and Privacy'': a Book Review . . . . . . 148--150
David Straight ``An Outline of Computer Security'': a
Book Review . . . . . . . . . . . . . . 148--150
David Kahn ``Pictures Galore'': a Book Review . . . 151--151
Frank Rubin Computer Methods for Decrypting
Multiplex Ciphers . . . . . . . . . . . 152--160
Brian J. Winkel Casanova and the Beaufort Cipher . . . . 161--163
Louis Kruh Cryptology as a Career . . . . . . . . . 164--167
Anonymous Encryption Challenge . . . . . . . . . . 168--171
Names Withheld Encryption Challenge . . . . . . . . . . 168--171
Louis Kruh Cipher Equipment: DH-26 Handheld
Encryption Unit . . . . . . . . . . . . 172--177
Brian J. Winkel A Tribute to Alf Monge . . . . . . . . . 178--185
Brian J. Winkel There and There --- a Department . . . . 186--194
Anonymous Biographies of Contributors . . . . . . 195--197
Unknown ``Codes and Ciphers'' --- a Book Review ??
Unknown ``The Man Who Broke Purple'' --- a Book
Review . . . . . . . . . . . . . . . . . ??
J. Rives Childs My Recollections of G.2 A.6 . . . . . . 201--214
Frank Rubin Computer Methods for Decrypting Random
Stream Ciphers . . . . . . . . . . . . . 215--231
Philip M. Arnold A Forgotten Book on Ciphers . . . . . . 232--235
Caxton C. Foster Courses in Cryptology --- Cryptanalysis
and Computers . . . . . . . . . . . . . 236--237
H. Gary Knight Cryptanalysts' Corner . . . . . . . . . 238--241
Louis Kruh A Catalog of Historical Interest . . . . 242--253
Brian J. Winkel Astle Cipher Solved . . . . . . . . . . 254--256
David Kahn A Famous Variation --- a Book Review . . 257--257
David Kahn Reveling in Deception --- a Book Review 258--259
Richard Heitzenrater Decoding Wesley's Diaries . . . . . . . 260--264
David Kahn Short Notices --- Reviews . . . . . . . 265--266
Robert Morris The Hagelin Cipher Machine (M-209):
Reconstruction of the Internal Settings 267--289
Louis Kruh Capsule Reviews for Crypto Buffs . . . . 290--292
Brian J. Winkel There and There --- a Department . . . . 293--298
Anonymous Biographies of Contributors . . . . . . 299--300
Bob Blakley and
G. R. Blakley Security of number-theoretic public key
cryptosystems against random attack. I 305--321
Louis Kruh What the Nazis Were Doing . . . . . . . 322--323
Howard T. Oakley The Riverbank Publications on Cryptology 324--330
David Kahn Extraordinary Codebreakers, Outstanding
Family: a Review . . . . . . . . . . . . 331--333
Louis Kruh A Nineteenth Century Challenge Cipher 334--334
H. Gary Knight Cryptanalysts' Corner . . . . . . . . . 335--337
Louis Kruh A Catalog of Historical Interest ---
Part II . . . . . . . . . . . . . . . . 338--349
Nicholas P. Callas An Application of Computers to
Cryptology . . . . . . . . . . . . . . . 350--364
David Kahn One of the Worst --- a Book Review . . . 365--365
Louis Kruh Rent a Code . . . . . . . . . . . . . . 366--367
Brian J. Winkel ``Action Line'' Challenge . . . . . . . 368--370
Paul Kinnucan Data Encryption Gurus: Tuchman and Meyer 371--381
Brian J. Winkel There and There --- a Department . . . . 382--393
Anonymous Biographies of Contributors . . . . . . 394--395
David Kahn The Ultra Conference . . . . . . . . . . 1--8
Carl Hammer How Did TJB Encode B2? . . . . . . . . . 9--15
Hans Rohrbach Report on the Decipherment of the
American Strip Cipher O-2 by the German
Foreign Office . . . . . . . . . . . . . 16--26
Boshra H. Makar Cryptology at St. Peter's College . . . 27--28
Bob Blakley and
G. R. Blakley Security of number theoretic public key
cryptosystems against random attack. II 29--42
James R. Ford The HP-67/97 Cryptograph . . . . . . . . 43--50
Louis Kruh A Xerograph of a Classic . . . . . . . . 50--50
A. O. Sulzberger, Jr. Papers Disclose Allies' Edge in Knowing
German Codes . . . . . . . . . . . . . . 51--53
Brian J. Winkel Studies on Cryptology . . . . . . . . . 52--53
David Shulman A Sherlockian Cryptogram . . . . . . . . 54--56
Brian J. Winkel There and There . . . . . . . . . . . . 57--62
Anonymous Biographies of Contributors . . . . . . 63--64
I. J. Good Early work on computers at Bletchley
Park . . . . . . . . . . . . . . . . . . 65--77
Louis Kruh Devices and Machines: The Hagelin
Cryptographer, Type C-52 . . . . . . . . 78--82
James A. Reeds Solution of Challenge Cipher . . . . . . 83--95
David Kahn ``American Codes'': a Book Review . . . 96--99
David Shulman The Macbeth Test Message . . . . . . . . 100--104
Bob Blakley and
G. R. Blakley Security of number theoretic public key
cryptosystems against random attack. III 105--118
David Kahn A German Consular Cipher . . . . . . . . 119--119
David Wilson Littlewood's Cipher: Part I: a Challenge 120--121
Bradford Hardie Book Review: Ultra Goes to War . . . . . 122--126
Anonymous Biographies of Contributors . . . . . . 127--128
Bobby R. Inman The NSA Perspective on
Telecommunications Protection in the
Nongovernmental Sector . . . . . . . . . 129--135
Greg Mellen J. F. Byrne and the Chaocipher: Work in
Progress . . . . . . . . . . . . . . . . 136--154
Frank Rubin Solving a Cipher Based on Multiple
Random Number Streams . . . . . . . . . 155--157
David Kahn The Futility of It All . . . . . . . . . 158--165
Louis Kruh The Deadly Double Advertisements: Pearl
Harbor Warning or Coincidence . . . . . 166--171
David Wilson Littlewood's Cipher: Part II: a Method
of Solution . . . . . . . . . . . . . . 172--176
Jack Levine and
Michael Willet The Two-Message Problem in Cipher Text
Autokey. Part I . . . . . . . . . . . . 177--186
Gideon Yuval How to Swindle Rabin . . . . . . . . . . 187--189
David Kahn Classic Revive ??: a Review . . . . . . 190--191
Anonymous The Second Beale Cipher Symposium ---
Call for Papers . . . . . . . . . . . . 191--191
Anonymous Biographies of Contributors . . . . . . 192--192
David Kahn The Significance of Codebreaking and
Intelligence in Allied Strategy and
Tactics . . . . . . . . . . . . . . . . 209--222
C. A. Deavours The Kappa Test . . . . . . . . . . . . . 223--231
Brian J. Winkel Word Ways, a Journal Worth Going Your
Way . . . . . . . . . . . . . . . . . . 232--234
James Reeds Entropy Calculations and Particular
Methods of Cryptanalysis . . . . . . . . 235--254
Louis Kruh Cipher Equipment . . . . . . . . . . . . 255--260
Albert C. Leighton ``The Earliest Use of a Dot Cipher'' . . 261--274
Royal Canadian Mint DPEPE DPJO: a Canadian Coin Piece With a
Message . . . . . . . . . . . . . . . . 275--277
C. A. Deavours Kullback's ``Statistical Methods in
Cryptanalysis'' --- Book Review . . . . 278--280
Robert Morris and
N. J. A. Sloane and
A. D. Wyner Assessment of the National Bureau of
Standards Proposed Federal Data
Encryption Standard . . . . . . . . . . 281--291
Anonymous Proposed Federal Information Processing
Data Encryption Standard . . . . . . . . 292--306
Anonymous Biographies of Contributors . . . . . . 307--308
Eric Sams Musical Cryptography . . . . . . . . . . 193--201
Frank Rubin Cryptographic Aspects of Data
Compression Codes . . . . . . . . . . . 202--205
Louis Kruh CP-III: One Time Cypher Pad Manual
Encryption Device . . . . . . . . . . . 206--209
David Kahn The Geheimschreiber . . . . . . . . . . 210--214
Unknown Interrogation on German secret
teletypewriters . . . . . . . . . . . . 211--214
Philip M. Arnold Ciphers for the Educated Man . . . . . . 215--216
Louis Kruh Short Notices . . . . . . . . . . . . . 217--219
Jack Levine and
Michael Willet The Two-Message Problem in Cipher Text
Autokey. Part II . . . . . . . . . . . . 220--231
Anonymous A Musical Cipher . . . . . . . . . . . . 232--232
Elliot Fischer Language Redundancy and Cryptanalysis 233--235
Louis Kruh The Day the Friedmans Had a Typo in
Their Photo . . . . . . . . . . . . . . 236--241
H. Gary Knight Cryptanalysts' Corner . . . . . . . . . 242--242
Philip M. Arnold A German Code Book . . . . . . . . . . . 243--245
Bradford Hardie A Theory of Cryptography . . . . . . . . 246--247
Brian J. Winkel There and There . . . . . . . . . . . . 248--251
Anonymous Biographies of Contributors . . . . . . 252--253
S. C. Lu and
L. N. Lee A Simple and Effective Public-Key
Cryptosystem . . . . . . . . . . . . . . ??
Arthur Schuetz Secret Service Unmasked . . . . . . . . ??
Peter P. Fagone The Solution of a Cromwellian Era Spy
Message (Circa 1648) . . . . . . . . . . 1--4
Louis Kruh Cipher Devices: The Cryptomatic HC-520 5--14
Solomon W. Golomb Cryptographic Reflections on the Genetic
Code . . . . . . . . . . . . . . . . . . 15--19
Michael Richter A Note on Public-Key Cryptosystems . . . 20--22
David Kahn ``Deciphered Texts'': a Book Review . . 22--22
Louis Kruh Memories of Friedman . . . . . . . . . . 23--26
H. Gary Knight Cryptanalysts' Corner . . . . . . . . . 27--29
Ronald L. Rivest ``Forwards and Backwards'' Encryption 30--33
Louis Kruh Ciphering System for a 19th Century
Challenge Cipher . . . . . . . . . . . . 34--35
David Kahn Problems of the Unbreakable Cipher . . . 36--40
David Shulman Another Solution to the Sherlockian
Cryptogram . . . . . . . . . . . . . . . 41--41
David Kahn The Market for Encryption . . . . . . . 42--44
James R. Ford The HP-67/97 Cryptograph . . . . . . . . 43--49
Louis Kruh Reminiscences of a Master Cryptologist 45--50
A. Ross Eckler Some Comments on the Use of the HP 67/97
as a Cryptograph . . . . . . . . . . . . 51--53
Brian J. Winkel There and There . . . . . . . . . . . . 54--61
Anonymous Biographies of Contributors . . . . . . 62--63
David Kahn Interviews With Cryptologists . . . . . 65--70
Jack Levine and
Robert E. Hartwig Applications of the Drazin inverse to
the Hill cryptographic system. Part I 71--85
David Shulman A Curious Cryptic Composition . . . . . 86--88
Richard Outerbridge Some Cryptographic and Computing
Applications of the Toshiba LC-836MN
Memo Note 30 Pocket Calculator . . . . . 89--94
Anonymous Ready-Made Love Letters . . . . . . . . 95--95
Philip M. Arnold An apology for Jacopo Silvestri . . . . 96--103
Francis A. Raven ``Memories of the Pacific'': Book
Reviews . . . . . . . . . . . . . . . . 104--108
Rajendra S. Wall Decryption of Simple Substitution
Cyphers With Word Divisions Using a
Content Addressable Memory . . . . . . . 109--115
James J. Gillogly The Beale Cypher: a Dissenting Opinion 116--119
David Kahn Nuggets from the Archives: a Null Code
at the White House . . . . . . . . . . . 120--121
Anonymous Solutions . . . . . . . . . . . . . . . 122--122
Brian J. Winkel Solution to Cryptanalysts' Corner Scotch
Homophonic . . . . . . . . . . . . . . . 122--122
Brian J. Winkel There and There . . . . . . . . . . . . 123--126
Anonymous Biographies of Contributors . . . . . . 127--128
Louis Kruh Cipher Devices: TRS-80 Data Privacy
System . . . . . . . . . . . . . . . . . 181--183
Cipher A. Deavours The Black Chamber: a column. How the
British broke Enigma . . . . . . . . . . 129--132
Herbert S. Bright High-Speed Indirect Cryption . . . . . . 133--139
Donald S. Pady and
Laura S. Kline Finger counting and the identification
of James VI's secret agents . . . . . . 140--149
Jack Levine and
Robert E. Hartwig Applications of the Drazin Inverse to
the Hill Cryptographic System. Part II 150--168
Wayne G. Barker Opportunities for the Amateur
Cryptanalyst Can Be Anywhere . . . . . . 169--172
Louis Kruh ``The Work of a Diplomat'': a Book
Review . . . . . . . . . . . . . . . . . 172--172
David Kahn Spy Ciphers: a Book Review . . . . . . . 173--176
H. Gary Knight Cryptanalysts' Corner . . . . . . . . . 177--180
Louis Kruh Cipher Devices: a Column Cryptext TRS-80
Data Privacy System . . . . . . . . . . 181--183
R. H. Cooper Linear transformations in Galois fields
and their application to cryptography 184--188
Anonymous Biographies of Contributors . . . . . . 189--190
Sir Alfred Ewing Some Special War Work: Part I . . . . . 193--203
M. J. Kochanski Remarks on Lu and Lee's proposals for a
public-key cryptosystem . . . . . . . . 204--207
H. Gary Knight Cryptanalysts' Corner . . . . . . . . . 208--212
Jim Nelson The Development of Commercial
Cryptosystem Standards . . . . . . . . . 213--224
Louis Kruh Cipher Equipment: TST-1221 . . . . . . . 225--229
Boshra H. Makar Transfinite Cryptography . . . . . . . . 230--237
Louis Kruh ``Pearl Harbor Revisited'': a Book
Review . . . . . . . . . . . . . . . . . 237--237
David Kahn A Professional's Challenge . . . . . . . 238--239
Cipher A. Deavours The Black Chamber: a column --- la
méthode des bâtons . . . . . . . . . . . . 240--247
Louis Kruh A Remarkable View of Ancient America: a
Book Review . . . . . . . . . . . . . . 248--249
Anonymous Results of Reader Survey . . . . . . . . 250--251
Anonymous Biographies of Contributors . . . . . . 252--253
Greg Mellen Graphic Solution of a Linear
Transformation Cipher . . . . . . . . . 1--19
David Kahn The Public's Secrets . . . . . . . . . . 20--26
Ronald L. Rivest Statistical Analysis of the Hagelin
Cryptograph . . . . . . . . . . . . . . 27--32
Sir Alfred Ewing Some Special War Work, Part II . . . . . 33--39
Greg Mellen Cryptanalysts' Corner . . . . . . . . . 40--42
Cipher A. Deavours The Black Chamber: a Column Shutting Off
the Spigot in 1981 . . . . . . . . . . . 43--45
Louis Kruh Cipher Equipment: Collins CR-200/220
Data Security Unit . . . . . . . . . . . 46--50
Frank Rubin Decrypting a Stream Cipher Based on J--K
Flip-Flops . . . . . . . . . . . . . . . 51--57
Louis Kruh ``From the Ultra Conference'': a Book
Review . . . . . . . . . . . . . . . . . 58--58
Elliot Fischer A Theoretical Measure of Cryptographic
Performance . . . . . . . . . . . . . . 59--62
Anonymous Biographies of Contributors . . . . . . 63--63
David Kahn German Spy Cryptograms . . . . . . . . . 65--66
Robert E. Hartwig and
Jack Levine Applications of the Drazin inverse to
the Hill cryptographic system. Part III 67--77
Stephen A. Kallis, Jr. The Code-O-Graph Cipher Disks . . . . . 78--83
Gerald Sturges The House Report on Public Cryptography 84--93
John P. Costas The Hand-Held Calculator As a
Cryptographic Machine . . . . . . . . . 94--117
Lee Lembart The Public Cryptography Study Group:
U.S. and Mathematicians in Code Dispute 118--122
Greg Mellen Cryptanalysts' Corner . . . . . . . . . 123--123
Louis Kruh ``A Code Problem'': a Book Review . . . 124--125
Anonymous Biographies of Contributors . . . . . . 126--126
Anonymous Report of the Public Cryptography Study
Group . . . . . . . . . . . . . . . . . 130--142
George I. Davida The Case Against Restraints on
Non-Governmental Research in
Cryptography . . . . . . . . . . . . . . 143--148
Philip M. Arnold Palatino and Bibliander on ciphers . . . 149--154
Louis Kruh ``Reward for Reading and Deciphering'':
a Book Review . . . . . . . . . . . . . 155--157
Elliot Fischer Measuring Cryptographic Performance With
Production Processes . . . . . . . . . . 158--162
R. Creighton Buck Sherlock Holmes in Babylon . . . . . . . 163--173
Louis Kruh Cipher Machine Exhibit at the
Smithsonian Institution . . . . . . . . 174--174
Oskar Stuerzinger The A-22 Cryptograph . . . . . . . . . . 175--183
Brian J. Winkel There and There . . . . . . . . . . . . 184--190
Anonymous Biographies of Contributors . . . . . . 191--191
David Kahn The Genesis of the Jefferson/Bazeries
Cipher Device . . . . . . . . . . . . . 193--208
Louis Kruh The Genesis of the Jefferson/Bazeries
Cipher Device . . . . . . . . . . . . . 193--208
Louis Kruh ``A User's Guide in Voice and Data
Communications Protection'': Book Review 208--212
L. Klingler Letter to the Editor . . . . . . . . . . 209--210
J. Costas Letter to the Editor . . . . . . . . . . 210--212
Robert E. Hartwig and
Jack Levine Applications of the Drazin Inverse to
the Hill Cryptographic System. Part IV 213--228
William Groth Secret Writing Exhibit . . . . . . . . . 229--230
Carl Hammer Higher-Order Homophonic Ciphers . . . . 231--242
Jack Keil Wolf ``Number Theory in Digital Signal
Processing'': a Book Review . . . . . . 243--246
C. A. Deavours Interactive Solution of Columnar
Transposition Ciphers . . . . . . . . . 247--251
Anonymous Biographies of Contributors . . . . . . 252--253
Unknown Letters to the Editor . . . . . . . . . ??
Marian Rejewski Mathematical Solution of the Enigma
Cipher . . . . . . . . . . . . . . . . . 1--18
Christopher Kasparek and
Richard A. Woytak In memoriam Marian Rejewski . . . . . . 19--25
David Kahn Why Germany Lost the Code War . . . . . 26--31
Wldyslaw Kozaczuk Enigma Solved . . . . . . . . . . . . . 32--33
C. A. Deavours The Black Chamber . . . . . . . . . . . 34--37
Louis Kruh `Wilderness of Mirrors'': a Book Review 38--38
Louis Kruh ``Beale Society Material'': Book Reviews 39--39
Ralph V. Anderson If I Remember . . . . . . . . . . . . . 40--44
Greg Mellen Cryptanalysts' Corner . . . . . . . . . 45--46
David Kahn Churchill Pleads for the Intercepts . . 47--49
Richard A. Woytak A Conversation With Marian Rejewski . . 50--60
Bradford Hardie ``Unraveling the Enigma Story'': a Book
Review . . . . . . . . . . . . . . . . . 61--64
William P. Bundy ``From the Depths to the Heights'': Book
Reviews . . . . . . . . . . . . . . . . 65--74
Marian Rejewski Remarks on Appendix 1 to ``British
Intelligence in the Second World War''
by F. H. Hinsley . . . . . . . . . . . . 75--83
David Kahn ``Computer Cryptography'': a Book Review 84--84
Louis Kruh The Navy Cipher Box Mark II . . . . . . 85--93
Anonymous Biographies of Contributors . . . . . . 94--95
Mel L. Barclay and
Joshua S. Barclay Use of Microcomputer System for Medical
Record Encryption and Decryption Using a
Sequential Pseudo-Random Key . . . . . . 97--107
Elliot Fischer The Performance of Hellman's Time-Memory
Trade-Off Against Some Rotor Ciphers . . 108--114
David Kahn A New Source for Historians: Yardley's
Seized Manuscript . . . . . . . . . . . 115--119
David Kahn In Memoriam: Georges-Jean Painvin . . . 120--127
N. J. A. Sloane Error-Correcting Codes and Cryptography.
Part I . . . . . . . . . . . . . . . . . 128--153
Louis Kruh Book Reviews: a Book With a Book Cipher 154--168
Greg Mellen Cryptanalysts' Corner . . . . . . . . . 169--174
C. A. Deavours Konheim's ``Cryptography --- A Primer'':
a Book Review . . . . . . . . . . . . . 175--176
M. C. W. Kaiserling Sirius . . . . . . . . . . . . . . . . . 177--178
Brian J. Winkel There and There --- a Column . . . . . . 179--188
Anonymous Biographies of Contributors . . . . . . 189--190
Dundas P. Tucker Rhapsody in Purple: a New History of
Pearl Harbor --- I . . . . . . . . . . . 193--228
Shimshon Berkovits Factoring via superencryption . . . . . 229--237
Louis Kruh The Mystery of Colonel Decius
Wadsworth's Cipher Device . . . . . . . 238--247
Greg Mellen Cryptanalysts' Corner . . . . . . . . . 248--252
Richard Outerbridge Cryptographic Features of the UNIX
Operating System . . . . . . . . . . . . 253--257
N. J. A. Sloane Error-Correcting Codes and Cryptography.
Part II . . . . . . . . . . . . . . . . 258--278
Donald V. Miller Ciphertext Only Attack on the
Merkle--Hellman Public-Key System under
Broadcast Situations . . . . . . . . . . 279--281
M. C. W. Kaiserling Solution to Sirius Music Cipher . . . . 282--282
C. A. Deavours Helmich and the KL-7 . . . . . . . . . . 283--284
Anonymous Biographies of Contributors . . . . . . 285--286
Donald W. Davies The Siemens and Halske T52E Cipher
Machine . . . . . . . . . . . . . . . . 289--308
Greg Mellen Cryptanalysts' Corner . . . . . . . . . 309--311
Alkiviadis G. Akritas Application of Vincent's Theorem in
Cryptography or One-Time Pads Made
Practical . . . . . . . . . . . . . . . 312--318
M. O. Vahle and
L. F. Tolendino Breaking a Pseudo Random Number Based
Cryptographic Algorithm . . . . . . . . 319--328
Henk Meijer and
Selim Akl Digital Signature Schemes . . . . . . . 329--338
Richard Outerbridge A Pedagogical Cipher . . . . . . . . . . 339--345
Dundas P. Tucker Rhapsody in Purple: a New History of
Pearl Harbor: Part Two of Two . . . . . 346--367
Stephen A. Kallis A Child's Garden of Cryptography . . . . 368--377
Louis Kruh A Basic Probe of the Beale Cipher as a
Bamboozlement . . . . . . . . . . . . . 378--382
Anonymous Biographies of Contributors . . . . . . 383--384
David Kahn The Crypto '82 Conference, a Report on
[the] Conference . . . . . . . . . . . . 1--5
Greg Mellen Cryptanalysts' Corner . . . . . . . . . 6--11
Denis R. Floyd Annotated bibliography in conventional
and public key cryptography . . . . . . 12--24
S. Brent Morris Fraternal Cryptography: Cryptographic
Practices of American Fraternal
Organizations . . . . . . . . . . . . . 27--36
H. Jurgensen Language Redundancy and the Unicity
Point . . . . . . . . . . . . . . . . . 37--48
Viiveke Fak Cryptographic Protection of Files in An
Automated Office System . . . . . . . . 49--62
Boshra H. Makar Application of a certain class of
infinite matrices to the Hill
cryptographic system . . . . . . . . . . 63--78
Thomas H. Dyer ``The Power of Magic'': a Book Review 79--82
Louis Kruh Cipher Equipment: the Cryptographic Unit
CSI-10 . . . . . . . . . . . . . . . . . 83--88
Elliot Fischer Uncaging the Hagelin Cryptograph . . . . 89--92
Anonymous Biographies of Contributors . . . . . . 93--94
John B. Lundstrom A Failure of Radio Intelligence: An
Episode in the Battle of the Coral Sea 97--118
Brig. Gen. Carter W. Clarke From the Archives: Statement for Record
of Participation of Brig. Gen. Carter W.
