Historical Cryptology

التفاصيل البيبلوغرافية
العنوان: Historical Cryptology
المؤلفون: Megyesi, Beáta, Professor, 1971, Fornés, Alicia, Kopal, Nils, Láng, Benedek, Waldispühl, Michelle, Mikhalev, Vasily, Esslinger, Bernhard
المصدر: DECRYPT Learning and Experiencing Cryptography with CrypTool and SageMath.
مصطلحات موضوعية: classical ciphers, transcription, decipherment, historical languages, Computational Linguistics, datorlingvistik
الوصف: Historical cryptology studies (original) encrypted manuscripts, often handwritten sources, produced in our history. These historical sources can be found in archives, often hidden without any indexing and therefore hard to locate. Once found they need to be digitized and turned into a machine-readable text format before they can be deciphered with computational methods. The focus of historical cryptology is not primarily the development of sophisticated algorithms for decipherment, but rather the entire process of analysis of the encrypted source from collection and digitization to transcription and decryption. The process also includes the interpretation and contextualization of the message set in its historical context. There are many challenges on the way, such as mistakes made by the scribe, errors made by the transcriber, damaged pages, handwriting styles that are difficult to interpret, historical languages from various time periods, and hidden underlying language of the message. Ciphertexts vary greatly in terms of their code system and symbol sets used with more or less distinguishable symbols. Ciphertexts can be embedded in clearly written text, or shorter or longer sequences of cleartext can be embedded in the ciphertext. The ciphers used mostly in historical times are substitutions (simple, homophonic, or polyphonic), with or without nomenclatures, encoded as digits or symbol sequences, with or without spaces. So the circumstances are different from those in modern cryptography which focuses on methods (algorithms) and their strengths and assumes that the algorithm is applied correctly. For both historical and modern cryptology, attack vectors outside the algorithm are applied like implementation flaws and side-channel attacks. In this chapter, we give an introduction to the field of historical cryptology and present an overview of how researchers today process historical encrypted sources.
وصف الملف: electronic
URL الوصول: https://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-226676
https://su.diva-portal.org/smash/get/diva2:1837937/FULLTEXT01.pdf
قاعدة البيانات: SwePub