Clarke, GSC in the Transmittal of
Letters from Gen. George C. Marshall to
Gov. Thomas E. Dewey, the Latter Part of
September, 1944 . . . . . . . . . . . . 119--131
John F. Bratzel and
Leslie B. Rout Abwehr Ciphers in Latin America . . . . 132--144
Louis Kruh and
C. A. Deavours The Typex Cryptograph . . . . . . . . . 145--166
Greg Mellen Cryptanalysis' Corner . . . . . . . . . 167--169
Babacar Alassane Ndam and
Amadou Sarr The Problem of Reciprocity in a
Delastelle Digraphic Substitution . . . 170--179
Gustavus J. Simmons A ``Weak'' Privacy Protocol Using the
RSA Crypto Algorithm . . . . . . . . . . 180--182
Henk Meijer and
Selim Akl Remarks on a Digital Signature Scheme 183--186
C. A. Deavours The View From Across the Pond: An
Interview With the Geneva Management
Group . . . . . . . . . . . . . . . . . 187--190
Anonymous Biographies of Contributors . . . . . . 191--192
Gerhard F. Strasser The Noblest Cryptologist: Duke August
the Younger of Brunswick--Luneburg
(Gustavus Selenus) and his Cryptological
Activities . . . . . . . . . . . . . . . 193--217
Donald H. Bennett An Unsolved Puzzle Solved . . . . . . . 218--234
Donald W. Davies The Early Models of the Siemens and
Halske T52 Cipher Machine . . . . . . . 235--253
David Kahn Eurocrypt 83: a Report . . . . . . . . . 254--256
Christian Mueller-Schloer DES-Generated Checksums for Electronic
Signatures . . . . . . . . . . . . . . . 257--273
Greg Mellen Cryptanalysts' Corner . . . . . . . . . 274--277
Louis Kruh and
Greg Mellen Book, Movie, Article and Game Reviews 278--286
Anonymous Biographies of Contributors . . . . . . 287--288
Louis Kruh How to Use the German Enigma Cipher
Machine: a Photographic Essay . . . . . 291--296
Albert C. Leighton and
Stephen M. Matyas The Search for the Key Book to Nicholas
Trist's Book Ciphers . . . . . . . . . . 297--314
Anonymous From the archives: Examples of
Intelligence Obtained from
Cryptanalysis, 1 August 1946 . . . . . . 315--326
Peter Winkler The Advent of Cryptology in the Game of
Bridge . . . . . . . . . . . . . . . . . 327--332
Oskar Stuerzinger The B-21 Cryptograph . . . . . . . . . . 333--346
Hugo Brändström A public-key cryptosystem based upon
equations over a finite field . . . . . 347--358
Daniel Wolf ROTERM: a Microprocessor Based Cipher
Terminal System . . . . . . . . . . . . 359--370
Greg Mellen Cryptanalysts' Corner . . . . . . . . . 371--374
Louis Kruh Book Reviews . . . . . . . . . . . . . . 375--379
Anonymous Biographies of Contributors . . . . . . 380--381
J. Levine U.S. Cryptographic Patents 1861--1981 ??
Gustavus J. Simmons A System for Verifying User Identity and
Authorization at the Point-Of Sale or
Access . . . . . . . . . . . . . . . . . 1--21
Arthur Sorkin LUCIFER, a Cryptographic Algorithm . . . 22--42
Louis Kruh and
Greg Mellen Reviews of Things Cryptologic . . . . . 43--53
Louis Kruh Who Did It? . . . . . . . . . . . . . . 54--54
Greg Mellen Cryptanalysts' Corner . . . . . . . . . 55--57
David Kahn Cipher Machine Inventor --- Boris
Hagelin Dies . . . . . . . . . . . . . . 60--61
Herbert O. Yardley From the archives: Achievements of
Cipher Bureau MI-8 During the First
World War. Documents by Major Herbert O.
Yardley Prepared Under the Direction of
the Chief Signal Officer, 25 May 1945,
SPSIS-1. Signal Security Agency.
Washington, DC . . . . . . . . . . . . . 62--74
Louis Kruh Because of the Freedom of Information
Act (FOIA) . . . . . . . . . . . . . . . 75--77
Louis Kruh Cipher Devices . . . . . . . . . . . . . 78--79
James J. Gillogly The Mysterious Autocryptograph . . . . . 79--81
Donald W. Davies The Autocryptograph . . . . . . . . . . 82--92
Anonymous Biographies of Contributors . . . . . . 93--94
Charles T. Retter Cryptanalysis of a Maclaren--Marsaglia
System . . . . . . . . . . . . . . . . . 97--108
Anonymous Project on Secrecy and Openness in
Scientific and Technical Communication 109--111
Louis Kruh Hand-Held Crypto Device SEC-36 . . . . . 112--114
Donald W. Davies Sidney Hole's Cryptographic Machine . . 115--126
Louis Kruh Literature Reviews . . . . . . . . . . . 127--131
Borge Tilt On Kullback's $ \chi $-tests for
matching and non-matching multinomial
distributions . . . . . . . . . . . . . 132--141
John M. Carroll and
Pierre G. Laurin Software Protection for Microcomputers 142--160
Jack Levine Corrections for Published Copy of United
States Cryptographic Patents: 1861--1981 161--162
Louis Kruh The Slidex RT Code . . . . . . . . . . . 163--172
Ralph Erskine ``British Intelligence --- Volume II''
--- Book Review . . . . . . . . . . . . 173--180
Anonymous From the Archives: Codes and Ciphers for
Combined Air-Amphibian Operations . . . 181--186
David Shulman An Unknown Cipher Disk . . . . . . . . . 187--190
Anonymous Biographical Sketches . . . . . . . . . 191--192
Thomas R. Hammant The Origins of Russian Navy
Communications Intelligence . . . . . . 193--202
Francis Guelker A Cryptographer's War Memories . . . . . 203--207
Robert Weller Rear Admiral Joseph N. Wenger USN (Ret)
and the Naval Cryptologic Museum . . . . 208--234
Philip M. Arnold ``A View of Renaissance Cryptography''
--- a Book Review . . . . . . . . . . . 235--241
C. A. Deavours Reflections on the ``State of the Art'' 242--245
Louis Kruh Cryptology and the Law . . . . . . . . . 246--248
Louis Kruh Cipher Equipment . . . . . . . . . . . . 249--249
Donald W. Davies Sir Percy Scott's Cypher . . . . . . . . 250--252
John M. Delaurentis A further weakness in the Common Modulus
Protocol for the RSA cryptoalgorithm . . 253--259
John M. Carroll The Resurrection of Multiple-Key Ciphers 262--265
G. R. Blakley AAAS Crypto Sessions Proceedings: Review 266--269
Greg Mellen Cryptanalysts' Corner . . . . . . . . . 270--275
Louis Kruh Cipher Equipment: Tst 3336 and Tst 9761 278--284
Robert R. Jueneman IACR Announces Bulletin Board Service 285--286
Anonymous Biographies of Contributors . . . . . . 287--288
Louis Kruh The Heraldry of Cryptology . . . . . . . 289--301
O. G. Landsverk Cryptography in Runic Inscriptions . . . 302--319
Greg Mellen Cryptanalysts' Corner . . . . . . . . . 320--325
Louis Kruh Cryptology and the Law . . . . . . . . . 326--331
Ralph Erskine \booktitleAlan Turing: The Enigma ---
Book Review . . . . . . . . . . . . . . 332--336
Solomon Kullback Looking Back . . . . . . . . . . . . . . 337--342
Rodney Cooper and
Wayne Patterson A generalization of the knapsack
algorithm using Galois fields . . . . . 343--347
Roland Anderson Finding Vowels in Simple Substitution
Ciphers by Computer . . . . . . . . . . 348--359
C. A. Deavours and
Brian J. Winkel ``Cryptanalysis of Shift Stream
Generated Stream Cipher Systems'': Book
Review . . . . . . . . . . . . . . . . . 360--363
Louis Kruh There and There --- Reviews and News . . 364--373
Anonymous Biographies of Contributors . . . . . . 379--380
Unknown Alan Turing: The Enigma . . . . . . . . ??
David Kahn The Annotated The American Black Chamber 1--37
Louis Kruh An Armchair View of the Smithsonian
Institution Cipher Machine Exhibit . . . 38--51
Ralph Erskine An Early Success Story . . . . . . . . . 52--54
James J. Gillogly Fast Pattern Matching for Word Lists . . 55--62
Ole Immanuel Franksen Expert Witness . . . . . . . . . . . . . 63--69
Greg Mellen Cryptanalysts' Corner . . . . . . . . . 70--74
Robert Scott Wide-Open Encryption Design Offers
Flexible Implementations . . . . . . . . 75--91
Master Sgt. Charles Murray The Crypt Bug . . . . . . . . . . . . . 92--92
Anonymous Biographies of Contributors . . . . . . 95--96
John R. Michener The ``Generalized Rotor'' Cryptographic
Operator and Some of Its Applications 97--113
Charles T. Retter A Key-Search Attack on
Maclaren--Marsaglia Systems . . . . . . 114--130
Douglas W. Mitchell A Polygraphic Substitution Cipher Based
on Multiple Interlocking Applications of
Playfair . . . . . . . . . . . . . . . . 131--139
V. Varadharajan and
R. Odoni Extension of RSA cryptosystems to matrix
rings . . . . . . . . . . . . . . . . . 140--153
Louis Kruh Cipher Equipment . . . . . . . . . . . . 154--154
Donald W. Davies Charles Wheatstone's Cryptograph and
Pletts' Cipher Machine . . . . . . . . . 155--160
Greg Mellen Cryptanalysts' Corner . . . . . . . . . 161--166
Robert Price A conversation with Claude Shannon: one
man's approach to problem solving . . . 167--175
Louis Kruh Reviews of the Literature . . . . . . . 176--186
Anonymous Biographies of Contributors . . . . . . 188--189
John R. Michener Application of the Generalized Rotor
Cryptographic Operator in the
Construction of Substitution-Permutation
Network Block Codes . . . . . . . . . . 193--201
Joseph R. Kruskal A Trigraph Cipher With a Short Key for
Hand Use . . . . . . . . . . . . . . . . 202--222
H. C. Williams Some Public-Key Crypto-Functions as
Intractable as Factorization . . . . . . 223--237
Richard Outerbridge DEA and Lucifer Available on Compuserve 238--239
Fred W. Kranz Early History of Riverbank Acoustical
Laboratories . . . . . . . . . . . . . . 240--246
Brian J. Winkel There and There --- a Column of News . . 247--251
Louis Kruh The Kryha Liliput Ciphering Machine . . 252--261
Ralph Erskine British Intelligence --- Volume 3, Part
1 --- Book Review . . . . . . . . . . . 262--272
Louis Kruh Cryptology and the Law --- III . . . . . 273--285
Anonymous Biographies of Contributors . . . . . . 287--288
Greg Mellen Cryptanalysts' Corner . . . . . . . . . 289--293
Louis Kruh and
Ralph Erskine Review of Things Cryptologic . . . . . . 294--305
Anonymous Forty One and Strong: Arlington Hall
Station . . . . . . . . . . . . . . . . 306--310
Louis Kruh Automatic Communications With the SIGABA
and the M-294 . . . . . . . . . . . . . 311--315
Ralph Erskine ``Enigma and the Polish Contribution'':
Book Review . . . . . . . . . . . . . . 316--323
Louis Kruh Early communications security in the
U.S. Navy . . . . . . . . . . . . . . . 324--331
Robert I. Atha Bombe! ``I Could Hardly Believe It!'' 332--336
Henry D. Ephron An American Cryptanalyst in Australia 337--340
Louis Kruh Cryptology and the Law --- IV . . . . . 348--350
David August Information Theoretic Approach to Secure
LSFR Ciphers . . . . . . . . . . . . . . 351--359
Masahiro Yagisawa A New Method for Realizing Public-Key
Cryptosystem . . . . . . . . . . . . . . 360--371, 380
Russell Atkinson Ciphers in Oriental Languages . . . . . 373--380
Anonymous Biographies of Contributors . . . . . . 381--382
Brian J. Winkel Letter From One of the Editors . . . . . 1--1
Louis Kruh The Control of Public Cryptography and
Freedom of Speech --- a Review . . . . . 2--9
Anonymous Biographies of Contributors . . . . . . 9--9
Roland Anderson Improving the Machine Recognition of
Vowels in Simple Substitution Ciphers 10--22
Mike Barlow A Machine Solution of the AMSCO Cipher 23--33
Frode Weierud Machine Secrets: a Book Review . . . . . 34--37
David Kahn Secrets of the Codebreakers . . . . . . 38--41
Louis Kruh Announcements and Reviews of Things
Cryptologic . . . . . . . . . . . . . . 42--45
C. A. Deavours Elle a de l'intelligence et de la
conversation . . . . . . . . . . . . . . 47--49
Ralph Erskine From the Archives: GC and CS Mobilizes
'Men of the Professor Type' . . . . . . 50--59
Louis Kruh 18th Century Shorthand Expert Needed . . 60--62
Louis Kruh Cipher Equipment . . . . . . . . . . . . 63--63
Donald W. Davies Cipher Equipment: Bolton's Cypher Wheel 64--64
Louis Kruh The Truman Memorandum . . . . . . . . . 65--74
Charles-Hubert Desnoyers Cryptanalytic Essay --- Part I: Solution
of Problem No. 166 Published in
Elementary Cryptanalysis . . . . . . . . 75--95
Yves Roggeman Remarks on the auto-correlation function
of binary periodic sequences . . . . . . 96--100
Louis Kruh Cryptology and the Law --- V . . . . . . 101--107
Louis Kruh Reviews of Things Cryptologic . . . . . 110--122
Martin Minow No Title . . . . . . . . . . . . . . . . 123--125
Louis Kruh 18th Century Shorthand Expert Needed
(Re-Run) . . . . . . . . . . . . . . . . 126--127
Anonymous Biographies of Contributors . . . . . . 128--128
Unknown Has Dr. Thouless Survived Death? . . . . ??
Louis Kruh Cryptology and the Law --- VI . . . . . 129--133
Gilbert Bloch and
Ralph Erskine Enigma: the Dropping of the Double
Encipherment . . . . . . . . . . . . . . 134--141
Richard Outerbridge Some Design Criteria for Feistel-Cipher
Key Schedules . . . . . . . . . . . . . 142--156
Charles-Hubert Desnoyers Cryptanalytic Essay --- Part II:
Solution of Problem No. 166 Published in
Elementary Cryptanalysis . . . . . . . . 158--183
Louis Kruh Reviews of Things Cryptologic . . . . . 184--191
Anonymous Biographies of Contributors . . . . . . 192--192
John M. Carroll and
Steve Martin The Automated Cryptanalysis of
Substitution Ciphers . . . . . . . . . . 193--209
Michael Barlow The Voynich Manuscript --- By Voynich? 210--216
Frank Rubin Foiling the Known-Plaintext Attack . . . 217--223
Anonymous Free IBM-PC Encryption Software . . . . 224--224
Richard Outerbridge Cadbury Code Confidential . . . . . . . 225--226
Ralph Erskine ``A Link With Pearl Harbor?'' Book
Review . . . . . . . . . . . . . . . . . 227--229
Wolfgang W. Mache Geheimschreiber . . . . . . . . . . . . 230--242
Cipher A. Deavours and
Louis Kruh Appendix: Mechanics of the German
Telecipher Machine . . . . . . . . . . . 243--247
Louis Kruh Cryptology and the Law --- VII . . . . . 248--253
Anonymous Biographies of Contributors . . . . . . 254--255
Martin Kochanski A Survey of Data Insecurity Packages . . 1--15
Robert Winternitz and
Martin Hellman Chosen-Key Attacks on a Block Cipher . . 16--20
Samuel M. Levitin Equivalence Classes: Toward More
Efficient Search . . . . . . . . . . . . 21--28
Joseph S. Schick With the 849th SIS, 1942--45 . . . . . . 29--39
Bradford Hardie The POTUS-Prime Connection: Two Notes
(1) Roosevelt, Churchill, and Me . . . . 40--43
Anonymous (2) History of Converter M-134-C Top
Secret Chapter XVIII. the Zero Machine 44--46
C. A. Deavours Cryptology Courses at Kean College . . . 47--50
Louis Kruh Reviews and Things Cryptologic . . . . . 51--63
William P. Bundy Some of My Wartime Experiences . . . . . 65--77
Patrick Beesly Who Was the Third Man at Pyry? . . . . . 78--80
David Kahn The Codebreaker Behind the Footlights 81--84
Linda Y. Gouaz Needles and Haystacks: the Search for
Ultra in the 1930's (An Excerpt) . . . . 85--92
James J. Gillogly Breaking An Eighteenth Century Shorthand
System . . . . . . . . . . . . . . . . . 93--98
Anonymous Cadbury Caper or Cipher? . . . . . . . . 99--101
Frank Rubin Foiling An Exhaustive Key-Search Attack 102--107
John R. Michener The Use of Complete, Nonlinear, Block
Codes for Nonlinear, Noninvertible
Mixing of Pseudorandom Sequences . . . . 108--111
Robert M. Richardson Digital Encryption Standard Users Group 112--114
Tom Cheatham Message Decryption and Spelling Checkers 115--118
Louis Kruh An Obscure Cryptographic Device . . . . 119--122
Louis Kruh Reviews and Things Cryptologic . . . . . 123--128
Paul Whitaker and
Louis Kruh From Bletchley Park to Berchtesgaden . . 129--141
Gilbert Bloch and
C. A. Deavours ENIGMA Before ULTRA: Polish Work and the
French Contribution . . . . . . . . . . 142--155
Louis Kruh The Shortsighted View of a Foresighted
Admiral . . . . . . . . . . . . . . . . 156--159
Anonymous From the Archives: Memorandum on
Non-Military Codes and Ciphers . . . . . 160--161
C. A. Deavours Sois Belle et Tais-Toi . . . . . . . . . 162--165
John R. Michener The Application of Key Dependent and
Variable Rotor Sets to Generalized Rotor
Cryptographic Systems . . . . . . . . . 166--171
Justo Sancho Enumeration of multivariable
decipherable Boolean functions . . . . . 172--181
Subhash C. Kak The Study of the Indus Script General
Considerations . . . . . . . . . . . . . 182--191
John M. Carroll and
Lynda Robbins The Automated Cryptanalysis of
Polyalphabetic Ciphers . . . . . . . . . 193--205
John Bennett Analysis of the Encryption Algorithm
Used in the WordPerfect Word Processing
Program . . . . . . . . . . . . . . . . 206--210
Jack Levine and
Richard Chandler Some further cryptographic applications
of permutation polynomials . . . . . . . 211--218
William F. Clarke Government Code and Cypher School: Its
Foundation and Development With Special
Reference to Its Naval Side . . . . . . 219--226
Gilbert Bloch and
C. A. Deavours Enigma Before Ultra: the Polish Success
and Check (1933--1939) . . . . . . . . . 227--234
Ralph Erskine and
Frode Weierud Naval Enigma: M4 and Its Rotors . . . . 235--244
Louis Kruh British Rockex Cipher Machines . . . . . 245--247
Louis Kruh and
Ralph Erskine Reviews and Things Cryptologic . . . . . 248--253
Michael Barlow Voynich Solved? . . . . . . . . . . . . ??
Peter K. Pearson Cryptanalysis of the Ciarcia Circuit
Cellar Data Encryptor . . . . . . . . . 1--10
Carl Hammer Second Order Homophonic Ciphers . . . . 11--20
John Michener Recent Developments in Electronic
Circuitry and Their Effects on the
Implementation of
Substitution-Permutation Block Codes . . 21--24
Frank Rubin The cryptographic uses of Post tag
systems . . . . . . . . . . . . . . . . 25--33
Louis Kruh and
Ralph Erskine and
Michael Barlow Reviews and Things Cryptologic . . . . . 37--51
William F. Clarke The Years Between . . . . . . . . . . . 52--58
Ralph Erskine From the Archives: Tunny Decrypts . . . 59--61
Jonathan P. Arnold Herbert O. Yardley, Gangbuster . . . . . 62--64
Louis Kruh Stimson, the Black Chamber, and the
``Gentlemen's Mail'' Quote . . . . . . . 65--89
William F. Clarke Bletchley Park 1941--1945 . . . . . . . 90--97
Ralph Erskine From the Archives: U-Boat HF WT
Signalling . . . . . . . . . . . . . . . 98--106
Peter Wayner A Redundancy Reducing Cipher . . . . . . 107--112
Subhash Kak The \=Aryabha\dta cipher . . . . . . . . 113--117
Louis Kruh Reviews and Things Cryptologic . . . . . 118--127
Subhash C. Kak A Frequency Analysis of the Indus Script 129--143
Carl M. Ellison A solution of the Hebern messages . . . 144--158
Peter Jamnig Securing the RSA-cryptosystem against
cycling attacks . . . . . . . . . . . . 159--164
Martin Kochanski Another Data Insecurity Package . . . . 165--173 (or 165--177??)
William F. Clarke Post War Organization . . . . . . . . . 174--177
Gilbert Bloch and
C. A. Deavours Enigma Avant Ultra, Enigma Before Ultra 178--184
Louis Kruh Reviews and Things Cryptologic . . . . . 185--192
John M. Carroll and
Lynda E. Robbins Using binary derivatives to test an
enhancement of DES . . . . . . . . . . . 193--208
Donald V. Miller Cryptanalysis of a Two Round Version of
DES Using Index Implications . . . . . . 209--219
Robert Matthews An Empirical Method for Finding the
Keylength of Periodic Ciphers . . . . . 220--224
Kaoru Kurosawa and
Toshiya Ito and
Masashi Takeuchi Public key cryptosystem using a
reciprocal number with the same
intractability as factoring a large
number . . . . . . . . . . . . . . . . . 225--233
Richard I. Polis European Needs and Attitudes Towards
Information Security . . . . . . . . . . 234--239
Louis Kruh and
Johnnie Murray A Pulp Magazine Cipher . . . . . . . . . 240--240
Louis Kruh The Beale Cipher As a Bamboozlement ---
Part II . . . . . . . . . . . . . . . . 241--246
C. A. Deavours Interactive Solution of Beaufort
Enciphered Text With Overlapping Keys 247--255
Mike Barlow A Mathematical Word Block Cipher . . . . 256--264
Louis Kruh Reviews and Things Cryptologic . . . . . 265--269
Jack Levine and
Richard Chandler The Hill cryptographic system with
unknown cipher alphabet but known
plaintext . . . . . . . . . . . . . . . 1--28
Robert Matthews On the derivation of a ``chaotic''
encryption algorithm . . . . . . . . . . 29--42
Jeff Belkora Belkoranic Hill Ciphering . . . . . . . 43--49
Gary R. Greenfield A Cryptography Course for the University
of Richmond . . . . . . . . . . . . . . 50--60
Roland Anderson Cryptanalytic Properties of Short
Substitution Ciphers . . . . . . . . . . 61--72
Subhash C. Kak A New Method for Coin Flipping by
Telephone . . . . . . . . . . . . . . . 73--78
Louis Kruh The Heraldry of Cryptology --- Addendum 79--84
Louis Kruh and
Ralph Erskine Reviews and Things Cryptologic . . . . . 85--96
Wolfgang W. Mache The Siemens Cipher Teletype in the
History of Telecommunications . . . . . 97--117
William F. Clarke Post War Organization . . . . . . . . . 118--122
Louis Kruh British--American Cryptanalytic
Cooperation and an Unprecedented
Admission by Winston Churchill . . . . . 123--134
Ralph Erskine From the Archives: a Bletchley Park
Assessment of German Intelligence on
Torch . . . . . . . . . . . . . . . . . 135--142
Lt. Gen. Charles R. Myer Viet Cong Sigint and U.S. Army COMSEC in
Vietnam . . . . . . . . . . . . . . . . 143--150
George Georgiou A Method to Strengthen Ciphers . . . . . 151--160
Roland Anderson Recognizing Complete and Partial
Plaintext . . . . . . . . . . . . . . . 161--166
Louis C. Guillou and
Marc Davio and
Jean-Jacques Quisquater Public-Key Techniques: Randomness and
Redundancy . . . . . . . . . . . . . . . 167--189
David Kahn A Soviet Wiretapping Office . . . . . . 190--191
Carl Boyd Anguish under Siege: High-Grade Japanese
Signal Intelligence and the Fall of
Berlin . . . . . . . . . . . . . . . . . 193--209
C. A. Deavours A Ku Klux Klan Cipher . . . . . . . . . 210--214
Louis Kruh Reviews and Things Cryptologic . . . . . 215--242
Daniel D. Wheeler Problems With Chaotic Cryptosystems . . 243--250
C. A. Deavours and
Louis Kruh The Swedish HC-9 Ciphering Machine . . . 251--265
Robert Matthews A Rotor Device for Periodic and
Random-Key Encryption . . . . . . . . . 266--272
Deane R. Blackman The Gromark Cipher, and Some Relatives 273--282
Unknown OSS Cryptographic Plan . . . . . . . . . 283--287
David A. August Cryptography and Exploitation of Chinese
Manual Cryptosystems: Part I: The
Encoding Problem . . . . . . . . . . . . 289--302
John M. Carroll and
Lynda E. Robbins Computer Cryptanalysis of Product
Ciphers . . . . . . . . . . . . . . . . 303--326
Louis Kruh Tales of Yardley: Some Sidelights to His
Career . . . . . . . . . . . . . . . . . 327--358
David August Information theoretic approach to secure
LSFR ciphers . . . . . . . . . . . . . . 351--359
Louis Kruh Reviews and Things Cryptologic . . . . . 359--377
Unknown From the archives: Compromise of a Navy
Code . . . . . . . . . . . . . . . . . . 378--381
F. H. Hinsley British Intelligence in the Second World
War: An Overview . . . . . . . . . . . . 1--10
Frank W. Lewis The Day of the Dodo . . . . . . . . . . 11--27
Stanley H. Lipson and
Francine Abeles The Matrix Cipher of C. L. Dodgson . . . 28--36
Daniel S. Vogel Inside a KGB Cipher . . . . . . . . . . 37--52
John Rabson and
Hugo Rabson The War Office HK POW Cypher System . . 53--60
David A. August Cryptography and Exploitation of Chinese
Manual Cryptosystems. Part II: The
Encrypting Problem . . . . . . . . . . . 61--78
Subhash C. Kak The Vararuchi Cipher . . . . . . . . . . 79--82
Louis Kruh Reviews and Things Cryptologic . . . . . 83--89
Rear Admiral (disch.) Luigi Donini and
Augusto Buonafalce The Cryptographic Services of the Royal
British and Italian Navies . . . . . . . 97--127
Francine Abeles and
Stanley H. Lipson Some Victorian Periodic Polyalphabetic
Ciphers . . . . . . . . . . . . . . . . 128--134
Brian Leigh Dunnigan and
Frank Lewis and
Mike Barlow The Niagara Cipher --- Part I . . . . . 135--138
C. A. Deavours and
Louis Kruh The Swedish HC-9 Ciphering Machine
Challenge . . . . . . . . . . . . . . . 139--144
H. Paul Greenough Cryptanalysis of the Uncaged Hagelin . . 145--161
C. A. Deavours Solution of C-35 Texts With Partial Key
Overlaps . . . . . . . . . . . . . . . . 162--168
Subhash C. Kak Indus and Brahmi --- Further Connections 169--183
Louis Kruh Reviews and Things Cryptologic . . . . . 184--191
John Byrne and
Cipher A. Deavours and
Louis Kruh Chaocipher Enters the Computer Age When
its Method Is Disclosed to Cryptologia
Editors . . . . . . . . . . . . . . . . 193--198
Brian Leigh Dunnigan and
Frank Lewis and
Mike Barlow The Niagara cipher --- Part II . . . . . 199--203
Wladyslaw Kozaczuk A New Challenge for an Old ENIGMA ---
Buster . . . . . . . . . . . . . . . . . 204--216
Charles Connell An Analysis of NEWDES: a Modified
Version of DES . . . . . . . . . . . . . 217--224
William A. Kiele A Tensor --- Theoretic Enhancement to
the Hill Cipher System . . . . . . . . . 225--233
Louis Kruh Reviews and Things Cryptologic . . . . . 234--252
Louis Kruh Why Was Safford Pessimistic About
Breaking the German ENIGMA Cipher
Machine in 1942? . . . . . . . . . . . . 253--257
Robert W. Baldwin and
Alan T. Sherman How We Solved the US\$100,000} Decipher
Puzzle (16 Hours Too Late) . . . . . . . 258--284
Ross J. Anderson Solving a Class of Stream Ciphers . . . 285--288
Terry Ritter Substitution Cipher with Pseudo-Random
Shuffling The Dynamic Substitution
Combiner . . . . . . . . . . . . . . . . 289--303
Henry D. Ephron S. I. S./CB . . . . . . . . . . . . . . 304--330
C. A. Deavours and
Louis Kruh The Turing0 Bombe: Was it Enough? . . . 331--349
Douglas W. Mitchell Nonlinear Key Generators . . . . . . . . 350--354
Caxton C. Foster Vowel Distribution as a Clue to Vowel
Identification . . . . . . . . . . . . . 355--362
Louis Kruh Reviews and Things Cryptologic . . . . . 363--373
Ralph E. Weber A Masked Dispatch . . . . . . . . . . . 374--380
Terry Ritter Transposition Cipher with Pseudo-random
Shuffling: The Dynamic Transposition
Combiner . . . . . . . . . . . . . . . . 1--17
Stanley H. Lipson and
Francine Abeles The Key--Vowel Cipher of Charles S.
Dodgson . . . . . . . . . . . . . . . . 18--24
Louis Kruh Military Intelligence Corps Hall of Fame 25--28
Louis Kruh Correspondence in Cipher --- a Cipher
Typewriter Catalogue . . . . . . . . . . 29--42
Charles Schwartz A New Graphical Method for Encryption of
Computer Data . . . . . . . . . . . . . 43--46
Lt. Susan M. Lujan, USNR Agnes Meyer Driscoll . . . . . . . . . . 47--56
H. A. Bergen and
W. J. Caelli File Security in WordPerfect 5.0 . . . . 57--66
Louis Kruh Reviews and Things Cryptologic . . . . . 67--80
Terry Ritter The Efficient Generation of
Cryptographic Confusion Sequences . . . 81--139
Daniel D. Wheeler and
Robert A. J. Matthews Supercomputer Investigations of a
Chaotic Encryption Algorithm . . . . . . 140--152
Colin Burke and
Ralph Erskine Letters to the Editor: Re: Safford
Article . . . . . . . . . . . . . . . . 153--160
Jacques B. M. Guy Letter to the Editor: Re: Voynich
Manuscript . . . . . . . . . . . . . . . 161--166
Louis Kruh Reviews and Things Cryptologic . . . . . 167--176
Gilles Garon and
Richard Outerbridge DES Watch: An Examination of the
Sufficiency of the Data Encryption
Standard for Financial Institution
Information Security in the 1990's . . . 177--193
Ross J. Anderson Tree Functions and Cipher Systems . . . 194--202
Yvo G. Desmedt The ``$A$'' cipher does not necessarily
strengthen security . . . . . . . . . . 203--206
Jacques B. M. Guy Statistical Properties of the Two Folios
of the Voynich Manuscript . . . . . . . 207--218
Lambros D. Callimahos The Legendary William F. Friedman . . . 219--236
Louis Kruh and
Paul Edden Seizing the ENIGMA: Two Reviews of One
Book . . . . . . . . . . . . . . . . . . 237--240
Louis Kruh Reviews and Things Cryptologic . . . . . 241--246
William F. Friedman Information Regarding Cryptographic
Systems Submitted for Use by the
Military Service and Forms to be Used 247--257
Jacques B. M. Guy Vowel Identification: An Old (But Good)
Algorithm . . . . . . . . . . . . . . . 258--262
William F. Friedman A Brief History of the Signal
Intelligence Service by the Military
Service and Forms to be Used . . . . . . 263--272
David Kahn Pearl Harbor and the Inadequacy of
Cryptanalysis . . . . . . . . . . . . . 273--294
Frederick D. Parker The Unsolved Messages of Pearl Harbor 295--313
Roland Anderson Extending the Concept of Interval . . . 314--324
Louis Kruh Reviews and Things Cryptologic . . . . . 325--334
Anonymous From the Archives: Security of Ultra
Dexter and Rabid Intelligence War
Department . . . . . . . . . . . . . . . 341--354
Daniel D. Wheeler Problems with Mitchell's Nonlinear Key
Generators . . . . . . . . . . . . . . . 355--363
Louis Kruh Reviews and Things Cryptologic . . . . . 1--22
Bill Robinson The Fall and Rise of Cryptanalysis in
Canada . . . . . . . . . . . . . . . . . 23--38
Ralph Erskine The German Naval Grid in World War II 39--51
John M. Carroll and
Jeff Verhagen and
Perry T. Wong Chaos in Cryptography: The Escape from
the Strange Attractor . . . . . . . . . 52--72
Krzysztof Gaj Polish Cipher Machine --- LUCIDA . . . . 73--80
Louis Kruh ``Betrayal at Pearl Harbor'': Book
Review . . . . . . . . . . . . . . . . . 81--85
Louis Kruh Sliding Code Device of Unknown Origin 86--88
Ibrahim A. Al-Kadit Origins of cryptology: The Arab
contributions . . . . . . . . . . . . . 97--126
John Rabson All Are Well at Boldon: a Mid-Victorian
Code System . . . . . . . . . . . . . . 127--135
Robert McLaughlin Yet Another Machine to Break DES . . . . 136--144
Louis Kruh Army--Navy Collaboration for
Cryptanalysis of Enemy Systems . . . . . 145--164
George T. Sassoon The Application of Sukhotin's Algorithm
to Certain Non-English Languages . . . . 165--173
David Alvarez A Papal Diplomatic Code . . . . . . . . 174--176
William A. Webb A Public-Key Cryptosystem Based on
Complementing Sets . . . . . . . . . . . 177--181
Louis Kruh Reviews and Things Cryptologic . . . . . 182--190
Peter Wayner Mimic Functions . . . . . . . . . . . . 193--214
John C. King and
Dennis R. Bahler An Implementation of Probabilistic
Relaxation in the Cryptanalysis of
Simple Substitution Ciphers . . . . . . 215--225
Ross Anderson Chaos and Random Numbers . . . . . . . . 226--226
Ken Shirriff and
Curt Welch and
Andrew Kinsman Decoding a VCR Controller Code . . . . . 227--234
Louis Kruh Reviews and Things Cryptologic . . . . . 235--249
Douglas W. Mitchell ``Rubik's Cube'' As a Transposition
Device . . . . . . . . . . . . . . . . . 250--256
Alison L. Oswald William Frederick Friedman: a Pictorial
Essay . . . . . . . . . . . . . . . . . 257--264
Lieutenant L. F. Safford From the Archives: The Functions and
Duties of the Cryptography Section,
Naval Communications . . . . . . . . . . 265--281
Caxton C. Foster A Comparison of Vowel Identification
Methods . . . . . . . . . . . . . . . . 282--286
David Kahn Roosevelt, MAGIC, and ULTRA . . . . . . 289--319
Anonymous From the Archives: Strategic Use of
Communications During the World War . . 320--326
Peter P. Fagone Partial Solutions of Swift's 18th
Century Mock Latin Passages . . . . . . 327--338
Louis Kruh Reviews and Things Cryptologic . . . . . 339--346
David W. Gaddy Rochford's Cipher: a Discovery in
Confederate Cryptography . . . . . . . . 347--362
Jack Levine and
Richard Chandler The Two-message Problem in the Hill
Cryptographic System with Unknown Cipher
Alphabet . . . . . . . . . . . . . . . . 1--30
Richard Spillman and
Mark Janssen and
Bob Nelson and
Martin Kepner Use of a Genetic Algorithm in the
Cryptanalysis of Simple Substitution
Ciphers . . . . . . . . . . . . . . . . 31--44
John C. King and
Dennis R. Bahler A Framework for the Study of Homophonic
Ciphers in Classical Encryption and
Genetic Systems . . . . . . . . . . . . 45--54
Douglas W. Mitchell A Nonlinear Random Number Generator with
Known, Long Cycle Length . . . . . . . . 55--62
Luke O'Connor The Inclusion--Exclusion Principle and
its Applications to Cryptography . . . . 63--79
Louis Kruh A Cryptological Travelogue: Riverbank
--- 1992 . . . . . . . . . . . . . . . . 80--94
Louis Kruh Reviews and Things Cryptologic . . . . . 95--110
Colin Burke An Introduction to an Historic Computer
Document: The 1946 Pendergass Report
Cryptanalysis and the Digital Computer 113--123
C. Burke Cryptanalytic Use of High-Speed Digital
Computing Machines . . . . . . . . . . . 124--147
John C. King and
Dennis R. Bahler An Algorithmic Solution of Sequential
Homophonic Ciphers . . . . . . . . . . . 148--165
Louis Kruh Reviews and Things Cryptologic . . . . . 166--171
Louis Kruh A 77-Year Old Challenge Cipher Known,
Long Cycle Length . . . . . . . . . . . 172--174
Chin-Chen Chang and
Ren-Junn Hwang Master Keys for an $ M^3 $ Cryptoscheme 175--186
Robert A. J. Matthews The Use of Genetic Algorithms in
Cryptanalysis . . . . . . . . . . . . . 187--201
R. S. Ramesh and
G. Athithan and
K. Thiruvengadam An Automated Approach to Solve Simple
Substitution Ciphers . . . . . . . . . . 202--218
David Alvarez The Papal Cipher Section in the Early
Nineteenth Century . . . . . . . . . . . 219--224
Karl De Leeuw and
Hans Van Der Meer A Homophonic Substitution in the
Archives of the Last Great Pensionary of
Holland . . . . . . . . . . . . . . . . 225--236
David Kahn An Enigma Chronology . . . . . . . . . . 237--246
David Kahn From the Archives: Compromise of Naval
Code F-3 . . . . . . . . . . . . . . . . 247--250
Louis Kruh Reviews and Things Cryptologic . . . . . 251--263
S. J. Shepherd and
P. W. Sanders and
C. T. Stockel The Quadratic Residue Cipher and Some
Notes on Implementation . . . . . . . . 264--282
Timothy K. Nenninger From The Archives: Japanese Codebook
Found . . . . . . . . . . . . . . . . . 283--284
Christoph Ruland Realizing Digital Signatures with
One-Way Hash Functions . . . . . . . . . 285--300
Yuan-Chung Chin and
PeCheng Wang and
Jing-Jang Hwang Cryptanalysis on Schwartz Graphical
Encryption method . . . . . . . . . . . 301--304
John C. King A Reconstruction of the Key to Beale
Cipher Number Two . . . . . . . . . . . 305--317
Editor Stimson Quote . . . . . . . . . . . . . 318
Ravi Ganesan and
Alan T. Sherman Statistical Techniques for Language
Recognition: An Introduction and Guide
for Cryptanalysts . . . . . . . . . . . 321--366
Richard Spillman Cryptanalysis of Knapsack Ciphers Using
Genetic Algorithms . . . . . . . . . . . 367--377
Louis Kruh Reviews and Things Cryptologic . . . . . 378--394
Albert C. Leighton The Statesman Who Could Not Read His Own
Mail . . . . . . . . . . . . . . . . . . 395--402
Anonymous Riverbank's 1917 Cryptologic
Contributions to the United States
Officially Recognized as National
Security Agency Adopts Editor's
Suggestion . . . . . . . . . . . . . . . 403--406
W. S. Forsyth and
R. Safavi-Naini Automated Cryptanalysis of Substitution
Ciphers . . . . . . . . . . . . . . . . 407--418
Louis Kruh Reviews and Things Cryptologic . . . . . 1--21
C. A. Deavours ``Those Brilliant Brits'': Book Review 22--24
Ed Dawson and
Andrew Clark Divide and Conquer Attacks on Certain
Classes of Stream Ciphers . . . . . . . 25--40
Gary R. Greenfield Yet Another Matrix Cryptosystem . . . . 41--51
J. Halligan From the Archives: Radio Intelligence
and Communication Security . . . . . . . 52--79
Robin Denniston Yardley's Diplomatic Secrets . . . . . . 81--127
Louis Kruh Reviews and Things Cryptologic . . . . . 128--140
D. W. Davies New Information on the History of the
Siemens and Halske T52 Cipher Machines 141--146
Ernst S. Selmer The Norwegian Modifications of the
Siemens and Halske T52e Cipher Machines 147--149
David Kahn From the Archives: a Real Fake Message 150--152
Frank Rubin Comments on ``Cryptanalysis of Knapsack
Ciphers Using Genetic Algorithms'' . . . 153--154
Terry Ritter Estimating Population from Repetitions
in Accumulated Random Samples . . . . . 155--190
David Mead The Breaking of the Japanese Army
Administrative Code . . . . . . . . . . 193--203
Boris C. W. Hagelin and
David Kahn The Story of the Hagelin Cryptos . . . . 204--242
C. G. McKay From the archives: Arvid Damm makes an
offer . . . . . . . . . . . . . . . . . 243--249
Louis Kruh The Postal Service Fails to Deliver the
Goods . . . . . . . . . . . . . . . . . 250--252
John M. Carroll and
Sri Nurdiati On Weak Keys and Weak Data: Foiling the
Two Nemeses . . . . . . . . . . . . . . 253--280
Louis Kruh Reviews and Things Cryptologic . . . . . 281--287
Ravi Ganesan and
Alan T. Sherman Statistical Techniques for Language
Recognition: An Empirical Study Using
Real and Simulated English . . . . . . . 289--331
John C. King An Algorithm for the Complete Automated
Cryptanalysis of Periodic Polyalphabetic
Substitution Ciphers . . . . . . . . . . 332--355
William J. Corcoran A Multiloop Vigen\`ere Cipher with
Exceptionally Long Component Series . . 356--371
Chuan-Ming Li and
Tzonelih Hwang and
Narn-Yih Lee Conspiracy Attacks on the Threshold RSA
Signature Scheme . . . . . . . . . . . . 372--380
Louis Kruh A Pictorial Tour of the National
Cryptologic Museum . . . . . . . . . . . 381--389
Louis Kruh Reviews and Things Cryptologic . . . . . 390--398
Jim Reeds William F. Friedman's Transcription of
the Voynich Manuscript . . . . . . . . . 1--23
Louis Kruh When a Court Ruled for Bacon Instead of
Shakespeare --- Temporarily . . . . . . 24--38
Donald W. Davies The Lorenz Cipher Machine SZ42 . . . . . 39--61
Robin Denniston Fetterlein and Others . . . . . . . . . 62--64
A. Ray Miller The Cryptographic Mathematics of Enigma 65--80
Ralph Erskine Ultra and Some U. S. Navy Carrier
Operations . . . . . . . . . . . . . . . 81--96
Edward J. Drea Were the Japanese Army Codes Secure? . . 113--136
C. A. Deavours The Autoscritcher . . . . . . . . . . . 137--148
Anonymous In Memoriam: Solomon Kullback . . . . . 149--150
David Kahn The Cryptologic Origin of Braille . . . 151--152
Karl de Leeuw and
Hans van der Meer A Turning Grille from the Ancestral
Castle of the Dutch Stadtholders . . . . 153--165
David Kahn Enemy Codes and Their Solution . . . . . 166--197
Horng-Twu Liaw and
Chin-Laung Lei An Efficient Password Authentication
Scheme Based on a Unit Circle . . . . . 198--208
Louis Kruh Reviews and Things Cryptologic . . . . . 209--215
Stephen Schlesinger Cryptanalysis for Peacetime:
Codebreaking and the Birth and Structure
of the United Nations . . . . . . . . . 217--235
Louis Kruth Riverbank Laboratory Correspondence,
1919 (SRH-50) . . . . . . . . . . . . . 236--246
Michael van der Meulen The Book Cipher System of the \em
Wehrmacht . . . . . . . . . . . . . . . 247--260
David Alvarez A Dutch Enciphered Code . . . . . . . . 261--264
Thomas Jakobsen A Fast Method for Cryptanalysis of
Substitution Ciphers . . . . . . . . . . 265--274
Frank Rubin The Quadratic and Double Quadratic
Residue Ciphers . . . . . . . . . . . . 275--284
Peter Wayner Strong Theoretical Steganography . . . . 285--299
Louis Kruth Reviews and Things Cryptologic . . . . . 300--318
Anonymous Change and Structure . . . . . . . . . . 319--320
Ralph E. Weber Seward's Other Folly: the Fight over
America's First Encrypted Cable . . . . 321--348
Michael van der Meulen Werftschlüssel: a German Navy Hand Cipher
System Part I . . . . . . . . . . . . . 349--364
Louis Kruh Reviews and Things Cryptologic . . . . . 365--374
Tom Johnson The Mystery of an Old Japanese Codebook 380--384
David W. Gaddy The Cylinder-Cipher . . . . . . . . . . 385--391
Mike Johnson Cryptology in Cyberspace . . . . . . . . 392--396
Frank Rubin Message Authentication Using Quadratic
Residues . . . . . . . . . . . . . . . . 397--404
James J. Gillogly Ciphertext-Only Cryptanalysis of Enigma 405--413
David Alvarez Italian Diplomatic Cryptanalysis in
World War I . . . . . . . . . . . . . . 1--10
Friedrich L. Bauer Cryptological Devices and Machines in
the Deutsches Museum, Munich . . . . . . 11--13
Louis Kruh Reviews and Things Cryptologic . . . . . 14--36
Michael van der Meulen Werftschlüssel: a German Navy Hand Cipher
System Part II . . . . . . . . . . . . . 37--54
Charles David A World War II German Army Field Cipher
and How We Broke It . . . . . . . . . . 55--76
Edward F. Schaefer A Simplified Data Encryption Standard
Algorithm . . . . . . . . . . . . . . . 77--84
Andrew Clark and
Ed Dawson and
Helen Bergen Combinatorial Optimization and the
Knapsack Cipher . . . . . . . . . . . . 85--93
David Alvarez Faded Lustre: Vatican Cryptography,
1815--1920 . . . . . . . . . . . . . . . 97--131
Augusto Buonafalce The Alberti Exhibition . . . . . . . . . 132--134
Rebecca Ratcliff Cryptology and World War II: NSA's 1995
History Symposium . . . . . . . . . . . 135--140
Michael van der Meulen Reihenschieber . . . . . . . . . . . . . 141--154
Greg Mellen Some Adventures in Cryptoland . . . . . 155--164
E. Dawson and
L. Nielsen Automated Cryptanalysis of XOR Plaintext
Strings . . . . . . . . . . . . . . . . 165--181
Louis Kruh Reviews and Things Cryptologic . . . . . 183--191
Prescott Currier My ``Purple'' Trip to England in 1941 193--201
Michael van der Meulen Cryptology in the Early Bundesrepublik 202--222
Thomas (Penn) Leary Cryptology in the 15th and 16th Century 223--242
Solomon W. Golomb On Factoring Jevons' Number . . . . . . 243--246
Frank Rubin Designing a High-Security Cipher . . . . 247--257
Howard M. Heys and
Stafford E. Tavares Cryptanalysis of
Substitution-Permutation Networks Using
Key-Dependent Degeneracy . . . . . . . . 258--274
Subhash C. Kak An Indus--Sarasvat\=\i Signboard . . . . 275--279
Louis Kruh Reviews and Things Cryptologic . . . . . 280--288
David Whitehead Cobra and Other Bombes . . . . . . . . . 289--307
Harry Hinsley The Counterfactual History of No Ultra 308--324
James J. Gillogly and
Larry Harnisch Cryptograms from the Crypt . . . . . . . 325--329
Ralph Erskine Kriegsmarine Signal Indicators . . . . . 330--340
David Kahn Some Early Hungarian Communist Ciphers 347--358
Frank Rubin One-Time Pad Cryptography . . . . . . . 359--364
Louis Kruh Reviews and Things Cryptologic . . . . . 365--380
Peter Pesic François Vi\`ete, Father of Modern
Cryptanalysis --- Two New Manuscripts 1--29
John Cary Sims The Brusa Agreement of May 17, 1943 . . 30--38
David Schimmelpenninck van der Oye A First Look at Russia's Codebreakers: a
Book Review . . . . . . . . . . . . . . 39--41
Ralph Erskine The First Naval Enigma Decrypts of World
War II . . . . . . . . . . . . . . . . . 42--46
David H. Hamer Enigma: Actions Involved in the 'Double
Stepping' of the Middle Rotor . . . . . 47--50
Jacques B. M. Guy The Distribution of Signs \em c and \em
o in the Voynich Manuscript: Evidence
for a real language? . . . . . . . . . . 51--54
C. C. Chang and
J. K. Jan and
H. C. Kowng A Digital Signature Scheme Based upon
the Theory of Quadratic Residues . . . . 55--70
Paul Constance How Jim Bamford Probed the NSA . . . . . 71--74
Louis Kruh Reviews and Things Cryptologic . . . . . 75--92
George Sassoon British Company Makes PGP Easier to Use 93--94
Aviel D. Rubin An Experience Teaching a Graduate Course
in Cryptography . . . . . . . . . . . . 97--109
Louis Kruh Reviews and Things Cryptologic . . . . . 110--128
Andrew Clark and
Ed Dawson A Parallel Genetic Algorithm for
Cryptanalysis of the Polyalphabetic
Substitution Cipher . . . . . . . . . . 129--138
H. F. Chau and
H.-K. Lo One-Way Functions in Reversible
Computations . . . . . . . . . . . . . . 139--148
Norman Scott Solving Japanese Naval Ciphers 1943--45 149--157
David Kahn British Economic Espionage . . . . . . . 158--164
Anonymous German Wireless Intercept Organization 165--190
C. A. Deavours Lobsters, Crabs, and the Abwehr Enigma 193--199
Michael van der Meulen Bundeswehrtarnverfahren . . . . . . . . 200--217
Louis Kruh Reviews and Things Cryptologic . . . . . 218--236
Thomas R. Cain and
Alan T. Sherman How to Break Gifford's Cipher . . . . . 237--286
Stephen J. Kelley The SIGCUM Story: Cryptographic Failure,
Cryptologic Success . . . . . . . . . . 289--316
Neal Koblitz Cryptography As a Teaching Tool . . . . 317--326
Nara-Yih Lee and
Tzonelih Hwang On the Security of Park et al.'s Key
Distribution Protocol for Digital Mobile
Communications . . . . . . . . . . . . . 327--334
Louis Kruh Reviews and Things Cryptologic . . . . . 335--349
Caxton C. Foster Drawbacks of the One-Time Pad . . . . . 350--352
H. Paul Greenough Cryptanalysis of the Swedish HC-9: a
Known-Plaintext Approach . . . . . . . . 353--367
Lieutenant Commander I. W. Comstock Radio Intelligence and Security . . . . 368--377
David Kahn Soviet Comint in the Cold War . . . . . 1--24
Frode Weierud Sweden Cryptographic Superpower: a Book
Review . . . . . . . . . . . . . . . . . 25--28
Colin Burke A Gracious but Tragic Special Ultra
Message . . . . . . . . . . . . . . . . 29--32
Michael van der Meulen A First German Cryptologic Exhibition 33--48
Louis Kruh Reviews and Things Cryptologic . . . . . 49--55
A. A. Moldovyan and
N. A. Moldovyan Software Encryption Algorithms for
Transparent Protection Technology . . . 56--68
Franz-Peter Heider A Colossal Fish . . . . . . . . . . . . 69--95
Louis Kruh Still Waiting to Be Solved: Elgar's 1897
Cipher Message . . . . . . . . . . . . . 97--98
Graydon A. Lewis Setting the Record Straight on Midway 99--101
Anonymous Elementary Cipher Solution . . . . . . . 102--120
Randall K. Nichols The Bible Code . . . . . . . . . . . . . 121--133
A. A. Moldovyan and
N. A. Moldovyan Flexible Block Cipher with Provably
Inequivalent Cryptalgorithm
Modifications . . . . . . . . . . . . . 134--140
Michael van der Meulen The Road to German Diplomatic Ciphers
--- 1919 to 1945 . . . . . . . . . . . . 141--166
Louis Kruh Reviews and Things Cryptologic . . . . . 167--191
Kenneth A. Mendelson and
Stephen T. Walker and
Joan D. Winston The Evolution of Recent Cryptographic
Policy in the United States . . . . . . 193--210
David H. Hamer and
Geoff Sullivan and
Frode Weierud Enigma Variations: an Extended Family of
Machines . . . . . . . . . . . . . . . . 211--229
Emanuele Viterbo The Ciphered Autobiography of a 19th
Century Egyptologist . . . . . . . . . . 231--243
Thomas Kelly The Myth of the Skytale . . . . . . . . 244--260
Louis Kruh Reviews and Things Cryptologic . . . . . 261--265
Don Coppersmith Attacking Four-Round Luby--Rackoff
Ciphers . . . . . . . . . . . . . . . . 266--278
A. Kourtis and
Ch. Mantakas Statistical Distribution of Delta
Modulated Speech Signals as a Means for
Cryptanalysis in Voice Encryption
Systems . . . . . . . . . . . . . . . . 279--287
Jim Reeds Solved: the Ciphers in Book III of
Trithemius's Steganographia . . . . . . 291--317
Thomas Ernst The Numerical--Astrological Ciphers in
the Third Book of Trithemius's
Steganographia . . . . . . . . . . . . . 318--341
David Schimmelpenninck van der Oye Tsarist Codebreaking: Some Background
and Some Examples . . . . . . . . . . . 342--353
Paul N. Pfeiffer Breaking the German Weather Ciphers in
the Mediterranean Detachment G, 849th
Signal Intelligence Service . . . . . . 354--369
Louis Kruh Another Herbert O. Yardley Mystery? . . 370--375
Louis Kruh Reviews and Things Cryptologic . . . . . 376--379
Samuel J. Lomonaco A Quick Glance at Quantum Cryptography 1--41
Louis Kruh Reviews and Things Cryptologic . . . . . 42--54
Jim Reeds Breakthrough in Renaissance
Cryptography: a Book Review . . . . . . 59--62
David Kahn Students Better Than a Pro (Bazeries)
and an Author (Candela) . . . . . . . . 63--64
Ralph Erskine Kriegsmarine Short Signal Systems ---
and how Bletchley Park Exploited Them 65--92
Stephen Budiansky A Tribute to Cecil Phillips---and
Arlington Hall's ``Meritocracy'' . . . . 97--107
Donald W. Davies The Bombe: a Remarkable Logic Machine 108--138
H. Paul Greenough Cryptanalysis of the Hagelin C-52 and
Similar Machines a Known Plaintext
Attack . . . . . . . . . . . . . . . . . 139--156
Stephen T. Walker and
Joan D. Winston Cryptography Policy Update . . . . . . . 157--163
Louis Kruh Reviews and Things Cryptologic . . . . . 171--188
Heinz Ulbricht Enigma-Uhr . . . . . . . . . . . . . . . 193--205
Friedrich L. Bauer An Error in the History of Rotor
Encryption Devices . . . . . . . . . . . 206--210
John J. G. Savard and
Richard S. Pekelney The ECM Mark II: Design, History, and
Cryptology . . . . . . . . . . . . . . . 211--228
Donald W. Davies Effectiveness of the Diagonal Board . . 229--239
Michael van der Meulen German Air Force Signal Intelligence
1956: a Museum of Comint and Sigint . . 240--256
Craig Graham McKay Swedish Cryptanalysis and the Saga of
Arne Beurling: a Book Review . . . . . . 257--258
Louis Kruh Vint Hill Farms Station . . . . . . . . 259--260
Axel Roch Biopolitics and Intuitive Algebra in the
Mathematization of Cryptology? a Review
of Shannon's ``A Mathematical Theory of
Cryptography'' from 1945 . . . . . . . . 261--266
J. H. Ellis The History of Non-Secret Encryption . . 267--273
Louis Kruh Reviews and Things Cryptologic . . . . . 274--286
Alexander Hagerty An Unpublished Yardley Manuscript . . . 289--297
David M. Smith The Use of Decrypted German Weather
Reports in the Operations of the
Fifteenth Air Force over Europe . . . . 298--304
Robert L. Williams A Note on the Voynich Manuscript . . . . 305--309
Geoff Sullivan and
Frode Weierud The Swiss NEMA Cipher Machine . . . . . 310--328
Stephen T. Walker and
Joan D. Winston Cryptography Policy Update . . . . . . . 329--342
Louis Kruh Reviews and Things Cryptologic . . . . . 343--352
Ridley Mclean Naval Communications . . . . . . . . . . 353--379
Brian J. Winkel Annual Greg Mellen Memorial Cryptology
Scholarship Prize . . . . . . . . . . . 1--3
Heidi Williams Applying Statistical Language
Recognition Techniques in the
Ciphertext-Only Cryptanalysis of Enigma 4--17
Bruce Schneier A Self-Study Course in Block-Cipher
Cryptanalysis . . . . . . . . . . . . . 18--33
Hideki Sawada and
Takahiro Abe Groups and RSA Cryptosystems . . . . . . 34--40
David H. Hamer G-312: an Abwehr Enigma . . . . . . . . 41--54
Philip Marks and
Frode Weierud Recovering the Wiring of Enigma's
Umkehrwalze A . . . . . . . . . . . . . 55--66
Louis Kruh Reviews and Things Cryptologic . . . . . 67--93
Ralph Erskine What Did the Sinkov Mission Receive from
Bletchley Park? . . . . . . . . . . . . 97--109
Philip H. Jacobsen A Cryptologic Veteran's Analysis of
``Day of Deceit'' --- a Book Review . . 110--118
Stephen Budiansky Closing the Book on Pearl Harbor . . . . 119--130
Donald W. Davies An Unidentified Cipher Device . . . . . 131--134
Lars R. Knudsen and
Vincent Rijmen Ciphertext-Only Attack on Akelarre . . . 135--147
Chih-Hung Wang and
Tzonelih Hwang $ (t, m) $ Threshold and Generalized
ID-based Conference Key Distribution
System . . . . . . . . . . . . . . . . . 148--159
Rebecca A. Ratcliff Cryptology Through the Centuries: NSA's
1999 History Symposium . . . . . . . . . 160--167
Louis Kruh Reviews and Things Cryptologic . . . . . 168--189
Peter Pesic The Clue to the Labyrinth: Francis Bacon
and the Decryption of Nature . . . . . . 193--211
Frederick D. Parker How OP-20-G Got Rid of Joe Rochefort . . 212--234
Thomas R. Hammant Russian and Soviet Cryptology I --- Some
Communications Intelligence in Tsarist
Russia . . . . . . . . . . . . . . . . . 235--249
Chuan-Ming Li and
Tzonelih Hwang and
Narn-Yih Lee and
Juin-Jang Tsai $ (t, n) $ Threshold-Multisignature
Scheme and Generalized-Multisignature
Scheme where Suspected Forgery Implies
Traceability of Adversarial Shareholders 250--268
Louis Kruh Reviews and Things Cryptologic . . . . . 269--286
Stephen Huffman The Navajo Code Talkers: a Cryptologic
and Linguistic Perspective . . . . . . . 289--320
Craig McKay From the Archives: Japanese Fears and
the Ironies of Interception . . . . . . 321--323
Cecil Phillips The American Solution of a German
One-Time-Pad Cryptographic System
(G-OTP) . . . . . . . . . . . . . . . . 324--332
Thomas R. Hammant II --- the Magdeburg Incident: the
Russian View . . . . . . . . . . . . . . 333--338
John R. Schindler A Hopeless Struggle: Austro-Hungarian
Cryptology During World War I . . . . . 339--350
Colin Burke Letter to the Editor . . . . . . . . . . 351--352
Shahrokh Saeednia How to Make the Hill Cipherh Secure . . 353--360
Russell Atkinson David Brian Kern: Theft of Trade Secrets 361--369
Alan M. Turing Visit to National Cash Register
Corporation of Dayton, Ohio . . . . . . 1--10
Lee A. Gladwin Alan Turing's Visit to Dayton . . . . . 11--17
Michael Rubin The Telegraph, Espionage, and Cryptology
in Nineteenth Century Iran . . . . . . . 18--36
Viviana I. Risca DNA-Based Steganography . . . . . . . . 37--49
Thomas R. Hammant Russian and Soviet Cryptology III ---
Soviet Comint and the Civil War,
1918--1921 . . . . . . . . . . . . . . . 50--60
Thomas R. Hammant Russian and Soviet Cryptology IV ---
Some Incidents in the 1930's . . . . . . 61--63
Louis Kruh Reviews and Things Cryptologic . . . . . 64--79
Peter Ibbotson Sayers and Ciphers . . . . . . . . . . . 81--87
Colin Burke Kim Philby, the American Intelligence
Community, and OP-20-G: the Fox Built
the Hen-House and Took the Keys . . . . 88--90
Jonathan Winkler From the Archives: Early Corporate
Espionage amid World War I Censorship 91--94
Ben Johnsen Cryptography in Runic Inscriptions: a
Remark on the Article, ``Cryptography in
Runic Inscriptions,'' by O. G. Landsverk 95--100
Philip Marks Umkehrwalze D: Enigma's Rewirable
Reflector --- Part I . . . . . . . . . . 101--141
Louis Kruh Reviews and Things Cryptologic . . . . . 142--159
Anonymous The Glow-Lamp Ciphering and Deciphering
Machine: Enigma . . . . . . . . . . . . 161--173
Anonymous The Noncryptanalytic Headaches of
Cryptanalysts . . . . . . . . . . . . . 174--176
Philip C. Marks Umkehrwalze D: Enigma's Rewirable
Reflector --- Part II . . . . . . . . . 177--212
J. C. Hernández and
A. Ribagorda and
P. Isasi and
J. M. Sierra Genetic Algorithms Can Be Used to Obtain
Good Linear Congruential Generators . . 213--229
Louis Kruh Reviews and Things Cryptologic . . . . . 230--239
Stephen Budiansky Codebreaking with IBM Machines in World
War II . . . . . . . . . . . . . . . . . 241--255
Karl de Leeuw Johann Friedrich Euler (1741--1800):
Mathematician and Cryptologist at the
Court of the Dutch Stadholder William V 256--274
Gabriel Landini Evidence of Linguistic Structure in the
Voynich Manuscript Using Spectral
Analysis . . . . . . . . . . . . . . . . 275--295
Philip C. Marks Umkehrwalze D: Enigma's Rewirable
Reflector --- Part III . . . . . . . . . 296--310
Louis Kruh Reviews and Things Cryptologic . . . . . 311--317
Louis Kruh and
Cipher Deavours The Commercial Enigma: Beginnings of
Machine Cryptography . . . . . . . . . . 1--16
Donald Michie Colossus and the Breaking of the Wartime
``Fish'' Codes . . . . . . . . . . . . . 17--58
Louis Kruh The World of Codes and Ciphers at the
Heinz Nixdorf Museumsforum . . . . . . . 59--67
Meenakshi Gnanaguruparan and
Subhash Kak Recursive Hiding of Secrets in Visual
Cryptography . . . . . . . . . . . . . . 68--76
Louis Kruh Reviews and Things Cryptologic . . . . . 77--79
Georg Glünder and
Paul Whitaker Wireless and ``Geheimschreiber''
Operator in the War, 1941--1945 . . . . 81--96
Geoff Sullivan The ECM Mark II: Some Observations on
the Rotor Stepping . . . . . . . . . . . 97--100
H. Koot Expert's Opinion on the Enigma Ciphering
Machine . . . . . . . . . . . . . . . . 101--102
Keith P. Clive The Battle of the Seals . . . . . . . . 103--112
Bengt Beckman An Early Cipher Device: Fredrik
Gripenstierna's Machine . . . . . . . . 113--123
Anonymous Britain Reveals Its Bombe to America
from the Archives . . . . . . . . . . . 124--128
Raphael Chung-Wei Phan Further Notes for a Self-Study Course in
Block-Cipher Cryptanalysis . . . . . . . 129--137
Louis Kruh Reviews and Things Cryptologic . . . . . 138--158
David Kahn A Riverbank Trove . . . . . . . . . . . 161--164
William Stallings The Advanced Encryption Standard . . . . 165--188
Howard M. Heys A Tutorial on Linear and Differential
Cryptanalysis . . . . . . . . . . . . . 189--221
Henry B. Wolfe Non-Cryptanalytic Attacks . . . . . . . 222--234
Louis Kruh Reviews and Things Cryptologic . . . . . 235--239
Anonymous Codetalkers Recognition not Just the
Navajos . . . . . . . . . . . . . . . . 241--256
Geoff Sullivan Cryptanalysis of Hagelin Machine Pin
Wheels . . . . . . . . . . . . . . . . . 257--273
Craig Bauer and
Christian N. S. Tate A Statistical Attack on the Running Key
Cipher . . . . . . . . . . . . . . . . . 274--282
Raphael Chung-Wei Phan Mini Advanced Encryption Standard
(Mini-AES): a Testbed for Cryptanalysis
Students . . . . . . . . . . . . . . . . 283--306
Louis Kruh Reviews and Things Cryptologic . . . . . 307--317
Wes Freeman and
Geoff Sullivan and
Frode Weierud Purple Revealed: Simulation and
Computer-Aided Cryptanalysis of Angooki
Taipu B . . . . . . . . . . . . . . . . 1--43
Alan M. Turing Critique of ``Running Short Cribs on the
U. S. Navy Bombe'' . . . . . . . . . . . 44--49
Lee A. Gladwin Alan M. Turing's Critique of Running
Short Cribs on the US Navy Bombe . . . . 50--54
Louis Kruh Reviews and Things Cryptologic . . . . . 55--72
Karl de Leeuw The Dutch Invention of the Rotor
Machine, 1915--1923 . . . . . . . . . . 73--94
David H. Hamer The Enigmas --- and Other Recovered
Artefacts --- of U-85 . . . . . . . . . 97--110
Ralph Erskine From the Archives: What the Sinkov
Mission Brought to Bletchley Park . . . 111--118
R. A. Ratcliff How Statistics Led the Germans to
Believe Enigma Secure and Why They Were
Wrong: Neglecting the Practical
Mathematics of Cipher Machines . . . . . 119--131
Augusto Buonafalce From the Skytale to the Enigma: Book
Review . . . . . . . . . . . . . . . . . 132--134
James David Soviet Secrets in the Ether ---
Clandestine Radio Stations at the New
York and San Francisco Consulates in
World War II . . . . . . . . . . . . . . 135--147
Mohammad A. Musa and
Edward F. Schaefer and
Stephen Wedig A Simplified AES Algorithm and Its
Linear and Differential Cryptanalyses 148--177
Brian J. Winkel Extraordinary Cryptology Collection . . 180--181
Louis Kruh Reviews and Things Cryptologic . . . . . 182--191
Philip H. Jacobsen Foreknowledge of Pearl Harbor? No!: the
Story of the US Navy's Efforts on JN-25B 193--205
Niels Faurholt Urkryptografen (``The Clock
Cryptograph'') . . . . . . . . . . . . . 206--208
Dorothy Clarkson Cypher Machines Maintenance and
Restoration Spanning Sixty Years . . . . 209--216
Francine F. Abeles The Memoria Technica Cipher . . . . . . 217--229
Louis Kruh Reviews and Things Cryptologic . . . . . 230--232
Rose Mary Sheldon The Sator Rebus: an Unsolved Cryptogram? 233--287
Ralph Erskine and
Peter Freeman Brigadier John Tiltman: One of Britain's
Finest Cryptologists . . . . . . . . . . 289--318
Francesco Fabris and
Myron Curtis A Nomenclator Used by Propaganda Fide
During the Chinese Rites Controversy . . 319--338
Joachim von zur Gathen Claude Comiers: the First Arithmetical
Cryptography . . . . . . . . . . . . . . 339--349
Bob Anderson and
George McGinnis Naval Security Group Command Display . . 350--360
Raphael Chung-Wei Phan Impossible Differential Cryptanalysis of
Mini-AES . . . . . . . . . . . . . . . . 361--374
Louis Kruh Reviews and Things Cryptologic . . . . . 375--378
Louis Kruh The Shakespeare--Bacon Controversy
Continues on the Stage . . . . . . . . . 379--380
David Kahn Charles J. Mendelsohn and Why I Envy Him 1--17
Urban Zetterström Swedish SA Teleprinter Cipher System . . 18--30
Gordon Rugg An Elegant Hoax? A Possible Solution to
the Voynich Manuscript . . . . . . . . . 31--46
Anonymous Enigma and Friends Exhibit: Bletchley
Park Exhibit Opens . . . . . . . . . . . 47--49
Martin Kochanski The Comedy of Commercial Encryption
Software . . . . . . . . . . . . . . . . 50--54
Stuart Savory Pocket Enigma: The Review . . . . . . . 55--59
Louis Kruh Reviews and Things Cryptologic: Kruh,
David. Riverbank: The Trial of William
Shakespeare, a play. Eldridge Publishing
Co., P. O. Box 14367, Tallahassee FL
32317 USA. 2003. 70 pp. \$6.50};
{Jackson, John, Ed. {\em The secret War
of Hut 3: The First Story of How
Intelligence from Enigma Signals Decoded
at Bletchley Park Was Used During World
War II}. The Military Press, 1 Gallagher
Close, Milton Keynes MK8 01Q UK. 2002.
115 pp. 8 1/2in by 11 3/4in. Hardback
25.00/839.30; Paperback \pounds
15.00\slash \$23.60.0 pp. \$24.95};
{Kennedy, Shawn. {\em Funny
Cryptograms}. Sterling Publishing Co.,
387 Park Ave. South, New York NY
10016-8810 USA. 2003. 96 pp. \$6.95;
Petitcolas, Fabien A. P., Editor. \em
Information Hiding. 5th International
Workshop, Noordwijkerhout, The
Netherlands, Oct., 2000.
Springer-Verlag, 175 Fifth Ave., New
York NY 10010 USA. 2003. 427 pp.
\$69.00}; {Boyd, Colin and Anish
Mathuria. {\em Protocols for
Authentication and Key Establishment}.
Springer-Verlag, 175 Fifth Avenue, New
York, NY 10010 USA. 2003. 321 pp.
\$54.95; Smith, Sarah. \em Chasing
Shakespeare. Atria Books, 1230 Avenue of
the America, New York NY 10020 USA.
2003. 337 pp. \$24.00}; {Farago,
Ladislas. {\em Burn After Reading: The
Espionage History of World War II}.
Naval Institute Press, 291 Wood Road,
Annapolis MD 21402 USA. 2003 reprint.
319 pp. \$18.95 . . . . . . . . . . . . 60--95
Joshua Holden A Comparison of Cryptography Courses . . 97--111
Louis Kruh Unknown German World War II Cipher
Device . . . . . . . . . . . . . . . . . 112--114
Michael J. Cowan Rasterschlüssel 44 --- The Epitome of
Hand Field Ciphers . . . . . . . . . . . 115--148
John Lawrence The Versatility of Rejewski's Method:
Solving for the Wiring of the Second
Rotor . . . . . . . . . . . . . . . . . 149--152
Arturo Quirantes Model Z: a Numbers-Only Enigma Version 153--156
Lisa Driskell Wavelet-based Steganography . . . . . . 157--174
Louis Kruh Reviews and Things Cryptologic: Jackson,
John, Ed. \em The Secret War of Hut 3:
The First Story of How Intelligence from
Enigma Signals Decoded at Bletchley Park
Was Used During World War II. The
Military Press, 1 Gallagher Close,
Milton Keynes MK8 01Q, United Kingdom.
2002, 115 pp., 8 1/2in by 11 3/4in.
Hardback \pounds 25.00/\$39.30;
Paperback \pounds15.00\slash \$23.60;
Carter, Philip and Ken Russell. \em
Brain Sizzlers. Sterling Publishing Co.,
Inc., 387 Park Avenue South, New York NY
10016-8810 USA. 2003. 304 p. \$5.95};
{Jenkins, Gerald and Magdalen Bear. {\em
Codes and Ciphers: Clever Devices for
Coding and Decoding to cut out and
make}. Parkwest Publications Inc., P. O.
Box 20261, New York NY 10025 USA. 2003.
32 pp. \$12.00; Jenkins, Gerald and Anne
Wild. \em Be a Codebreaker! Mystery
messages to puzzle over and decipher.
Parkwest Publications Inc., P. O. Box
20261, New York NY 10025 USA. 2003. 32
pp. \$10.00}; {Praham, Jill. {\em So
Power Can Be Brought into Play: SIGINT
and the Pusan Perimeter}. Center for
Cryptologic History, National Security
Agency, 9800 Savage Road, Fort Meade MD
20755-6886 USA. 2000. 18 pp}; {Nickles,
David Paull. {\em Under the Wire: How
the Telegraph Changed Diplomacy}.
Harvard University Press, Cambridge MA
02138 USA. 2003. 265 pp. \$30.95; Mowry,
David P. \em German Cipher Machines of
World War II. Center for Cryptologic
History, National Security Agency, 9800
Savage Road, Fort Meade MD 20755-6886
USA. 2003. 32 pp; Myers, Katherine. \em
Codebreaker. Salvo Press, 61428 Elder
Ridge Street, Bend OR 97702 USA. 2000.
289 pp. \$16.95 paperback}; {Mao, Wenbo.
{\em Modern Cryptography: Theory and
Practice}. Pearson Education, Prentice
Hall Professional Technical Reference,
Upper Saddle River NJ 07458 USA. 2004.
707 pp. \$54.99 . . . . . . . . . . . . 175--190
Jan Bury Polish Codebreaking During the
Russo--Polish War of 1919--1920 . . . . 193--203
Mike Koss The Paper Enigma Machine . . . . . . . . 204--210
Ralph Erskine and
Philip Marks Naval Enigma: Seahorse and Other
Kriegsmarine Cipher Blunders . . . . . . 211--241
Louis Kruh Reviews and Things Cryptologic: Mohamad
Mrayati, Yahya Meer Alain, and M. Hassan
al-Tayyan, Eds. \em Ibn Adlan's
Treatise: A Manual on Cryptanalysis
written for King alAsraf. Volume Two of
Series, Arabic Origins of Cryptology.
King Faisal Center for Research and
Islamic Studies, P. O. Box 51049, Riyadh
11543, SAUDI ARABIA. 2003. 113 pp.
\$15.00} . . . . . . . . . . . . . . . . 242--252
Augusto Buonafalce Sir Samuel Morland's Machina Cyclologica
Cryptographica . . . . . . . . . . . . . 253--264
José Ramón Soler Fuensanta Mechanical Cipher Systems in the Spanish
Civil War . . . . . . . . . . . . . . . 265--276
Graham A. Niblo The University of Southampton National
Cipher Challenge . . . . . . . . . . . . 277--286
Anonymous Correction: \em Model Z: A Numbers-Only
Enigma Version, Arturo Quirantes, Volume
XXVII, Number 2, pp. 153--156, April
2004 . . . . . . . . . . . . . . . . . . ??
Joseph E. Richard The Breaking of the Japanese Army's
Codes . . . . . . . . . . . . . . . . . 289--308
Joachim von zur Gathen Friederich Johann Buck: Arithmetic
Puzzles in Cryptography . . . . . . . . 309--324
Peter Donovan The Flaw in the JN25 Series of Ciphers 325--340
Damien Stehlé Breaking Littlewood's cipher . . . . . . 341--357
Mahmood Khalel Ibrahem Al-Ubaidy Black-Box Attack Using Neuro-Identifier 358--372
Louis Kruh Reviews and Things Cryptologic: Young,
Adam L. and Moti Yung. Malicious
Cryptography: Exposing Cryptovirology.
Wiley Publishing, Inc., 10475 Crosspoint
Blvd., Indianapolis IN 46256 USA. 2004,
392 pp. \$45.00} . . . . . . . . . . . . 373--379
Anonymous Corrections: \em Rasterschlüssel 44 ---
The Epitome of Hand Field Ciphers,
Cryptologia XXVIII(2): 115--149, April
2004 . . . . . . . . . . . . . . . . . . ??
David Gaddy Letter to the Editor: Vigen\`ere
Decryption . . . . . . . . . . . . . . . ??
Hilmar-Detlef Brückner Germany's First Cryptanalysis on the
Western Front: Decrypting British and
French Naval Ciphers in World War I . . 1--22
Lee A. Gladwin The Diplomacy of Security: Behind the
Negotiations of Article 18 of the
Sino-American Cooperative Agreement . . 23--42
David Kahn The Man in the Iron Mask --- Encore et
Enfin, Cryptologically . . . . . . . . . 43--49
Navneet Mandhani and
Subhash Kak Watermarking Using Decimal Sequences . . 50--58
Jeffrey Overbey and
William Traves and
Jerzy Wojdylo On the Keyspace of the Hill Cipher . . . 59--72
Rodney H. Cooper and
Christopher G. Andrews The Public Key Covert Channel . . . . . 73--75
David Kahn From the Archives: Codetalkers not
wanted . . . . . . . . . . . . . . . . . 76--87
Louis Kruh Reviews and Things Cryptologic: Bamford,
James. \em A Pretext For War: 9/11,
Iraq, and the Abuse of America's
Intelligence Agencies. Doubleday. 2004.
420 pp. \$26.95}; {Goldreich, Oded.
Foundations of Cryptography: Volume II:
Basic Applications. Cambridge University
Press, 40 West 20th Street, New York NY
10011-4211 USA. 2004. 798 pp. \$75.00;
McBain. Ed. \em Hark!. Simon & Schuster,
1230 Avenue of the Americas, New York NY
10020 USA. 2004. 293 pp. \$24.95};
{Spillman, Richard J. Classical and
Contemporary Cryptology. Pearson
Prentice Hall, Pearson Education, Inc.,
Upper Saddle River NJ 07458 USA. 2005.
285 pp. \$54.00; Teuscher, Christof
(Ed.) Alan Turing: Life and Legacy of a
Great Thinker. Springer-Verlag, 175
Fifth Ave., New York NY 10010 USA. 2004.
542 pp. \$69.95}; {Balliett, Blue and
Brett Helquist, Illustrator. {\em
Chasing Vermeer}. Scholastic Press, 557
Broadway, New York NY 10012 USA. 2004.
254 pp. \$16.96; Caldwell, Ian and
Dustin Thomason. \em The Rule of Four.
The Dial Press/Random House, Inc., 1745
Broadway NY 10019 USA. 2004. 372 pp.
\$24.00/\$34 Canada . . . . . . . . . . 88--93
David Kahn David Shulman Dies --- The Bibliographer
of Cryptology . . . . . . . . . . . . . 94--95
Philip H. Jacobsen Pearl Harbor: Radio Officer Leslie
Grogan of the SS Lurline and His
Misidentified Signals . . . . . . . . . 97--120
David Kahn The Polish Enigma Conference and some
Excursions . . . . . . . . . . . . . . . 121--126
Peter Zilahy Ingerman Two Hebern Cryptographic Machines . . . 127--147
Raphael C.-W. Phan How to Explain Block Cipher
Cryptanalysis to Your Kids . . . . . . . 148--158
Craig Bauer and
Suzanne E. Gladfelter Cryptology in York, Pennsylvania . . . . 159--175
Louis Kruh Reviews and Things Cryptologic . . . . . 176--187
Louis Kruh Unknown Military Coding Device: Can You
Identify It? . . . . . . . . . . . . . . 190--191
Anonymous Letter to the Editor . . . . . . . . . . ??
Geoff Sullivan and
Frode Weierud Breaking German Army Ciphers . . . . . . 193--232
John Lawrence A Study of Rejewski's Equations . . . . 233--247
Craig Bauer and
Elliott J. Gottloeb Results of an Automated Attack on the
Running Key Cipher . . . . . . . . . . . 248--254
Richard Pekelney Excellent, Exceptional, Enormous Crypto
Source . . . . . . . . . . . . . . . . . 255--256
Robert Cordery and
Leon Pintsov History and Role of Information Security
in Postage Evidencing and Payment . . . 257--271
Louis Kruh Enigma Articles from Cryptologia . . . . 272--273
Louis Kruh Crypto User's Guide . . . . . . . . . . 273--273
Louis Kruh Confederate Treasure Issues . . . . . . 274--274
Louis Kruh Detective Notebook for Young Adults . . 274--275
Louis Kruh College-level Math Crypto Text . . . . . 275--275
Louis Kruh Code Names Post 9/11 . . . . . . . . . . 276--276
Louis Kruh Coral Sea, Midway, and Aleutians Naval
Intelligence . . . . . . . . . . . . . . 276--277
Louis Kruh Broad View of Power of Mathematics . . . 277--278
Louis Kruh Friedman Legacy . . . . . . . . . . . . 278--278
Louis Kruh Pearl Harbor Revisited . . . . . . . . . 278--279
Louis Kruh Global Eavesdropping . . . . . . . . . . 279--280
Louis Kruh Cryptology in American History . . . . . 280--280
Louis Kruh HMS Dunedin Acts on Enigma Material . . 280--281
Louis Kruh Novel Secrets . . . . . . . . . . . . . 281--282
Louis Kruh Reviews and Things Cryptologic . . . . . ??
John F. Dooley Codes and Ciphers in Fiction: An
Overview . . . . . . . . . . . . . . . . 290--328
David Kahn How Garbles Tickled History . . . . . . 329--336
Charles F. Rocca Cryptology in General Education . . . . 337--342
John Lawrence Factoring for the Plugboard --- Was
Rejewski's Proposed Solution for
Breaking the Enigma Feasible? . . . . . 343--366
B. Thilaka and
K. Rajalakshmi An Extension of Hill Cipher Using
Generalised Inverses and $m$ th Residue
Modulo $n$ . . . . . . . . . . . . . . . 367--376
Louis Kruh Reviews and Things Cryptologic . . . . . 377--380
Anonymous Letter from the Editor . . . . . . . . . ??
Ralph Erskine The 1944 Naval BRUSA Agreement and its
Aftermath . . . . . . . . . . . . . . . 1--22
Niels Faurholt Alexis Kòhl: a Danish Inventor of
Cryptosystems . . . . . . . . . . . . . 23--29
Jan Bury TELMA --- a Polish Wireless
Communications Security Machine of World
War II . . . . . . . . . . . . . . . . . 31--38
Augusto Buonafalce Bellaso's Reciprocal Ciphers . . . . . . 39--51
Deane R. Blackman Note on Geheimschreiber Cam Wheels . . . 53--54
William Stallings The Whirlpool Secure Hash Function . . . 55--67
Joshua Holden and
Richard Layton and
Laurence Merkle and
Tina Hudson Underwater Hacker Missile Wars: a
Cryptography and Engineering Contest . . 69--77
Louis Kruh Reviews and Things Cryptologic . . . . . 79--81
Joel V. Brawley In Memory of Jack Levine (1907--2005) 83--97
Peter Freeman The Zimmermann Telegram Revisited: a
Reconciliation of the Primary Sources 98--150
Forrest R. Biard Breaking of Japanese Naval Codes:
Pre-Pearl Harbor to Midway . . . . . . . 151--158
Robert Talbert The Cycle Structure and Order of the
Rail Fence Cipher . . . . . . . . . . . 159--172
Kiranmayi Penumarthi and
Subhash Kak Augmented Watermarking . . . . . . . . . 173--180
Louis Kruh Reviews and Things Cryptologic . . . . . 181--192
John Gallehawk Third Person Singular (Warsaw, 1939) . . 193--198
Lee A. Gladwin Did Sigint Seal The Fates of 19,000
POWs? . . . . . . . . . . . . . . . . . 199--211
Peter W. Donovan The Indicators of Japanese Ciphers 2468,
7890, and JN-25A1 . . . . . . . . . . . 212--235
David Joyner and
David Kahn Edited Transcript of Interview with
Peter Hilton for ``Secrets of War'' . . 236--250
Klaus Schmeh The East German Encryption Machine T-310
and the Algorithm It Used . . . . . . . 251--257
Alexander Griffing Solving XOR Plaintext Strings with the
Viterbi Algorithm . . . . . . . . . . . 258--265
Claudia Oliveira and
José António Xexéo and
Carlos André Carvalho Clustering and Categorization Applied to
Cryptanalysis . . . . . . . . . . . . . 266--280
John L. Simons Bridge Cryptography Fundamentals . . . . 281--286
Louis Kruh Reviews and Things Cryptologic . . . . . 287--291
Brian J. Winkel Letter from the Editor . . . . . . . . . 293--293
Ralph Erskine The Poles Reveal their Secrets: Alastair
Denniston's Account of the July 1939
Meeting at Pyry . . . . . . . . . . . . 294--305
Craig Bauer and
John Ulrich The Cryptologic Contributions of Dr.
Donald Menzel . . . . . . . . . . . . . 306--339
Kent D. Boklan How I Broke the Confederate Code (137
Years Too Late) . . . . . . . . . . . . 340--345
Klaus Pommerening Kasiski's Test: Couldn't the Repetitions
be by Accident? . . . . . . . . . . . . 346--352
Augusto Buonafalce and
Niels Faurholt and
Bjarne Toft Julius Petersen---Danish Mathematician
and Cryptologist . . . . . . . . . . . . 353--360
Alexander Griffing Solving the Running Key Cipher with the
Viterbi Algorithm . . . . . . . . . . . 361--367
Donald Mills Review of ``Introduction to Coding
Theory'' by Ron M. Roth . . . . . . . . 368--369
Louis Kruh Reviews and Things Cryptologic . . . . . 370--374
Craig Bauer Letter from the Editor . . . . . . . . . 1--1
Joachim von zur Gathen Zimmermann Telegram: The Original Draft 2--37
David A. Hatch The Punitive Expedition Military Reform
and Communications Intelligence . . . . 38--45
José Ramón Soler Fuensanta and
Francisco Javier López-Brea Espiau The Strip Cipher---The Spanish Official
Method . . . . . . . . . . . . . . . . . 46--56
Philip H. Jacobsen Station AL---Guadalcanal: a Full Service
WWII Cryptologic Unit . . . . . . . . . 57--75
Craig Bauer and
Katherine Millward Cracking Matrix Encryption Row by Row 76--83
Colin Burke From the Archives: Codebreaking (or not)
in Shanghai . . . . . . . . . . . . . . 84--86
Donald Mills Review of ``Cryptography: Theory and
Practice'' by D. R. Stinson . . . . . . 87--88
David Joyner Review of ``Authentication Codes and
Combinatorial Designs'' by Dingyi Pei 89--91
Louis Kruh Reviews and Things Cryptologic . . . . . 92--94
Andreas Schinner The Voynich Manuscript: Evidence of the
Hoax Hypothesis . . . . . . . . . . . . 95--107
Robert Lewand A Cryptology Course at Bletchley Park 108--111
António Machiavelo and
Rogério Reis Automated Ciphertext---Only
Cryptanalysis of the Bifid Cipher . . . 112--124
Abhishek Parakh Oblivious Transfer Using Elliptic Curves 125--132
Stelios I. Marnas and
Lefteris Angelis and
George L. Bleris An Application of Quasigroups in
All-Or-Nothing Transform . . . . . . . . 133--142
Nick Hoffman A Simplified IDEA Algorithm . . . . . . 143--151
David Alvarez Wilhelm Fenner and the Development of
the German Cipher Bureau, 1922--1939 . . 152--163
Herbert Paulis The Scheuble Apparatus . . . . . . . . . 164--178
Craig Bauer and
Joel Burkholder From the Archives: Reading Stimson's
Mail . . . . . . . . . . . . . . . . . . 179--184
Chris Christensen Review of ``Mathematical Ciphers from
Caesar to RSA'' by Anne L. Young . . . . 185--187
David Kahn The Old Master of Austrian Cryptology 188--191
John F. Dooley Reviews of Cryptologic Fiction . . . . . 192--195
Louis Kruh Reviews and Things Cryptologic . . . . . 196--200
Mark Stamp and
Wing On Chan SIGABA: Cryptanalysis of the Full
Keyspace . . . . . . . . . . . . . . . . 201--222
Philip H. Jacobsen Radio Silence of the Pearl Harbor Strike
Force Confirmed Again: The Saga of
Secret Message Serial (SMS) Numbers . . 223--232
Simon J. Shepherd The Tiny Encryption Algorithm . . . . . 233--245
Indivar Gupta and
Jasbir Singh and
Roopika Chaudhary Cryptanalysis of an Extension of the
Hill Cipher . . . . . . . . . . . . . . 246--253
James David Bourbon Operations in China Following
World War II . . . . . . . . . . . . . . 254--262
Jukka Rislakki Searching for Cryptology's Great Wreck 263--267
Jan Bury From the Archives: Polish Interwar MFA's
Cipher Compromised? . . . . . . . . . . 268--277
David Kahn ``Histoire cryptologique'' --- a Book
Review . . . . . . . . . . . . . . . . . 278--280
Chris Christensen Review of ``Decrypted Secrets: Methods
and Maxims of Cryptology'', Fourth
Edition by F. L. Bauer . . . . . . . . . 281--283
Louis Kruh Reviews and Things Cryptologic . . . . . 284--287
Olin Sibert Robert W. Baldwin, 1957--2007 . . . . . 289--291
W. Olin Sibert and
Robert W. Baldwin The Multics \tt encipher\_Algorithm . . 292--304
Lee A. Gladwin Bulldozer: a Cribless Rapid Analytical
Machine (RAM) Solution to Enigma and its
Variations . . . . . . . . . . . . . . . 305--315
Judy A. Holdener and
Eric J. Holdener A Cryptographic Scavenger Hunt . . . . . 316--323
Sheng Zhong An Attack on the Zhou--Fan--Li
Authenticated Multiple-Key Agreement
Protocol . . . . . . . . . . . . . . . . 324--325
Alex Kuhl Rejewski's Catalog . . . . . . . . . . . 326--331
Edwin Olson Robust Dictionary Attack of Short Simple
Substitution Ciphers . . . . . . . . . . 332--342
Jan Bury From the Archives: The U.S. and West
German Agent Radio Ciphers . . . . . . . 343--357
David Hamer Review of ``Thirty Secret Years: A. G.
Denniston's Work in Signals
Intelligence: 1914--1944'' by Robin
Denniston . . . . . . . . . . . . . . . 358--360
Augusto Buonafalce Review of ``The Curse of the Voynich.
The Secret History of the World's Most
Mysterious Manuscript'' by Nicholas
Pelling . . . . . . . . . . . . . . . . 361--362
John F. Dooley Reviews of Cryptologic Fiction . . . . . 363--366
Chris Christensen and
Robert E. Lewand 2008 Joint Mathematics Meetings
Contributed Paper Session: Cryptology
for Undergraduates . . . . . . . . . . . 367--367
Craig Bauer A Note of Thanks . . . . . . . . . . . . 368--368
Jeffrey D. Adler and
Ryan W. Fuoss and
Michael J. Levin and
Amanda R. Youell Reading Encrypted Diplomatic
Correspondence: An Undergraduate
Research Project . . . . . . . . . . . . 1--12
Raphael C.-W. Phan and
Adi Shamir Improved Related-key Attacks on DESX and
DESX+ . . . . . . . . . . . . . . . . . 13--22
Chris Christensen and
Suzanne Gladfelter Taking a Cryptology Class to Bletchley
Park . . . . . . . . . . . . . . . . . . 23--32
Wayne S. Chan Key Enclosed: Examining the Evidence for
the Missing Key Letter of the Beale
Cipher . . . . . . . . . . . . . . . . . 33--36
Abhishek Parakh Oblivious Transfer Based on Key Exchange 37--44
Brian Winkel Lessons Learned from a Mathematical
Cryptology Course . . . . . . . . . . . 45--55
David Kahn The Future of the Past---Questions in
Cryptologic History . . . . . . . . . . 56--61
Augusto Buonafalce Cicco Simonetta's Cipher-Breaking Rules 62--70
Michael J. Cowan Breaking Short Playfair Ciphers with the
Simulated Annealing Algorithm . . . . . 71--83
Jan Bury From the Archives: Intercepting Best
Friend? . . . . . . . . . . . . . . . . 84--87
Chris Christensen Review of ``The Collective Works of
Captain George P. McGinnis'' by George
P. McGinnis . . . . . . . . . . . . . . 88--89
Chris Christensen Review of ``How to Tell a Secret: Tips,
Tricks & Techniques for Breaking Codes &
Conveying Covert Information'' by P. J.
Huff and J. G. Lewin . . . . . . . . . . 90--91
Joshua Holden Review of ``Complexity and Cryptography:
An Introduction'' by John Talbot and
Dominic Welsh . . . . . . . . . . . . . 92--97
John C. Gallehawk Review of ``Delusions of Intelligence''
by R. A. Ratcliff . . . . . . . . . . . 98--100
Marek Grajek Monument in Memoriam of Marian Rejewski,
Jerzy Ró\.zycki and Henryk Zygalski
Unveiled in Pozna\'n . . . . . . . . . . 101--103
Mavis Batey Dilly Knox --- a Reminiscence of this
Pioneer Enigma Cryptanalyst . . . . . . 104--130
Ching-Nung Yang and
Tse-Shih Chen Security Analysis of Authentication of
Images Using Recursive Visual
Cryptography . . . . . . . . . . . . . . 131--136
Sukamol Srikwan and
Markus Jakobsson Using Cartoons to Teach Internet
Security . . . . . . . . . . . . . . . . 137--154
Tomi S. Melka Structural Observations Regarding
RongoRongo Tablet 'Keiti' . . . . . . . 155--179
David A. Hatch From the Archives: Friedman Takes the
Stand . . . . . . . . . . . . . . . . . 180--183
Louis Kruh Review of ``Figuring It Out At Bletchley
Park 1939--1945'' by John Gallehawk and
Kerry Johnson . . . . . . . . . . . . . 184--185
Chris Christensen Review of ``Voices of the Code Breakers:
Personal Accounts of the Secret Heroes
of World War II'' by Michael Paterson 186--188
Chris Christensen Review of ``$ A^3 $ and His Algebra'' by
Nancy E. Albert . . . . . . . . . . . . 189--196
Anonymous Can You Break the NKU Monopoly? . . . . 197--197
Ralph Erskine Captured \em Kriegsmarine Enigma
Documents at Bletchley Park . . . . . . 199--219
Martin Albrecht Algebraic Attacks on the Courtois Toy
Cipher . . . . . . . . . . . . . . . . . 220--276
Colin Burke From the Archives: The Last Bombe Run,
1955 . . . . . . . . . . . . . . . . . . 277--278
James L. Massey Review of Series on Arabic Origins of
Cryptology . . . . . . . . . . . . . . . 280--283
Chris Christensen Review of \booktitleThe History of
Information Security: A Comprehensive
Handbook edited by Karl de Leeuw and Jan
Bergstra . . . . . . . . . . . . . . . . 284--294
John F. Dooley Reviews of Cryptologic Fiction . . . . . 295--298
Kent D. Boklan How I Broke an Encrypted Diary from the
War of 1812 . . . . . . . . . . . . . . 299--310
Christopher Grey and
Andrew Sturdy The 1942 Reorganization of the
Government Code and Cypher School . . . 311--333
Tobias Schrödel Breaking Short Vigen\`ere Ciphers . . . 334--347
Jerzy Jaworski Rejewski--Ró\.zycki--Zygalski Lectures in
Computer Science . . . . . . . . . . . . 348--350
Jan Bury From the Archives: Inside a Cold War
Crypto Cell. Polish Cipher Bureau in the
1980s . . . . . . . . . . . . . . . . . 351--367
Whitfield Diffie What Did We Do Before Biometric
Passports? A Review of \em Who Are You?
Identification, Deception, and
Surveillance in Early Modern Europe by
Valentin Groebner . . . . . . . . . . . 368--369
Louis Kruh Esq A Belated Tribute to Rosario Candela . . 1--11
Jean-Philippe Aumasson Cryptanalysis of a Hash Function Based
on Norm Form Equations . . . . . . . . . 12--15
Cheryl Beaver Cryptology in the Classroom: Analyzing a
Zero-Knowledge Protocol . . . . . . . . 16--23
Tomi S. Melka Some Considerations about the \em Kohau
Rongorongo Script in the Light of a
Statistical Analysis of the `Santiago
Staff' . . . . . . . . . . . . . . . . . 24--73
Jan Bury Breaking Unbreakable Ciphers. The Asen
Georgiyev Spy Case . . . . . . . . . . . 74--88
Chris Christensen Review of \booktitleModern
Cryptanalysis: Techniques for Advanced
Code Breaking by Christopher Swenson . . 89--94
David H. Hamer Review of \booktitleHerivelismus and the
German Military Enigma by John Herivel 95--97
James David Review of \booktitleThe U.S.
Intelligence Community (Fifth Edition)
by Jeffrey T. Richelson . . . . . . . . 99--101
Raphael C.-W. Phan Review of \booktitleSecurity
Engineering: A Guide to Building
Dependable Distributed Systems, 2nd
Edition by Ross J. Anderson . . . . . . 102--103
David Kruh Review of \booktitleSpies of the Bible:
Espionage in Israel from the Exodus to
the Bar Kokhba Revolt by Rose Mary
Sheldon . . . . . . . . . . . . . . . . 104--105
John F. Dooley and
Yvonne I. Ramirez Who Wrote \booktitleThe Blonde Countess?
A Stylometric Analysis of Herbert O.
Yardley's Fiction . . . . . . . . . . . 108--117
José Ramón Soler Fuensanta \booktitleTreaty of Cryptography by
Joaquín García Carmona? . . . . . . . . . 118--124
Blake Rice and
Bill Yankosky Elliptic Curve Cryptography with the
TI-83 . . . . . . . . . . . . . . . . . 125--141
Tim McDevitt and
Tom Leap Multimedia Cryptology . . . . . . . . . 142--150
Mike May, S. J. Using Maple Worksheets to Enable Student
Explorations of Cryptography . . . . . . 151--157
David E. Boliver Cryptology as College Outreach to Young
Teens . . . . . . . . . . . . . . . . . 158--165
David Link Resurrecting \em Bomba Kryptologiczna:
Archaeology of Algorithmic Artefacts, I 166--182
Jiqiang Liu and
Sheng Zhong Analysis of Kim-Jeon-Yoo Password
Authentication Schemes . . . . . . . . . 183--187
José de Jesús Angel Angel and
Guillermo Morales-Luna Cryptographic Methods During the Mexican
Revolution . . . . . . . . . . . . . . . 188--196
Colin Burke Review of \booktitleAmerican Cryptology
during the Cold War, 1945--1989 by
Thomas R. Johnson . . . . . . . . . . . 197--200
Chris Christensen Review of \booktitleAn Introduction to
Mathematical Cryptography by Hoffstein,
Pipher, and Silverman . . . . . . . . . 201--204
Howard E. Brandt Review of \booktitleProtecting
Information: From Classical Error
Correction to Quantum Cryptography by
Susan Loepp and William K. Wootters . . 205--207
David Joyner Review of \booktitleAlgorithmic Number
Theory: Lattices, Curves and
Cryptography, Edited by J. P. Buhler and
P. Stevenhagen . . . . . . . . . . . . . 208--211
John F. Dooley Reviews of Cryptologic Fiction . . . . . 212--215
Eimear Gallery and
Chris J. Mitchell Trusted Computing: Security and
Applications . . . . . . . . . . . . . . 217--245
Jongsung Kim and
Raphael C.-W. Phan Advanced Differential-Style
Cryptanalysis of the NSA's Skipjack
Block Cipher . . . . . . . . . . . . . . 246--270
Chris Christensen Reviews of Two \em Post-Quantum
Cryptography Books . . . . . . . . . . . 271--273
David H. Hamer Review of \booktitleFrom Bletchley with
Love by Mavis Batey . . . . . . . . . . 274--275
John F. Dooley Another Yardley Mystery . . . . . . . . 276--282
David Chaum and
Ben Hosp and
Stefan Popoveniuc and
Poorvi L. Vora Accessible Voter-Verifiability . . . . . 283--291
Stephen Budiansky Review of \booktitleDecoding the IRA by
Tom Mahon and James J. Gillogly . . . . 292--294
Kathryn A. Schwartz Charting Arabic Cryptology's Evolution 297--304
Sean Simmons Algebraic Cryptanalysis of Simplified
AES . . . . . . . . . . . . . . . . . . 305--314
Haihua Gu and
Dawu Gu Speeding Up the Double-Base Recoding
Algorithm of Scalar Multiplication . . . 315--320
Sujith Ravi and
Kevin Knight Attacking Letter Substitution Ciphers
with Integer Programming . . . . . . . . 321--334
Dae Hyun Yum and
Pil Joong Lee Cracking Hill Ciphers with
Goodness-of-Fit Statistics . . . . . . . 335--342
Klaus Schmeh Enigma's Contemporary Witness: Gisbert
Hasenjaeger . . . . . . . . . . . . . . 343--346
Jan Bury From the Archives: CX--52 Messages Read
by Red Poles? . . . . . . . . . . . . . 347--352
Henry B. Wolfe Review of \booktitleEavesdropping on
Hell: Historical Guide to Western
Communications Intelligence and
Holocaust, 1939--1945 by Robert J.
Hanyok . . . . . . . . . . . . . . . . . 353--355
Chris Christensen Review of \booktitleThe Shadow Factory:
The Ultra-Secret NSA from 9/11 to the
Eavesdropping on America by James
Bamford . . . . . . . . . . . . . . . . 356--358
Chris Christensen Review of \booktitleRandom Curves by
Neal Koblitz . . . . . . . . . . . . . . 359--365
Chris Christensen Review of \booktitleUltra Versus
U-Boats: Enigma Decrypts in The National
Archives by Roy Conyers Nesbit . . . . . 366--369
Anonymous A Tribute to David Kahn . . . . . . . . 1--11
David Kahn How I Discovered World War II's Greatest
Spy . . . . . . . . . . . . . . . . . . 12--21
Gerhard F. Strasser Ninth-Century Figural Poetry and
Medieval Easter Tables---Possible
Inspirations for the Square Tables of
Trithemius and Vigen\`ere? . . . . . . . 22--26
Chris Christensen Alan Turing's First Cryptology Textbook
and Sinkov's Revision of it . . . . . . 27--43
Niels Faurholt E. S. Schieber German Code Device from
WWII . . . . . . . . . . . . . . . . . . 44--51
Marko Hölbl and
Tatjana Welzer and
Bo\vstjan Brumen Attacks and Improvement of an Efficient
Remote Mutual Authentication and Key
Agreement Scheme . . . . . . . . . . . . 52--59
Jan Bury Operation Lotos: An Unsuccessful Attempt
on U.S. Government Communications . . . 60--87
Chris Christensen Review of \booktitleBletchley Park: An
Inmate's Story by James Thirsk . . . . . 88--89
Clyde G. Booker Review of \booktitleWest Wind Clear:
Cryptology and the Winds Message
Controversy -- A Documentary History . . 90--95
John F. Dooley Reviews of Cryptologic Fiction . . . . . 96--100
Brian Winkel David, Calm Down! On Second and More
Reflective Thought, Don't! . . . . . . . 101--103
Jacques Patarin and
Valérie Nachef ``I Shall Love You Until Death''
(Marie-Antoinette to Axel von Fersen) 104--114
Benedek Láng Why Don't We Decipher an Outdated Cipher
System? The Codex of Rohonc . . . . . . 115--144
Neal Koblitz Secret Codes and Online Security: a
Seminar for Entering Students . . . . . 145--154
Yesem Kurt Deciphering an Undergraduate Cryptology
Course . . . . . . . . . . . . . . . . . 155--162
William Stallings NIST Block Cipher Modes of Operation for
Confidentiality . . . . . . . . . . . . 163--175
Chris Christensen Review of the 2009 Cryptologic History
Symposium: \booktitleGlobal Perspectives
on Cryptologic History . . . . . . . . . 176--179
John F. Dooley Reviews of Cryptologic Fiction . . . . . 180--185
Clyde G. Booker Review of \booktitleThe Attack on the
Liberty: The Untold Story of Israel's
Deadly 1967 Assault on a U.S. Spy Ship
by James Scott . . . . . . . . . . . . . 186--189
Colin Burke Review of \booktitleThe Secret Sentry:
The Untold Story of the National
Security Agency by Matthew M. Aid . . . 190--193
Emil H. Levine Review of \booktitleDeciphering the
Rising Sun: Navy and Marine Corps
Codebreakers, Translators, and
Interpreters in the Pacific War by Roger
Dingman . . . . . . . . . . . . . . . . 194--196
David Kahn Louis Kruh, Cryptologist, Editor,
Activist . . . . . . . . . . . . . . . . 197--199
Ali Assarpour and
Kent D. Boklan How We Broke the Union Code (148 Years
Too Late) . . . . . . . . . . . . . . . 200--210
Jacob Konikoff and
Seth Toplosky Analysis of Simplified DES Algorithms 211--224
William Stallings NIST Block Cipher Modes of Operation for
Authentication and Combined
Confidentiality and Authentication . . . 225--235
Stefan Popoveniuc and
Poorvi L. Vora Secure Electronic Voting --- a Framework 236--257
Abhishek Parakh and
Subhash Kak Internet Voting Protocol Based on
Improved Implicit Security . . . . . . . 258--268
Chris Christensen Review of \booktitleElementary
Cryptanalysis: A Mathematical Approach,
Second Edition, by Abraham Sinkov,
revised and updated by Todd Feil . . . . 269--272
Chris Christensen Review of \booktitleThe Real Enigma
Heroes by Phil Shanahan . . . . . . . . 273--277
Chris Christensen Review of Two ``Gift Books'' about
Cryptology . . . . . . . . . . . . . . . 278--279
Ashwin Jain and
C. Hari A New Efficient Protocol for
$k$-out-of-$n$ Oblivious Transfer . . . 282--290
Klaus Schmeh Alexander von Kryha and His Encryption
Machines . . . . . . . . . . . . . . . . 291--300
José Ramón Soler Fuensanta and
Francisco Javier López-Brea Espiau and
Frode Weierud Spanish Enigma: a History of the Enigma
in Spain . . . . . . . . . . . . . . . . 301--328
Dirk Rijmenants Enigma Message Procedures Used by the
Heer, Luftwaffe and Kriegsmarine . . . . 329--339
Ralph Erskine Ultra Reveals a Late \em B-Dienst
Success in the Atlantic . . . . . . . . 340--358
Colin Burke From the Archives: a Lady Codebreaker
Speaks: Joan Murray, the Bombes and the
Perils of Writing Crypto-History From
Participants' Accounts . . . . . . . . . 359--370
Gerhard F. Strasser Review of \booktitleVersteckte
Botschaften. Die faszinierende
Geschichte der Steganografie (Hidden
Messages. The Fascinating Story of
Steganography) . . . . . . . . . . . . . 371--380
John F. Dooley Was Herbert O. Yardley a Traitor? . . . 1--15
Wolfgang Ertel and
Lucia Jans and
Walter Herzhauser and
Joachim Fessler An Enigma Replica and its Blueprints . . 16--21
Jim Reeds American Dragon . . . . . . . . . . . . 22--41
Robert Edward Lewand Secret Keeping 101---Dr. Janice Martin
Benario and the Women's College
Connection to ULTRA . . . . . . . . . . 42--46
Abdelmalek Azizi and
Mostafa Azizi Instances of Arabic Cryptography in
Morocco . . . . . . . . . . . . . . . . 47--57
Manik Lal Das A Key Escrow-Free Identity-Based
Signature Scheme without using Secure
Channel . . . . . . . . . . . . . . . . 58--72
Chris Christensen and
David Agard William Dean Wray (1910--1962): the
Evolution of a Cryptanalyst . . . . . . 73--96
Chris Christensen Review of \booktitleCryptography and
Network Security: Principles and
Practice, Fifth Edition . . . . . . . . 97--99
Chris Christensen Review of \booktitleAlgebraic
Cryptanalysis . . . . . . . . . . . . . 100--105
Chris Christensen Review of \booktitleUnderstanding
Cryptography . . . . . . . . . . . . . . 106--107
David Kahn Letter to the Editor . . . . . . . . . . 109--109
David H. Hamer The David Kahn Collection at NSA's
National Cryptologic Museum . . . . . . 110--113
Philip Marks Operational Use and Cryptanalysis of the
Kryha Cipher Machine . . . . . . . . . . 114--155
Wayne Patterson The Cryptology of Baseball . . . . . . . 156--163
Betsy Rohaly Smoot An Accidental Cryptologist: The Brief
Career of Genevieve Young Hitt . . . . . 164--175
Jan Bury From the Archives: Breaking OTP Ciphers 176--188
Chris Christensen Review of \booktitleThe Secret Life of
Bletchley Park: The World War II
Codebreaking Centre and the Men and
Women Who Were There . . . . . . . . . . 189--191
Chris Christensen Review of Bletchley Park Trust Reports
by Frank Carter . . . . . . . . . . . . 192--195
David H. Hamer Review of \booktitleDilly---The Man Who
Broke Enigmas by Mavis Batey . . . . . . 196--197
Stephen Budiansky Letter to the Editor . . . . . . . . . . 199--202
Steven M. Bellovin Frank Miller: Inventor of the One-Time
Pad . . . . . . . . . . . . . . . . . . 203--222
Franco P. Preparata Steps Toward Unraveling a Vatican Cipher
of the 1930s . . . . . . . . . . . . . . 223--234
Jan Hajny and
Vaclav Zeman Anonymous Authentication with Spread
Revelation . . . . . . . . . . . . . . . 235--246
Zdzis aw J. Kapera Summary Report of the State of the
Soviet Military Sigint in November 1942
Noticing ``ENIGMA'' . . . . . . . . . . 247--256
Paul W. Child Cipher against Ciphers: Jonathan Swift's
Latino--Anglicus Satire of Medicine . . 257--266
Chris Christensen US Navy Cryptologic Mathematicians
during World War II . . . . . . . . . . 267--276
Frank Carter Keith Batey and John Herivel: Two
Distinguished Bletchley Park
Cryptographers . . . . . . . . . . . . . 277--281
Chris Christensen Review of \booktitleInside Room 40: The
Codebreakers of World War I by Paul
Grannon . . . . . . . . . . . . . . . . 282--288
Anthony Glees Review of \booktitleGCHQ: The Uncensored
Story of Britain's Most Secret
Intelligence Agency by Richard J.
Aldrich . . . . . . . . . . . . . . . . 289--292
Chris Christensen Review of \booktitleThe Bletchley Park
Codebreakers by Ralph Erskine and
Michael Smith . . . . . . . . . . . . . 293--296
Jan Bury Operation \em Stonka. An Ultimate
Deception Spy Game . . . . . . . . . . . 297--327
Moshe Rubin John F. Byrne's Chaocipher Revealed: An
Historical and Technical Appraisal . . . 328--379
Anonymous Editorial Board EOV . . . . . . . . . . ebi--ebi
Craig Bauer Space Crunchers and GOST Busters! . . . 1--1
Nicolas T. Courtois Security Evaluation of GOST 28147-89 in
View of International Standardisation 2--13
Klaus Schmeh The Pathology of Cryptology --- a
Current Survey . . . . . . . . . . . . . 14--45
Eric Brier and
Wenjie Fang and
David Naccache How to Scatter a Secret? . . . . . . . . 46--54
Peter Donovan The Flaw in the JN-25 Series of Ciphers,
II . . . . . . . . . . . . . . . . . . . 55--61
Kyung-Ah Shim Security Flaws in Three Password-Based
Remote User Authentication Schemes with
Smart Cards . . . . . . . . . . . . . . 62--69
Matthew V. Ball and
Cyril Guyot and
James P. Hughes and
Luther Martin and
Landon Curt Noll The XTS--AES Disk Encryption Algorithm
and the Security of Ciphertext Stealing 70--79
John F. Dooley Review of \booktitleThe Mystic Cipher by
Dennis L. Mangrum . . . . . . . . . . . 80--83
Craig Bauer 100 Years Times Two: Alan Turing and the
Voynich Manuscript . . . . . . . . . . . 85--87
Chris Christensen and
David Joyner and
Jenna Torres Lester Hill's Error-Detecting Codes . . 88--103
Marine Minier and
Raphael C.-W. Phan and
Benjamin Pousse On Integral Distinguishers of Rijndael
Family of Ciphers . . . . . . . . . . . 104--118
Jan Bury Project Kalina: The Lotos Operation
Conundrum . . . . . . . . . . . . . . . 119--128
Alan T. Sherman and
Dhananjay Phatak and
Vivek G. Relan and
Bhushan Sonawane Location Authentication, Tracking, and
Emergency Signaling through Power Line
Communication: Designs and Protocols for
New Out-of-Band Strategies . . . . . . . 129--148
Cheryl Beaver and
Stuart Boersma KRYPTOS: a Pacific Northwest
Cryptanalysis Contest for Undergraduates 149--156
Chris Christensen Review of the 2011 Cryptologic History
Symposium \em Cryptology in War and
Peace: Crisis Points in History . . . . 157--160
John F. Dooley Review of \booktitleJoe Rochefort's War
by Elliot Carlson . . . . . . . . . . . 161--163
David H. Hamer Review of \booktitleThe Secrets of
Station X --- How the Bletchley Park
Codebreakers Helped Win the War by
Michael Smith . . . . . . . . . . . . . 164--166
Chris Christensen Review of \booktitleSecret Days:
Code-Breaking in Bletchley Park by Asa
Briggs . . . . . . . . . . . . . . . . . 167--172
Chris Christensen Review of \booktitleNeil Webster's Cribs
for Victory edited by Joss Pearson . . . 173--175
Chris Christensen Review of \booktitleIn the Shadow of
Pont du Gard: The Polish Enigma in Vichy
France (June 1940 to November 1942) by
Zdzislaw J. Kapera . . . . . . . . . . . 176--178
Chris Christensen Review of \booktitleInside Enigma: The
Secrets of the Enigma Machine and Other
Historic Cipher Machines by Tom Perera 179--180
Chris Christensen Review of \booktitleThe Information: A
History, A Theory, A Flood by James
Gleick . . . . . . . . . . . . . . . . . 181--182
David Agard and
Chris Christensen Review of \booktitleThe Theory That
Would Not Die by Sharon McGrayne . . . . 183--190
Sandy Zabell Commentary on Alan M. Turing: The
Applications of Probability to
Cryptography . . . . . . . . . . . . . . 191--214
Jan Bury Assembling the Puzzle Game: The Jacek
Jurzak Spy Case . . . . . . . . . . . . 215--229
Gerhard F. Strasser Late 18th-Century French Encrypted
Diplomatic ``Letters of Recommendation''
--- Or, How to Unwittingly Carry Your
Own Warrant . . . . . . . . . . . . . . 230--239
Gregory V. Bard and
Shaun V. Ault and
Nicolas T. Courtois Statistics of Random Permutations and
the Cryptanalysis of Periodic Block
Ciphers . . . . . . . . . . . . . . . . 240--262
J. Ramón Soler Fuensanta and
Francisco Javier López-Brea Espiau and
Diego Navarro Bonilla A Cryptanalysis Service During the
Spanish Civil War . . . . . . . . . . . 263--289
David H. Hamer First Charlotte International
Cryptologic Symposium and Exhibit . . . 290--294
Alan M. Turing and
D. Bayley Report on Speech Secrecy System DELILAH,
a Technical Description Compiled by A.
M. Turing and Lieutenant D. Bayley REME,
1945--1946 . . . . . . . . . . . . . . . 295--340
Jan Bury Polish Cold War Codebreaking of
1959--1989: a Preliminary Assessment . . 341--379
Anonymous Editorial Board EOV . . . . . . . . . . ebi--ebi
Nicolas T. Courtois Low-Complexity Key Recovery Attacks on
GOST Block Cipher . . . . . . . . . . . 1--10
Saul Kelly Room 47: The Persian Prelude to the
Zimmermann Telegram . . . . . . . . . . 11--50
Fco. Alberto Campos and
Alberto Gascón and
Jesús María Latorre and
J. Ramón Soler Genetic Algorithms and Mathematical
Programming to Crack the Spanish Strip
Cipher . . . . . . . . . . . . . . . . . 51--68
Quynh Dang Changes in Federal Information
Processing Standard (FIPS) 180-4, Secure
Hash Standard . . . . . . . . . . . . . 69--73
Joshua Holden Demitasse: a `Small' Version of the Tiny
Encryption Algorithm and Its Use in a
Classroom Setting . . . . . . . . . . . 74--83
John F. Dooley 1929--1931: a Transition Period in U.S.
Cryptologic History . . . . . . . . . . 84--98
Chris Christensen Review of \booktitleSecret Postings:
Bletchley Park to the Pentagon by
Charlotte Webb. Book Tower Publishing,
Redditch, Worcestershire, UK, 2011. 72
pages, Paperback, \pounds 6.99. ISBN
978-0-9557164-1-6 . . . . . . . . . . . 99--101
Chris Christensen Review of \booktitleIntroduction to
Cryptography with Mathematical
Foundations and Computer Implementation
by Alexander Stanoyevitch. Chapman and
Hall/CRC, Boca Raton, FL, 2010. 699
pages, Hardcover, \$89.95. ISBN
1-4398-1763-4} . . . . . . . . . . . . . 102--104
Chris Christensen Announcement of the 2013 Cryptologic
History Symposium ``Technological Change
and Cryptology: Meeting the Historical
Challenges'' 17-18 October 2013 . . . . 105--106
Joshua Holden A Good Hash Function is Hard to Find,
and Vice Versa . . . . . . . . . . . . . 107--119
Samantha Campbell and
Max Grinchenko and
William Smith Linear Cryptanalysis of Simplified AES
Under Change of S-Box . . . . . . . . . 120--138
Randy Rezabek TICOM and the Search for OKW / \em Chi 139--153
Sachin Kumar and
R. K. Sharma Recursive Information Hiding of Secrets
by Random Grids . . . . . . . . . . . . 154--161
Karl de Leeuw Review of \booktitleForschungsstelle
Langeveld: Duits Afluisterstation in
bezet Nederland by Hans Knap . . . . . . 162--166
Chris Christensen Review of \booktitleMemories of My Work
at the Cipher Bureau of the General
Staff Second Department 1930--1945 by
Marian Rejewski . . . . . . . . . . . . 167--174
David Joyner Review of \booktitleAlgebraic Shift
Register Sequences by Mark Goresky and
Andrew Klapper . . . . . . . . . . . . . 175--183
Chris Christensen Review of \booktitleDecoding
Organization: Bletchley Park,
Codebreaking and Organization Studies by
Christopher Grey . . . . . . . . . . . . 184--188
David Joyner Review of \booktitleCryptographic
Boolean Functions and Applications by
Thomas Cusick and Pantelimon Stanica . . 189--192
Klaus Schmeh A Milestone in Voynich Manuscript
Research: Voynich 100 Conference in
Monte Porzio Catone, Italy . . . . . . . 193--203
Jeanne Anderson Breaking the BTK Killer's Cipher . . . . 204--209
William G. Flynn and
Sharon Maneki The Jack Butcher Case: A Story of
Courage, Commitment, and Concern . . . . 210--214
Todd D. Mateer Cryptanalysis of Beale Cipher Number Two 215--232
José Ramón Soler Fuensanta and
Francisco Javier López-Brea Espiau and
Diego Navarro Bonilla Revealing Secrets in Two Wars: The
Spanish Codebreakers at PC Bruno and PC
Cadix . . . . . . . . . . . . . . . . . 233--249
Amrapali Dhavare and
Richard M. Low and
Mark Stamp Efficient Cryptanalysis of Homophonic
Substitution Ciphers . . . . . . . . . . 250--281
Chris Christensen Review of \booktitleCode Talker by C.
Nez (with J. S. Avila) . . . . . . . . . 282--284
Chris Christensen Review of Two Software-Based Textbooks 285--288
John Alexander and
Kevin Coleman and
David White and
Nick Miers and
John Gallehawk Whittingham--Collingwood Cipher Machine 289--304
Darren Glass A First-Year Seminar on Cryptography . . 305--310
William Stallings Digital Signature Algorithms . . . . . . 311--327
Abdelmalek Azizi and
Mostafa Azizi Instances of Arabic Cryptography in
Morocco II . . . . . . . . . . . . . . . 328--337
Maria Fronczak Atbah-Type Ciphers in the Christian
Orient and Numerical Rules in the
Construction of Christian Substitution
Ciphers . . . . . . . . . . . . . . . . 338--344
Da-Zhi Sun and
Zhen-Fu Cao On the Privacy of Khan et al.'s Dynamic
ID-Based Remote Authentication Scheme
with User Anonymity . . . . . . . . . . 345--355
Chris Christensen Review of Biographies of Alan Turing . . 356--367
David H. Hamer Review of \booktitleHitler's
Codebreakers --- German Signals
Intelligence in World War 2 by John
Jackson . . . . . . . . . . . . . . . . 368--370
Anonymous Editorial Board EOV . . . . . . . . . . ebi--ebi
Jeff Calof and
Jeff Hill and
Moshe Rubin Chaocipher Exhibit 5: History, Analysis,
and Solution of \booktitleCryptologia's
1990 Challenge . . . . . . . . . . . . . 1--25
Guido Bertoni and
Joan Daemen and
Michaël Peeters and
Gilles Van Assche The Making of KECCAK . . . . . . . . . . 26--60
Randy Rezabek The Russian Fish with Caviar . . . . . . 61--76
John F. Dooley and
Elizabeth Anne King John Matthews Manly: The
\booktitleCollier's Articles . . . . . . 77--88
John F. Dooley Review of \booktitleInferno by Dan Brown 89--92
John F. Dooley Review of \booktitleMr. Penumbra's
24-Hour Bookstore by Robin Sloan . . . . 93--95
Gerhard F. Strasser Review of \booktitleMechanisches
Memorieren und Chiffrieren um 1430:
Johannes Fontanas Tractatus de
instrumentis artis memorie by Horst
Kranz and Walter Oberschelp . . . . . . 96--101
Nicholas Rescher Leibniz's \em Machina Deciphratoria: A
Seventeenth-Century Proto-Enigma . . . . 103--115
Kelly Chang and
Richard M. Low and
Mark Stamp Cryptanalysis of Typex . . . . . . . . . 116--132
Kathryn A. Schwartz From Text to Technological Context:
Medieval Arabic Cryptology's Relation to
Paper, Numbers, and the Post . . . . . . 133--146
Jan Bury Pinpointing the Mark: On the Cold War
SIGINT Capability . . . . . . . . . . . 147--151
Chris Christensen The National Cash Register Company
Additive Recovery Machine . . . . . . . 152--177
Ki-Hyun Jung and
Kee-Young Yoo Three-Directional Data Hiding Method for
Digital Images . . . . . . . . . . . . . 178--191
Chris Christensen Review of \booktitleSecret History: The
Story of Cryptology by Craig P. Bauer 192--193
Betsy Rohaly Smoot Review of \booktitleWorld War I and the
Origins of U.S. Military Intelligence by
James L. Gilbert . . . . . . . . . . . . 194--196
George Lasry and
Nils Kopal and
Arno Wacker Solving the Double Transposition
Challenge with a Divide-and-Conquer
Approach . . . . . . . . . . . . . . . . 197--214
Subhash Kak and
Monisha Prabhu Cryptographic Applications of Primitive
Pythagorean Triples . . . . . . . . . . 215--222
Lorelei Koss Writing and Information Literacy in a
Cryptology First-Year Seminar . . . . . 223--231
Charles F. Rocca Jr. Mathematics in the History of
Cryptography . . . . . . . . . . . . . . 232--243
David Kahn The Naval Intercept Station at
Bainbridge Island, Washington . . . . . 244--247
David List and
John Gallehawk Revelation for Cilli's . . . . . . . . . 248--265
Christopher Grey From the Archives: Colonel Butler's
Satire of Bletchley Park . . . . . . . . 266--275
Chris Christensen Review of the 2013 Cryptologic History
Symposium, \em Technological Change and
Cryptology: Meeting the Historical
Challenge . . . . . . . . . . . . . . . 276--281
David H. Hamer Book Review: \booktitleDönitz, U-Boats,
Convoys by Jak P. Mallmann Showell . . . 282--284
Chris Christensen Book Review: \booktitleA Brief History
of Cryptology and Cryptographic
Algorithms by John F. Dooley . . . . . . 285--286
Chris Christensen Book Review: \booktitleThe History of
Traffic Analysis: World War I--Vietnam
by Donald A. Borrmann et al. . . . . . . 287--290
Chris Christensen Book Review: \booktitleBletchley Park:
The Code-Breakers of Station X by
Michael Smith . . . . . . . . . . . . . 291--292
Chris Christensen Lester Hill Revisited . . . . . . . . . 293--332
Kent D. Boklan How I Decrypted a Confederate Diary ---
And the Question of the Race of Mrs.
Jefferson Davis . . . . . . . . . . . . 333--347
Nicolas T. Courtois Cryptanalysis of Two GOST Variants with
$ 128$-Bit Keys . . . . . . . . . . . . 348--361
Raul Rojas Konrad Zuse's Proposal for a Cipher
Machine . . . . . . . . . . . . . . . . 362--369
Qinglong Wang and
Jintai Ding Cryptanalysis and Improvement of a
$k$-out-of-$n$ Oblivious Transfer
Protocol . . . . . . . . . . . . . . . . 370--376
Anonymous Editorial Board EOV . . . . . . . . . . ebi--ebi
Betsy Rohaly Smoot NSA Release and Transfer of Records
Related to William F. Friedman . . . . . 1--2
L. Babinkostova and
A. M. Bowden and
A. M. Kimball and
K. J. Williams A Simplified and Generalized Treatment
of DES-Related Ciphers . . . . . . . . . 3--24
Philip Marks Enigma Wiring Data: Interpreting Allied
Conventions from World War II . . . . . 25--65
Roberto Narváez Some Diplomatic Ciphers of the First
Mexican Federal Republic (1824--1830) 66--83
Klaus Schmeh Second Charlotte International
Cryptologic Symposium . . . . . . . . . 84--91
John F. Dooley Book Review: \booktitleGeorge Fabyan by
Richard Munson . . . . . . . . . . . . . 92--98
Chris Christensen Book Review: \booktitleThe Lost World of
Bletchley Park by Sinclair McKay . . . . 99--100
David H. Hamer Book Review: \booktitleGordon Welchman:
Bletchley Park's Architect of Ultra
Intelligence by Joel Greenberg . . . . . 101--103
Lavinia Corina Ciungu and
David Kahn A Historical Survey of Romanian
Intelligence . . . . . . . . . . . . . . 105--120
Gwoboa Horng Accelerating DSA Signature Generation 121--125
Eugen Antal and
Pavol Zajac Key Space and Period of Fialka M-125
Cipher Machine . . . . . . . . . . . . . 126--144
Nicolas T. Courtois and
Theodosis Mourouzis and
Michal Misztal and
Jean-Jacques Quisquater and
Guangyan Song Can GOST Be Made Secure Against
Differential Cryptanalysis? . . . . . . 145--156
Karl de Leeuw J. F. W. Nuboer and the Reintroduction
of Machine Cryptography by the Royal
Netherlands Navy, 1915--1940 . . . . . . 157--172
Craig Bauer Friedman Auditorium Times Two . . . . . 173--177
Chris Christensen Review of IEEE Milestone Award to the
Polish Cipher Bureau for ``The First
Breaking of Enigma Code'' . . . . . . . 178--193
Chris Christensen Book Review: \booktitleMarian Rejewski:
The Man Who Defeated Enigma by Zdzis\law
Jan Kapera . . . . . . . . . . . . . . . 194--197
Chris Christensen Book Review: \booktitleAlan Turing: His
Work and Impact, edited by S. Barry
Cooper and Jan van Leeuwen . . . . . . . 198--202
Jeanne Anderson Kaczynski's Ciphers . . . . . . . . . . 203--209
Chris Christensen and
Jared Antrobus The Story of Mamba: Aligning Messages
Against Recovered Additives . . . . . . 210--243
V. Gayoso Martínez and
L. Hernández Encinas and
A. Queiruga Dios Security and Practical Considerations
When Implementing the Elliptic Curve
Integrated Encryption Scheme . . . . . . 244--269
Haihua Gu and
Dawu Gu and
Wenlu Xie and
Ray C. C. Cheung Efficient Pairing Computation on Huff
Curves . . . . . . . . . . . . . . . . . 270--275
Benedek Láng Shame, Love, and Alcohol: Private
Ciphers in Early Modern Hungary . . . . 276--287
Chris Christensen Book Review: \booktitleBlackett's War by
Stephen Budiansky . . . . . . . . . . . 288--290
Alan G. Konheim The Impetus to Creativity in Technology 291--314
Betsy Rohaly Smoot Parker Hitt's First Cylinder Device and
the Genesis of U.S. Army Cylinder and
Strip Devices . . . . . . . . . . . . . 315--321
Nicolas Courtois On Multiple Symmetric Fixed Points in
GOST . . . . . . . . . . . . . . . . . . 322--334
Thomas H. Barr and
Andrew J. Simoson Twisting the Keyword Length from a
Vigen\`ere Cipher . . . . . . . . . . . 335--341
Klaus Schmeh Encrypted Books: Mysteries that Fill
Hundreds of Pages . . . . . . . . . . . 342--361
Chris Christensen Book Review: \booktitleAct of War:
Lyndon Johnson, North Korea, and the
Capture of the Spy Ship Pueblo by Jack
Cheevers . . . . . . . . . . . . . . . . 362--372
Chris Christensen Book Review: \booktitleThe Riddle of the
Labyrinth by Margalit Fox . . . . . . . 373--375
Anonymous Editorial Board EOV . . . . . . . . . . ebi--ebi
Tzonelih Hwang and
Prosanta Gope RT-OCFB: Real-Time Based Optimized
Cipher Feedback Mode . . . . . . . . . . 1--14
Michael Goodman and
Huw Dylan British Intelligence and the Fear of a
Soviet Attack on Allied Communications 15--32
Jozef Kollár Soviet VIC Cipher: No Respector of
Kerckoff's Principles . . . . . . . . . 33--48
George Lasry and
Nils Kopal and
Arno Wacker Automated Known-Plaintext Cryptanalysis
of Short Hagelin M-209 Messages . . . . 49--69
Olaf Ostwald and
Frode Weierud History and Modern Cryptanalysis of
Enigma's Pluggable Reflector . . . . . . 70--91
John Wright Rejewski's Test Message as a Crib . . . 92--106
John F. Dooley Review of \booktitlePrisoners, Lovers, &
Spies, by Kristie Macrakis . . . . . . . 107--112
Jan Bury Operation ``Zachod'': Sex, lies, and
ciphers . . . . . . . . . . . . . . . . 113--140
George Lasry and
Nils Kopal and
Arno Wacker Ciphertext-only cryptanalysis of Hagelin
M-209 pins and lugs . . . . . . . . . . 141--176
Harold Thimbleby Human factors and missed solutions to
Enigma design weaknesses . . . . . . . . 177--202
José Ramón Soler Fuensanta and
Vicente Guasch Portas States by secrecy: Cryptography and
guerrillas in the Spanish Civil War . . 203--214
Anders Wik Enigma Z30 retrieved . . . . . . . . . . 215--220
Daniel Loebenberger and
Michael Nüsken Design principles of DES-like ciphers: A
historical overview . . . . . . . . . . 221--239
Gerhard F. Strasser Samuel Zimmermann's \em Gehaimnussen:
The earliest cryptological book in
German . . . . . . . . . . . . . . . . . 240--260
Luis Alberto Benthin Sanguino and
Gregor Leander and
Christof Paar and
Bernhard Esslinger and
Ingo Niebel Analyzing the Spanish strip cipher by
combining combinatorial and statistical
methods . . . . . . . . . . . . . . . . 261--284
Tzonelih Hwang and
Prosanta Gope PFC-CTR, PFC-OCB: Efficient stream
cipher modes of authencryption . . . . . 285--302
Klaus Pommerening Cryptanalysis of nonlinear feedback
shift registers . . . . . . . . . . . . 303--315
Roberto Narváez On the cryptography of James Leander
Cathcart (1767--1843) . . . . . . . . . 316--326
John Wright A recursive solution for Turing's
$H$-$M$ factor . . . . . . . . . . . . . 327--347
Subhash Kak Simulating entanglement in classical
computing for cryptographic applications 348--354
Martin Samuels Ludwig Föppl: A Bavarian cryptanalyst on
the Western front . . . . . . . . . . . 355--373
George Lasry and
Nils Kopal and
Arno Wacker Cryptanalysis of columnar transposition
cipher with long keys . . . . . . . . . 374--398
Craig Bauer Review of \booktitleUnveiling the Mystic
Ciphers by Dave Ramsden . . . . . . . . 399--401
Betsy Rohaly Smoot and
David Hatch Ann Zeilinger Caracristi (1 February
1921--10 January 2016) . . . . . . . . . 403
Kent D. Boklan How I deciphered a Robert E. Lee letter
--- and a note on the power of context
in short polyalphabetic ciphers . . . . 406
Paolo Bonavoglia and
Consolato Pellegrino The last poem of Pietro Giannone ---
finally decrypted . . . . . . . . . . . 411
Daniel J. Girard Breaking ``Tirpitz'': Cryptanalysis of
the Japanese--German joint naval cipher 428
Tom Leap and
Tim McDevitt and
Kayla Novak and
Nicolette Siermine Further improvements to the
Bauer--Millward attack on the Hill
cipher . . . . . . . . . . . . . . . . . 452
Chris Christensen A review of three books about the women
of Bletchley Park . . . . . . . . . . . 469
Nick Hoffman Review of \booktitleIntercept: The
Secret History of Computers and Spies by
Gordon Corera . . . . . . . . . . . . . 477
David Visco Somerton Man times two . . . . . . . . . 481
Betsy Rohaly Smoot Call for papers: 2017 Symposium on
Cryptologic History . . . . . . . . . . 484
George Lasry and
Moshe Rubin and
Nils Kopal and
Arno Wacker Cryptanalysis of Chaocipher and solution
of Exhibit 6 . . . . . . . . . . . . . . 487--514
Shane Kepley and
David Russo and
Rainer Steinwandt Cryptanalysis of a modern rotor machine
in a multicast setting . . . . . . . . . 515--521
Qian Yu and
Chang N. Zhang A new and fast cryptographic hash
function based on RC4 . . . . . . . . . 522--540
Craig Bauer and
Gregory Link and
Dante Molle James Sanborn's \em Kryptos and the
matrix encryption conjecture . . . . . . 541--552
David H. Hamer Review of \booktitleProf: Alan Turing
Decoded by Dermot Turing . . . . . . . . 553--555
Chris Christensen Companion review of \booktitleProf: Alan
Turing Decoded by Dermot Turing . . . . 556--562
Chris Christensen Review of \booktitleCodes, Ciphers and
Spies: Tales of Military Intelligence in
World War I by John F. Dooley . . . . . 563--566
Chris Christensen Review of \booktitleU.S. Navy
Codebreakers, Linguists, and
Intelligence Officers against Japan,
1910--1941 by Steven E. Maffeo . . . . . 567--569
Anonymous Editorial Board . . . . . . . . . . . . ebi--ebi
Rohit Vobbilisetty and
Fabio Di Troia and
Richard M. Low and
Corrado Aaron Visaggio and
Mark Stamp Classic cryptanalysis using hidden
Markov models . . . . . . . . . . . . . 1--28
Alan T. Sherman and
John Seymour and
Akshayraj Kore and
William Newton Chaum's protocol for detecting
man-in-the-middle: Explanation,
demonstration, and timing studies for a
text-messaging scenario . . . . . . . . 29--54
Rafal Wieczorek Putative duplication glyph in the
Rongorongo script . . . . . . . . . . . 55--72
Klaus Schmeh Review of the 15th NSA Cryptologic
History Symposium . . . . . . . . . . . 73--80
Chris Christensen Review of \booktitleThe SIGABA/ECM II
Cipher Machine: ``A Beautiful Idea'' by
Timothy J. Mucklow . . . . . . . . . . . 81--84
Chris Christensen Review of \booktitleThe Neglected Giant:
Agnes Meyer Driscoll by K. Johnson . . . 85--89
Chris Christensen Review of \booktitleAn Introduction to
Number Theory with Cryptography by James
S. Kraft and Lawrence Washington . . . . 90--91
Dominik Landwehr Review of \booktitleSimpliciana:
Schriften der Grimmelshausen
Gesellschaft 2014 . . . . . . . . . . . 92--96
Jeffrey Ehme A joy to review: Two books about primes
and factoring: [Rempe-Gillen, Lasse, and
Rebecca Waldecker. \booktitlePrimality
Testing for Beginners. Student
Mathematical Library, American
Mathematical Society, 2013, 244 pages,
Paperback, \$39. ISBN 978-0-8218-9883-3.
Wagstaff, Jr., Samuel. \booktitle{The
Joy of Factoring}, Student Mathematical
Library, American Mathematical Society,
2013. 293 pages. Paperback, \$43.39.
ISBN 978-1-4704-1048-3] . . . . . . . . 97--100
George Lasry and
Ingo Niebel and
Nils Kopal and
Arno Wacker Deciphering ADFGVX messages from the
Eastern Front of World War I . . . . . . 101--136
William Stallings Format-preserving encryption: Overview
and NIST specification . . . . . . . . . 137--152
Lauren De Meyer and
Serge Vaudenay DES S-box generator . . . . . . . . . . 153--171
Klaus Schmeh Review of the 2nd Historical Ciphers
Colloquium in Kassel, Germany . . . . . 172--177
Chris Christensen Review of \em The Imitation Game . . . . 178--181
Chris Christensen Review of \booktitleDemystifying the
Bombe by Dermot Turing . . . . . . . . . 182--183
David H. Hamer Review of \booktitleThe Secret World by
Hugh Trevor-Roper . . . . . . . . . . . 184--185
David H. Hamer Review of \booktitleSolving Enigma's
Secrets by John Jackson . . . . . . . . 186--189
Chris Christensen Review of \booktitleThe Mathematics of
Encryption: An Elementary Introduction
by M. Cozzens and S. Miller . . . . . . 190--194
David Sherman The National Security Agency and the
William F. Friedman Collection . . . . . 195--238
G. Stuart Smith Elizebeth Friedman's security and career
concerns prior to World War II . . . . . 239--246
Gordon Rugg and
Gavin Taylor Hoaxing statistical features of the
Voynich Manuscript . . . . . . . . . . . 247--268
John Alexander and
John Gallehawk and
John Jackson and
Allen Pearce and
Edward Simpson A German machine for differencing and
testing additives . . . . . . . . . . . 269--280
Chris Christensen A comment on a book review . . . . . . . 281--282
Chris Christensen Review of \booktitleThe Triumph of
Zygalski's Sheets: The Polish Enigma in
the Early 1940 by Zdzis\law J. Kapera 283--285
Chris Christensen Review of \booktitleSIGINT: The Secret
History of Signals Intelligence
1914--1945 by Peter Matthews . . . . . . 286--287
Chris Christensen Review of \booktitleBletchley Park: The
Secret Archives by Sinclair McKay . . . 288
Anonymous David Hamer, family man and Enigma
expert, remembered and missed . . . . . 289--294
John Wright The Turing Bombe \em Victory and the
first naval Enigma decrypts . . . . . . 295--328
Chris Christensen The evolving relationship between
mathematics and cryptology, 1951--1952:
SCAG and the beginnings of SCAMP and
NSASAB . . . . . . . . . . . . . . . . . 329--387
Charles Varga Is Zendia the Isle of Pines? . . . . . . 388--394
Olaf Ostwald and
Frode Weierud Modern breaking of Enigma ciphertexts 395--421
Xavier Bultel and
Jannik Dreier and
Pascal Lafourcade and
Malika More How to explain modern security concepts
to your children . . . . . . . . . . . . 422--447
Jean-Philippe Échard and
Pierrick Gaudry A harmonious encoding of instrument
values by a nineteenth-century Parisian
violin dealer . . . . . . . . . . . . . 448--458
Gunnar E. Wolf and
Gina Gallegos-García Strengthening a curated web of trust in
a geographically distributed project . . 459--475
Betsy Rohaly Smoot National Security Agency releases Army
Security Agency histories covering
1945--1963 . . . . . . . . . . . . . . . 476--478
Chris Christensen Review of \booktitleSilence Means
Security: Secrets of a WWII
Code-Breaking WAC by B. Nicodemus . . . 479--480
Chris Christensen Review of \booktitleCode Warriors: NSA's
Codebreakers and the Secret Intelligence
War against the Soviet Union by S.
Budiansky . . . . . . . . . . . . . . . 481--484
Klaus Schmeh Review of \booktitleUnsolved: The
History and Mystery of the World's
Greatest Ciphers from Ancient Egypt to
Online Secret Societies by Craig Bauer 485--490
Phan Du'o'ng Hi\dêu and
Neal Koblitz Cryptography during the French and
American Wars in Vietnam . . . . . . . . 491--511
Jan Bury Lambda: A Cold War Polish line encryptor
and the networks it served . . . . . . . 512--533
S. Agievich and
A. Gorodilova and
V. Idrisova and
N. Kolomeec and
G. Shushuev and
N. Tokareva Mathematical problems of the Second
International Students' Olympiad in
Cryptography . . . . . . . . . . . . . . 534--565
Anonymous Editorial Board EOV . . . . . . . . . . ??
Philip Marks Mr. Twinn's bombes . . . . . . . . . . . 1--80
P. R. Mishra and
Yogesh Kumar and
N. R. Pillai and
R. K. Sharma On non-linearity and affine equivalence
of permutations over an arbitrary finite
commutative ring with unity . . . . . . 81--94
Gregory J. Nedved The Sino--Japanese War of 1894--1895:
Partially decrypted . . . . . . . . . . 95--105
Manuel Vázquez and
Paz Jiménez-Seral Recovering the military Enigma using
permutations --- filling in the details
of Rejewski's solution . . . . . . . . . 106--134
William Stallings The offset codebook (OCB) block cipher
mode of operation for authenticated
encryption . . . . . . . . . . . . . . . 135--145
Dheerendra Mishra Efficient and secure two-factor dynamic
ID-based password authentication scheme
with provable security . . . . . . . . . 146--175
Klaus Schmeh Review of the 3rd European Historical
Ciphers Colloquium in Smolenice,
Slovakia . . . . . . . . . . . . . . . . 176--182
John F. Dooley Review of \booktitleA Mind at Play by
Jimmy Soni and Rob Goodman . . . . . . . 183--190
Nicolas Courtois Decryption oracle slide attacks on T-310 191--204
Paolo Bonavoglia A 1916 World War I notebook of Luigi
Sacco . . . . . . . . . . . . . . . . . 205--221
John Wright Rejewski's equations: Solving for the
entry permutation . . . . . . . . . . . 222--226
Hamza Moufek and
Kenza Guenda A new variant of the McEliece
cryptosystem based on the Smith form of
convolutional codes . . . . . . . . . . 227--239
Anonymous Corrections to ``Review of \booktitleThe
Triumph of Zygalski's Sheets: The Polish
Enigma in the Early 1940s'' 2017.
\booktitleCryptologia \bf 41(3):
283--285 . . . . . . . . . . . . . . . . 240
Ryan Shaffer Spies and signals intelligence in the
early Cold War . . . . . . . . . . . . . 241--253
David Joyner Review of \booktitleA Life in Code by
Stuart G. Smith and \booktitleThe Woman
Who Smashed Codes by Jason Fagone . . . 254--257
Deborah Anderson Review of \booktitleCode Girls: The
untold story of the American women code
breakers of World War II by Liza Mundy 258--261
Ralph Erskine Review of \booktitleThe Hidden History
of Bletchley Park: A Social and
Organisational History, 1939--1945 by
Christopher Smith . . . . . . . . . . . 262--264
Klaus Schmeh Review of \booktitleThe Voynich
Manuscript by Raymond Clemens and
\booktitleThe Voynich Manuscript: The
world's most Mysterious and Esoteric
Codex by Stephen Skinner . . . . . . . . 265--270
Chris Christensen Review of \booktitleCode Breaking in the
Pacific by Peter Donovan and John Mack 271--273
Chris Christensen Review of \booktitleThe Mathematics of
Secrets by Joshua Holden . . . . . . . . 274--277
Chris Christensen Review of \booktitleThe New Codebreakers
edited by P. Ryan, D. Naccache, and
J.-J. Quisquater . . . . . . . . . . . . 278--283
Levente Zoltán Király and
Gábor Tokai Cracking the code of the Rohonc Codex 285--315
Nicolas T. Courtois and
Maria-Bristena Oprisanu Ciphertext-only attacks and weak
long-term keys in T-310 . . . . . . . . 316--336
Alan T. Sherman and
David DeLatte and
Michael Neary and
Linda Oliva and
Dhananjay Phatak and
Travis Scheponik and
Geoffrey L. Herman and
Julia Thompson Cybersecurity: Exploring core concepts
through six scenarios . . . . . . . . . 337--377
Chris Christensen Review of \booktitleWorking on the Dark
Side of the Moon: Life Inside the
National Security Agency by Thomas Reed
Willemain . . . . . . . . . . . . . . . 378--380
Norbert Biermann Analysis of Giouan Battista Bellaso's
cipher challenges of 1555 . . . . . . . 381--407
Tim McDevitt and
Jessica Lehr and
Ting Gu A parallel time--memory tradeoff attack
on the Hill cipher . . . . . . . . . . . 408--426
Nicolas Courtois and
Jörg Drobick and
Klaus Schmeh Feistel ciphers in East Germany in the
communist era . . . . . . . . . . . . . 427--444
Chris Christensen Review of \booktitleLorenz and comments
on the work of William Tutte: Roberts,
Captain Jerry. \booktitleLorenz:
Breaking Hitler's Top Secret Code at
Bletchley Park. The History Press,
Stroud, Gloucestershire UK, 2017. 240
pages, Hardcover, \pounds 20. ISBN
978-0-7509-7885-9 . . . . . . . . . . . 445--466
Gerhard F. Strasser Review of \booktitleVersteckte
Botschaften. Die faszinierende
Geschichte der Steganografie. 2.,
aktualisierte und erweiterte Auflage
(\booktitleHidden Messages. The
Fascinating Story of Steganography. 2nd,
updated and expanded edition) by Klaus
Schmeh . . . . . . . . . . . . . . . . . 467--475
Satoshi Tomokiyo How I reconstructed a Spanish cipher
from 1591 . . . . . . . . . . . . . . . 477--484
George Lasry and
Nils Kopal and
Arno Wacker Ciphertext-only cryptanalysis of short
Hagelin M-209 ciphertexts . . . . . . . 485--513
Ulug Kuzuoglu Chinese cryptography: The Chinese
Nationalist Party and intelligence
management, 1927--1949 . . . . . . . . . 514--539
Chris Christensen Review of \booktitleA Grand Gossip: The
Bletchley Park Diary of Basil Cottle
edited by James and Judith Hodsdon . . . 540--543
Chris Christensen Review of \booktitleTICOM: The Hunt for
Hitler's Codebreakers by Randy Rezabek 544--547
Anonymous Editorial Board EOV . . . . . . . . . . ??
Anonymous 2019 Symposium on Cryptologic History 1--1
Nicolas T. Courtois and
Maria-Bristena Oprisanu and
Klaus Schmeh Linear cryptanalysis and block cipher
design in East Germany in the 1970s . . 2--22
Satoshi Tomokiyo Identifying Italian ciphers from
continuous-figure ciphertexts (1593) . . 23--46
Alberto Peinado Reconstruction of a 1940 Spanish strip
cipher by means of a cyclic rotation
model applied to encrypted telegrams . . 47--64
Chris Christensen Review of \booktitleThe Spy Who Couldn't
Spell by Yudhijit Bhattacharjee . . . . 65--68
Chris Christensen Review of \booktitleStanley Johnston's
Blunder: the Reporter Who Spilled the
Secret Behind the U.S. Navy's Victory at
Midway by Elliot Carlson . . . . . . . . 69--76
Chris Christensen Review of \booktitleAlastair Denniston:
Code-Breaking from Room 40 to Berkeley
Street and the Birth of GCHQ by Joel
Greenberg . . . . . . . . . . . . . . . 77--80
Chris Christensen Edward Hugh Simpson CB (10 December
1922--5 February 2019) . . . . . . . . . 81--83
Chris Christensen and
Jared Antrobus and
Edward Simpson Aligning JN-25 messages in depth using
weights when the code groups scan . . . 84--137
A. Gorodilova and
S. Agievich and
C. Carlet and
E. Gorkunov and
V. Idrisova and
N. Kolomeec and
A. Kutsenko and
S. Nikova and
A. Oblaukhov and
S. Picek and
B. Preneel and
V. Rijmen and
N. Tokareva Problems and solutions from the fourth
International Students' Olympiad in
Cryptography (NSUCRYPTO) . . . . . . . . 138--174
Nicolas T. Courtois and
Marios Georgiou and
Matteo Scarlata Slide attacks and LC-weak keys in T-310 175--189
Hussam S. Alhadawi and
Mohamad Fadli Zolkipli and
Saba M. Ismail and
Dragan Lambi\'c Designing a pseudorandom bit generator
based on LFSRs and a discrete chaotic
map . . . . . . . . . . . . . . . . . . 190--211
Tanmoy Maitra and
Debasis Giri and
Ram N. Mohapatra SAS-SIP: A secure authentication scheme
based on ECC and a fuzzy extractor for
session initiation protocol . . . . . . 212--232
P. Mathivanan and
A. Balaji Ganesh and
R. Venkatesan QR code-based ECG signal
encryption/decryption algorithm . . . . 233--253
Ahmed Bentajer and
Mustapha Hedabou and
Karim Abouelmehdi and
Zakaria Igarramen and
Said El Fezazi An IBE-based design for assured deletion
in cloud storage . . . . . . . . . . . . 254--265
George Lasry and
Nils Kopal and
Arno Wacker Cryptanalysis of Enigma double
indicators with hill climbing . . . . . 267--292
Alan Sherman and
Enis Golaszewski and
Edward LaFemina and
Ethan Goldschen and
Mohammed Khan and
Lauren Mundy and
Mykah Rather and
Bryan Solis and
Wubnyonga Tete and
Edwin Valdez and
Brian Weber and
Damian Doyle and
Casey O'Brien and
Linda Oliva and
Joseph Roundy and
Jack Suess The SFS summer research study at UMBC:
Project-based learning inspires
cybersecurity students . . . . . . . . . 293--312
Tasnime Omrani and
Rhouma Rhouma and
Rabei Becheikh LICID: a lightweight image cryptosystem
for IoT devices . . . . . . . . . . . . 313--343
John F. Dooley The Beale ciphers in fiction . . . . . . 344--358
Jean-François Bouchaudy Genuine French WWII M-209 cryptograms 359--371
Khushboo Bussi and
Dhananjoy Dey and
P. R. Mishra and
B. K. Dass MGR Hash Functions . . . . . . . . . . . 372--390
Türker Tuncer Block-based fuzzy-image authentication
method . . . . . . . . . . . . . . . . . 391--413
Manashee Kalita and
Themrichon Tuithung and
Swanirbhar Majumder An adaptive color image steganography
method using adjacent pixel value
differencing and LSB substitution
technique . . . . . . . . . . . . . . . 414--437
Mike Clayton and
John Gallehawk Letter repeats in Enigma ciphertext
produced by same-letter keying . . . . . 438--457
Paolo Bonavoglia Bellaso's 1552 cipher recovered in
Venice . . . . . . . . . . . . . . . . . 459--465
Emma May Smith and
Marco Ponzi Glyph combinations across word breaks in
the Voynich manuscript . . . . . . . . . 466--485
Otokar Grosek and
Eugen Antal and
Tomás Fabsic Remarks on breaking the Vigen\`ere
autokey cipher . . . . . . . . . . . . . 486--496
S. Masih Ayat and
Meysam Ghahramani A recursive algorithm for solving ``a
secret sharing'' problem . . . . . . . . 497--503
Neha Kishore and
Priya Raina Parallel cryptographic hashing:
Developments in the last 25 years . . . 504--535
Chris Christensen Review of \booktitleHistory of
Cryptography and Cryptanalysis by John
Dooley . . . . . . . . . . . . . . . . . 536--538
Chris Christensen Review of \booktitleThe Cypher Bureau by
Eilidh McGinness . . . . . . . . . . . . 539--541
Chris Christensen Review of \booktitleX, Y & Z by Dermot
Turing . . . . . . . . . . . . . . . . . 542--544
R. Narváez Roberto Review of \booktitleMensajes secretos.
La historia de la criptografía Española
desde sus inicios hasta los años 50
(Secret Messages. The History of Spanish
Cryptography from its beginnings until
the 1950s) by Soler Fuensanta, José Ramón,
and Francisco Javier López-Brea Eespiau 545--550
John F. Dooley Review of \booktitle3 Ciphers by Carol
Ritz . . . . . . . . . . . . . . . . . . 551--552
Torsten Timm and
Andreas Schinner A possible generating algorithm of the
Voynich manuscript . . . . . . . . . . . 1--19
Nicolas T. Courtois and
Marios Georgiou Variable elimination strategies and
construction of nonlinear polynomial
invariant attacks on T-310 . . . . . . . 20--38
Paolo Bonavoglia The cifra delle caselle: a XVI Century
superencrypted cipher . . . . . . . . . 39--52
Alejandra Diaz and
Alan T. Sherman and
Anupam Joshi Phishing in an academic community: A
study of user susceptibility and
behavior . . . . . . . . . . . . . . . . 53--67
Manoj Kumar and
T. S. Suresh and
Saibal K. Pal and
Anupama Panigrahi Optimal differential trails in
lightweight block ciphers ANU and PICO 68--78
David Sherman and
Betsy Rohaly Smoot and
Robert J. Hanyok Introducing a new \booktitleCryptologia
series: Sources and methods for
cryptologic history . . . . . . . . . . 79--81
Anonymous Review of two collections of essays
about Alan Turing: Copeland, Jack,
Jonathan Bowen, Mark Sprevak, Robin
Wilson, and others, \booktitleThe Turing
Guide, Oxford University Press, Oxford,
2017. 546 pages, Paperback, \$29.95.
ISBN 978-0-19-874783-3. Floyd, Juliet
and Alisa Bokulich (eds.),
\booktitle{Philosophical Explorations of
the Legacy of Alan Turing: Turing 100},
Springer International Publishing, Cham,
Switzerland, 2017. 361 pages, Hardcover,
\$139.99. ISBN 978-3-319-53278-3 . . . . 82--86
Anonymous Review of \booktitleReal Life Cryptology
by Benedek Láng . . . . . . . . . . . . . 87--90
John F. Dooley Review of \booktitleThe Third Reich is
Listening by Christian Jennings . . . . 91--95
Frode Weierud and
Sandy Zabell German mathematicians and cryptology in
WWII . . . . . . . . . . . . . . . . . . 97--171
Betsy Rohaly Smoot and
Robert J. Hanyok Sources and methods for cryptologic
history: Research at the US National
Archives --- the ``Big Two'' Record
Groups . . . . . . . . . . . . . . . . . 172--196
Seongmin Park and
Juneyeun Kim and
Kookrae Cho and
Dae Hyun Yum Finding the key length of a Vigen\`ere
cipher: How to improve the twist
algorithm . . . . . . . . . . . . . . . 197--204
Thomas Kaeding Slippery hill-climbing technique for
ciphertext-only cryptanalysis of
periodic polyalphabetic substitution
ciphers . . . . . . . . . . . . . . . . 205--222
Anastasiya Gorodilova and
Sergey Agievich and
Claude Carlet and
Xiang-dong Hou and
Valeria Idrisova and
Nikolay Kolomeec and
Alexandr Kutsenko and
Luca Mariot and
Alexey Oblaukhov and
Stjepan Picek and
Bart Preneel and
Razvan Rosie and
Natalia Tokareva The Fifth International Students'
Olympiad in cryptography --- NSUCRYPTO:
Problems and their solutions . . . . . . 223--256
Cheryl Beaver and
Stuart Boersma Celebrating ten years of KRYPTOS: a
series of cryptanalysis . . . . . . . . 257--266
David Sherman Sources and methods for cryptologic
history: the William and Elizebeth Smith
Friedman collections . . . . . . . . . . 267--279
John F. Dooley Review of \booktitleThe Secret World by
Christopher Andrew . . . . . . . . . . . 280--284
Jerry McCarthy Review of the 2nd International
Conference on Historical Cryptology in
Mons, Belgium . . . . . . . . . . . . . 285--288
Nicolas T. Courtois and
Aidan Patrick and
Matteo Abbondati Construction of a polynomial invariant
annihilation attack of degree 7 for
T-310 . . . . . . . . . . . . . . . . . 289--314
Shaheena Khatoon and
Balwant Singh Thakur Cryptanalysis and improvement of
authentication scheme for roaming
service in ubiquitous network . . . . . 315--340
Prateek Pandey and
Ratnesh Litoriya Securing and authenticating healthcare
records through blockchain technology 341--356
Anindya Kumar Biswas and
Mou Dasgupta Two polynomials based $ (t, n) $
threshold secret sharing scheme with
cheating detection . . . . . . . . . . . 357--370
Sarah Parsons Sources and methods for cryptologic
history: NSA.gov --- a tour through its
history and resources . . . . . . . . . 371--382
Chris Christensen Review of \booktitleCode Cracking for
Kids, by Jean Daigneau . . . . . . . . . 383--384
David Kenyon and
Frode Weierud Enigma G: The counter Enigma . . . . . . 385--420
Jonas Alin Principal component analysis of
characters in the Voynich manuscript and
their classifications based on
comparative analysis of writings in
known languages . . . . . . . . . . . . 421--437
Lucas Boppré Niehues and
Joachim von zur Gathen and
Lucas Pandolfo Perin and
Ana Zumalacárregui Sidon sets and statistics of the ElGamal
function . . . . . . . . . . . . . . . . 438--450
Monjul Saikia and
Md. Anwar Hussain Efficient data encryption technique
using quaternions for wireless sensor
network . . . . . . . . . . . . . . . . 451--471
Robert J. Hanyok and
Betsy Rohaly Smoot Sources and methods series: considering
other record groups in Nara holding
cryptologic and cryptologic-related
records . . . . . . . . . . . . . . . . 472--476
John F. Dooley Review of \booktitleA Most Enigmatic
War, by James Goodchild . . . . . . . . 477--480
Tomi S. Melka and
Robert M. Schoch Exploring a mysterious tablet from
Easter Island: the issues of
authenticity and falsifiability in \em
rongorongo studies . . . . . . . . . . . 481--544
Beáta Megyesi and
Bernhard Esslinger and
Alicia Fornés and
Nils Kopal and
Benedek Láng and
George Lasry and
Karl de Leeuw and
Eva Pettersson and
Arno Wacker and
Michelle Waldispühl Decryption of historical manuscripts:
the DECRYPT project . . . . . . . . . . 545--559
Robert J. Hanyok and
Betsy Rohaly Smoot Sources and methods: contingency and its
role in researching records of
cryptologic history --- a discussion and
some lessons to apply for future
research . . . . . . . . . . . . . . . . 560--568
Chris Christensen Review of \booktitleThe Enigma Bulletin
edited by Zdzis\law J. Kapera . . . . . 569--572
Chris Christensen Review of \booktitleBletchley Park and
D-Day by David Kenyon . . . . . . . . . 573--576
Kenneth J. Bures Cracking PURPLE: cryptanalysis of the
\em Angooki Taipu B switch tables . . . 1--43
István Daruka On the Voynich manuscript . . . . . . . 44--80
Betsy Rohaly Smoot Sources and methods: uncovering the
story of American Cryptology in World
War I . . . . . . . . . . . . . . . . . 81--87
Chris Christensen Review of \booktitleBreaking Teleprinter
Ciphers at Bletchley Park by James A.
Reeds, Whitfield Diffie, and J. V. Field 88--93
Paolo Bonavoglia Review of \booktitleClassical cryptology
at play by Silvio Coccaro . . . . . . . 94--96
John A. Tokar NSA honors two \booktitleCryptologia
board members . . . . . . . . . . . . . 97--101
Gregory J. Nedved Herbert O. Yardley revisited: what does
the new evidence say? . . . . . . . . . 102--128
José Ramón Soler Fuensanta and
Héctor Soler Bonet and
Diego Navarro Bonilla How to make a codebook versatile. The
example of the ASLET code . . . . . . . 129--166
Kirsten Tate Identifying concealed messages using
authorship attribution . . . . . . . . . 167--177
Nicolas T. Courtois A nonlinear invariant attack on T-310
with the original Boolean function . . . 178--192
Anonymous 18th Cryptologic History Symposium . . . 193--193
Åvald Åslaugson Sommervoll and
Leif Nilsen Genetic algorithm attack on Enigma's
plugboard . . . . . . . . . . . . . . . 194--226
Dimpy Chauhan and
Indivar Gupta and
Rashmi Verma Quasigroups and their applications in
cryptography . . . . . . . . . . . . . . 227--265
George Teseleanu Quasigroups and substitution permutation
networks: a failed experiment . . . . . 266--281
Viktor Wase Benford's Law in the Beale ciphers . . . 282--286
John Dooley Review of \booktitleFlight of the Fox by
Gray Basnight . . . . . . . . . . . . . 287--288
Frode Weierud In memoriam: Thomas Ralph Erskine CB
(1933--2021) . . . . . . . . . . . . . . 289--308
Jean-François Bouchaudy Enigma: the spoils of Gustave Bertrand,
or ``par o\`u tout a commencé'' . . . . . 309--341
Rémi Géraud-Stewart and
David Naccache A French cipher from the late 19$^{th}$
century . . . . . . . . . . . . . . . . 342--370
Robert Hanyok Sources and methods: Searching for
cryptologic records in the findings of
post-World War II allied technical
surveys and commissions . . . . . . . . 371--378
Ralph Erskine Review of \booktitleThe Nazi Spy Ring in
America by Rhodri Jeffreys-Jones . . . . 379--382
George Lasry and
Ingo Niebel and
Torbjörn Andersson Deciphering German diplomatic and naval
attaché messages from 1900--1915 . . . . 383--425
Ronald Phelan and
David Simpson Ludlings: not all fun and games . . . . 426--433
Torsten Timm and
Andreas Schinner Review of \booktitleThe linguistics of
the Voynich manuscript by Claire Bowern
and Luke Lindemann . . . . . . . . . . . 434--438
Blain Patterson Analyzing student understanding of
cryptography using the SOLO taxonomy . . 439--449
Malik Zia Ullah Bashir and
Rashid Ali Cryptanalysis and improvement of a blind
multi-document signcryption scheme . . . 450--464
Betsy Rohaly Smoot Sources and methods for cryptologic
history: researching individuals (and
the biography boom) . . . . . . . . . . 465--473
Chris Christensen Review of \booktitleOperation Vengeance:
The Astonishing Aerial Ambush That
Changed World War II by Dan Hampton . . 474--477
George Lasry and
Beáta Megyesi and
Nils Kopal Deciphering papal ciphers from the 16th
to the 18th Century . . . . . . . . . . 479--540
J. Mohamedmoideen Kader Mastan and
R. Pandian Cryptanalysis of two similar chaos-based
image encryption schemes . . . . . . . . 541--552
Barry J. Griffiths Cryptography in undergraduate education:
perceptions of postgraduate students . . 553--562
Chris Christensen Review of \booktitleThe Codebreakers of
Bletchley Park by Dermot Turing . . . . 563--564
Chris Christensen Review of \booktitleA Course in
Cryptography by Heiko Knospe . . . . . . 565--568
Chris Christensen Review of \booktitleThe U.S. Navy's
On-the-Roof Gang, Volume Two, War in the
Pacific by Matt Zullo . . . . . . . . . 569--570
Chris Christensen Review of \booktitleCodebreaking: A
Practical Guide by Elonka Dunin and
Klaus Schmeh . . . . . . . . . . . . . . 571--572
Richard W. Bean and
George Lasry and
Frode Weierud Eavesdropping on the Biafra--Lisbon link
--- breaking historical ciphers from the
Biafran war . . . . . . . . . . . . . . 1--66
Enka Blanchard and
Ryan Robucci and
Ted Selker and
Alan T. Sherman Phrase-verified voting: Verifiable
low-tech remote boardroom voting . . . . 67--101
Nils Kopal and
Michelle Waldispühl Deciphering three diplomatic letters
sent by Maximilian II in 1575 . . . . . 103--127
Türker Tuncer and
Huseyin Yuce Kurum A novel Collatz conjecture-based digital
image watermarking method . . . . . . . 128--147
Vladimir Edemskiy and
Chenhuang Wu and
Chunxiang Xu Improvements on $k$-error linear
complexity of $q$-ary sequences derived
from Euler quotients . . . . . . . . . . 148--166
Hervé Talé Kalachi On the failure of the smart approach of
the GPT cryptosystem . . . . . . . . . . 167--182
Chris Christensen Review of \booktitleThe U.S. Navy's
On-the-Roof Gang, Volume One, Prelude to
War by Matt Zullo . . . . . . . . . . . 183--184
Chris Christensen Review of \booktitleOne Day in August by
David O'Keefe . . . . . . . . . . . . . 185--192
Chris Christensen Review of \booktitleGeniuses at War:
Bletchley Park, Colossus, and the Dawn
of the Digital Age by David A. Price . . 193--194
Jean-François Bouchaudy Enigma, the XYZ period (1939--1940) . . 195--271
Chris Christensen Review of \booktitleBefore Bletchley
Park: The Codebreakers of the First
World War by Paul Gannon . . . . . . . . 272--276
Chris Christensen Review of \booktitleBacking Bletchley:
The Codebreaking Outstations from
Eastcote to GCHQ by Ronald Koorm . . . . 277--279
Chris Christensen Review of \booktitleMadame X: The Story
of `003', the U.S. Army Cryptologic
Bombe in World War II by Michael
Barbakoff . . . . . . . . . . . . . . . 280--283
Chris Christensen Review of \booktitleImages of the
National Archives Codebreakers by
Stephen Twigge . . . . . . . . . . . . . 284--286
Chris Christensen Review of \booktitleReflections of Alan
Turing: a Relative Story by Dermot
Turing . . . . . . . . . . . . . . . . . 287--289
Anonymous Correction . . . . . . . . . . . . . . . 290--290
Paul W. Relkin Solving the Olum 1 Cipher . . . . . . . 291--301
Elonka Dunin and
Magnus Ekhall and
Konstantin Hamidullin and
Nils Kopal and
George Lasry and
Klaus Schmeh How we set new world records in breaking
Playfair ciphertexts . . . . . . . . . . 302--322
Paolo Bonavoglia The ciphers of the Republic of Venice:
an overview . . . . . . . . . . . . . . 323--346
David Chaum and
Mario Yaksetig and
Alan T. Sherman and
Joeri de Ruiter UDM: Private user discovery with minimal
information disclosure . . . . . . . . . 347--379
Chris Christensen Review of \booktitleUSN & USMC WW II
Cryptologists' Oral Histories; Voices
from the past, Volumes 1 and 2 by U.S.
Naval Cryptologic Veterans Association.
Volume 1 of 2 (A--L). 2019. 450 + vi
pages, Softcover, \$16.95. ISBN
978-1-7988-8747-9. Volume 2 of 2 (M--Z).
2019. 365 + iv pages, Softcover,
\$16.95. ISBN 978-1-7988-8811-7 . . . . 380--381
Chris Christensen Review of \booktitleRadio War: The
Secret Espionage War of the Radio
Security Service 1938--1946 by David
Abrutat. Fonthill Media, Stroud,
Gloucestershire, UK. 2019. 192 pages,
Hardcover, \pounds 25.00 (\$38.00). ISBN
978-1-78155-759-4} . . . . . . . . . . . 382--384
Chris Christensen Review of \booktitleThe Bombe: The
Machine that Defeated Enigma by Dermot
Turing. Arcturus Publishing Limited,
London, 2021. 64 pages, Trade paperback
A-5, \pounds 11.20. ISBN
978-1-3988-1244-4 . . . . . . . . . . . 385--386
Nicolas T. Courtois and
Marek Grajek On latin squares, invariant
differentials, random permutations and
historical Enigma rotors . . . . . . . . 387--421
Anna Lehofer Applying hierarchical clustering to
homophonic substitution ciphers using
historical corpora . . . . . . . . . . . 422--438
P. R. Mishra and
S. C. Ramola FCSR connection integers: efficient
generation, testing and counting . . . . 439--460
François Parmentier Deciphering the Voynich manuscript:
propositions to unlock research . . . . 461--484
Roger J. Morgan Rudyard Kipling's unsolved cryptogram 485--497
Sedat Bingöl Methods for encryption in early
19th-century Ottoman diplomatic
correspondence . . . . . . . . . . . . . 498--524
Dimpy Chauhan and
Indivar Gupta and
P. R. Mishra and
Rashmi Verma Construction of cryptographically strong
S-boxes from ternary quasigroups of
order 4 . . . . . . . . . . . . . . . . 525--551
Chris Christensen Review of \booktitleEavesdropping on the
Emperor: Interrogators and Codebreakers
in Britain's War with Japan by Peter
Kornicki . . . . . . . . . . . . . . . . 552--555
John F. Dooley Review of \booktitleCodebreaker by Marc
McMenamin . . . . . . . . . . . . . . . 556--560
George Lasry Cracking SIGABA in less than 24 hours on
a consumer PC . . . . . . . . . . . . . 1--37
Paul W. Relkin Solving the Olum 2 cipher: a new
approach to cryptanalysis of
transposition ciphers . . . . . . . . . 38--47
George Lasry Analysis of a late 19th century French
cipher created by Major Josse . . . . . 48--62
K. Ahmed and
S. Pal and
R. Mohan A review of the tropical approach in
cryptography . . . . . . . . . . . . . . 63--87
Stuart Boersma and
Jean Marie Linhart Review of \booktitleThe Woman All Spies
Fear by Amy Butler Greenfield and
\booktitleCode Breaker, Spy Hunter by
Laurie Wallmark, Illustrated by Brooke
Smart . . . . . . . . . . . . . . . . . 88--92
Chris Christensen Review of \booktitleCodebreaker Girls: A
Secret Life at Bletchley Park by Jan
Slimming . . . . . . . . . . . . . . . . 93--96
Craig P. Bauer The new golden age of decipherment . . . 97--100
George Lasry and
Norbert Biermann and
Satoshi Tomokiyo Deciphering Mary Stuart's lost letters
from 1578--1584 . . . . . . . . . . . . 101--202
David Sherman \booktitleThe Codebreakers war: David
Kahn, Macmillan, the government, and the
making of a cryptologic history
masterpiece . . . . . . . . . . . . . . 205--226
Stuart Boersma Elizebeth Smith Friedman and one example
of a prohibition era encryption system 227--238
Eugen Antal and
Pavol Zajac The first Czechoslovak cipher machine 239--260
Olaf Ostwald and
Frode Weierud Modern cryptanalysis of the \em
Truppenschlüssel . . . . . . . . . . . . 261--281
Chris Christensen Review of \booktitleThe Rohonc Code:
Tracing a Historical Riddle by Benedek
Láng . . . . . . . . . . . . . . . . . . 282--284
Patrick D. Anderson Review of \booktitleCrypto Wars --- The
Fight for Privacy in the Digital Age: A
Political History of Digital Encryption 285--298
Anonymous Cryptologic History Symposium, May
8--10, 2024 . . . . . . . . . . . . . . 299--301
Chris Christensen Genevieve Grotjan's ``great discovery'' 302--317
David Lòberg Code Can musical encryption be both? A survey
of music-based ciphers . . . . . . . . . 318--364
George Teseleanu Cryptographic symmetric structures based
on quasigroups . . . . . . . . . . . . . 365--392
John F. Dooley Review of \booktitleThe Rose Code by
Kate Quinn . . . . . . . . . . . . . . . 393--395
Stuart Boersma Complete examples of encryption systems
broken by Elizebeth Smith Friedman:
1923--1934 . . . . . . . . . . . . . . . 397--418
Arvind Kumar and
P. R. Mishra and
Odelu Ojjela Analysis of rotation and shift based
diffusion functions . . . . . . . . . . 419--435
Kenneth J. Bures Cracking PURPLE: the identification of
homologs in the cryptanalysis of the \em
Angooki Taipu B cipher machine . . . . . 436--448
Zhixiong Chen and
Zhihua Niu and
Yuqi Sang and
Chenhuang Wu Arithmetic autocorrelation of binary
$m$-sequences . . . . . . . . . . . . . 449--458
Joshua Holden Resource guide for teaching post-quantum
cryptography . . . . . . . . . . . . . . 459--465
Leonardo Campanelli A statistical cryptanalysis of the Beale
ciphers . . . . . . . . . . . . . . . . 466--473
Joachim von zur Gathen Unicity distance of the Zodiac-340
cipher . . . . . . . . . . . . . . . . . 474--488
Chris Christensen Review of \booktitleParker Hitt: The
Father of American Military Cryptology
by Betsy Rohaly Smoot . . . . . . . . . 489--492
Floe Foxon A treatise on the Rilke cryptogram . . . 493--510
Satish Kumar and
Indivar Gupta and
Ashok Ji Gupta A study of public key cryptosystems
based on quasigroups . . . . . . . . . . 511--540
Sedat Bingöl The changes in Ottoman diplomatic
cryptography and its methods during the
19th century (1811--1877) . . . . . . . 541--569
R. Santosh Kumar and
S. R. M. Krishna Cryptanalysis of RSA with small
difference of primes and two decryption
exponents: Jochemsz and May approach . . 570--583
Chris Christensen Review of \booktitleThe Secret Life of
an American Codebreaker: Codebreaker
Girls by Jan Slimming . . . . . . . . . 584--587
Stuart Boersma Elizebeth Smith Friedman's recovery of
the wiring of two rotors from an Enigma
D machine . . . . . . . . . . . . . . . 1--25
Selma Gomez Orr and
Cyrus Jian Bonyadi and
Enis Golaszewski and
Alan T. Sherman and
Peter A. H. Peterson and
Richard Forno and
Sydney Johns and
Jimmy Rodriguez Shadow IT in higher education: survey
and case study for cybersecurity . . . . 26--90
John F. Dooley Review of \booktitleFrom the Ground Up
by Betsy Rohaly Smoot . . . . . . . . . 91--94
John F. Dooley Review of \booktitleThe Puzzle Master by
Danielle Trussoni . . . . . . . . . . . 95--96
Beáta Megyesi and
Crina Tudor and
Benedek Láng and
Anna Lehofer and
Nils Kopal and
Karl de Leeuw and
Michelle Waldispühl Keys with nomenclatures in the early
modern Europe . . . . . . . . . . . . . 97--139
Wolfgang Killmann On security aspects of the ciphers T-310
and SKS with approved long-term keys . . 140--172
P. R. Mishra and
Arvind Kumar and
S. K. Pal and
Odelu Ojjela Bit inclusion test: an enhanced
avalanche test for stream ciphers . . . 173--192
Eugen Antal The origin of military cryptanalysis in
Czechoslovakia . . . . . . . . . . . . . 193--218
Elena Almaraz Luengo Statistical tests suites analysis
methods. Cryptographic recommendations 219--251
Philip Marks Review of \booktitleBehind the Enigma by
John Ferris . . . . . . . . . . . . . . 252--281
Chris Christensen Review of \booktitle100 People You Never
Knew Were at Bletchley Park by Sinclair
McKay . . . . . . . . . . . . . . . . . 282--284
Chris Christensen Review of \booktitleNo More Secrets: My
Part in Codebreaking at Bletchley Park
and the Pentagon by Betty Webb . . . . . 285--288
Anonymous The Immortal David Kahn . . . . . . . . 289--289
Anindya Kumar Biswas and
Mou Dasgupta and
Sangram Ray Cryptanalysis and improvement of Q. Peng
et al.'s PVSS scheme . . . . . . . . . . 291--304
Torsten Timm and
Andreas Schinner The Voynich manuscript: discussion of
text creation hypotheses . . . . . . . . 305--322
Kamwa Djomou Franck Rivel and
Fouotsa Emmanuel and
Tadmon Calvin Expanded low-rank parity-check codes and
their application to cryptography . . . 323--351
Tomi S. Melka and
Robert M. Schoch Review of \booktitleRongorongo:
Inscribed Objects from Rapa Nui . . . . 352--380
John F. Dooley Review of \booktitleThe Enigma Affair by
Charlie Lovett . . . . . . . . . . . . . 381--383
Elonka Dunin and
Klaus Schmeh Review of the second edition of Craig
Bauer's ``\booktitleSecret History: The
Story of Cryptology, Second Edition'' 384--386
Wayne S. Chan Breaking the Silk Dress cryptogram . . . 387--426
Thomas Larsen Leo Marks' ``mental one-time pad'': an
experimental cipher for British special
operations in World War II . . . . . . . 427--436
Dimpy Chauhan and
Indivar Gupta and
P. R. Mishra and
Rashmi Verma An ultra-lightweight block cipher with
string transformations . . . . . . . . . 437--468
Chris Christensen Review of \booktitleThe Bletchley Park
Codebreakers in their own words by Joel
Greenberg . . . . . . . . . . . . . . . 469--473
Chris Christensen Review of \booktitleThe First Enigma
Codebreaker: The Untold Story of Marian
Rejewski Who Passed the Baton to Alan
Turing . . . . . . . . . . . . . . . . . 474--478
Chris Christensen Review of \booktitleQueen of Codes: The
Secret Life of Emily Anderson, Britain's
Greatest Female Codebreaker by Jackie Uí
Chionna . . . . . . . . . . . . . . . . 479--482
Jean-Charles Foucrier Why the French military cryptanalysis
failed to break Enigma . . . . . . . . . 483--505
M. R. Oberman The undisclosed history of the Dutch
governmental telex-message security
1945--1960 . . . . . . . . . . . . . . . 506--518
Chris Christensen The Japanese Green Machine . . . . . . . 519--557
Christian Millichap and
Yeeka Yau and
Alyssa Pate and
Morgan Carns Modifying twist algorithms for
determining the key length of a
Vigen\`ere cipher . . . . . . . . . . . 558--573
Chris Christensen Review of \booktitleThe Real Special
Relationship: The True Story of How the
British and US Secret Services Work
Together, by Michael Smith. Simon &
Schuster UK Ltd., London, 2023. 553 +
xxii pages, Hardcover, \pounds 25.00.
ISBN 978-1-4711-8679-0 . . . . . . . . . 574--578
Santosh Kumar R. and
Prakash Klnc and
Krishna Srm An improved cryptanalysis of multi-prime
RSA with specific forms of decryption
exponent . . . . . . . . . . . . . . . . 1--14
Viktor Wase Dorabella unMASCed --- the Dorabella
Cipher is not an English or Latin
Mono-Alphabetical Substitution Cipher 15--24
Chris Christensen and
Sandy Zabell and
Conner Ernst and
Hanna Schmitt and
Matthew Henn T. R. Hollcroft's Problem . . . . . . . 25--59
Pavithra Gurushankar and
Kunwar Singh Decentralized universally verifiable
stake voting system with perfect privacy 60--90
Chris Christensen Review of \booktitleArctic Convoys:
Bletchley Park and the War for the Seas
by David Kenyon. New Haven and London:
Yale University Press. 2023. 320 + x
pages, Hardcover, \$30.00. ISBN
978-0-300-26944-4} . . . . . . . . . . . 91--93
Christian Millichap Review of the expanded edition of
\booktitleCodebreaking: A Practical
Guide by Elonka Dunin and Klaus Schmeh.
No Starch Press, 2023. 488 pages,
Hardcover, \$24.04. ISBN
978-1-7185-0272-7} . . . . . . . . . . . 94--96
Brooke Dalton and
Mark Stamp Classifying World War II era ciphers
with machine learning . . . . . . . . . 97--127
Orhun Kara Square impossible differential attack
and security of AES in known plaintext
scenario . . . . . . . . . . . . . . . . 128--152
Gautham Sekar and
Mabin Joseph and
R. Balasubramanian Fault-assisted side-channel analysis of
HMAC--Streebog . . . . . . . . . . . . . 153--169
Vasily Mikhalev and
Nils Kopal and
Bernhard Esslinger Evaluating GPT-4's proficiency in
addressing cryptography examinations . . 170--185
Chris Christensen Review of \booktitleThe Forgotten Giant
of Bletchley Park by Harold Liberty. Pen
& Sword Books, Ltd., Yorkshire, 2022. 215
+ xvi pages, Hardcover, \$39.95. ISBN
978-1-39908-961-6} . . . . . . . . . . . 186--191
R. Erskine Cipher A. Deavours, David Kahn, Louis
Kruh, Greg Mellen, Brian J. Winkel
(eds.), Selections from Cryptologia:
History, People and Technology . . . . . 247
Peggy Aldrich Kidwell Departments --- Reviews --- Electronic
Genie Rescuing Prometheus; Forbes'
Greatest Technology Stories; Information
Ages; The Mathematical Theory of
Communication; LEO: The Incredible Story
of the World's First Business; Computer
Architects of the Information Society;
Cryptologia; The Supply of Information
Technology Workers in the US . . . . . . 81--84
Anonymous Departments: For Your Information: Proof
Playright Wins Pulitzer; Call for
Mathematician Mentors; 45th Reunion
Conference for Ross Program;
Undergraduate Paper Competitions in
Cryptologia; Volunteers Sought for AWM
Essay Contest; Corrections . . . . . . . 607--608
Anonymous Alec Dakin: codebreaker who was among
the first at Bletchley Park to see the
news that Hitler was dead . . . . . . . 1