You are looking at a specific version 20201129:191711 of this paper.
See the latest version.
Paper 2020/1492
Automated ciphertext-only attack on the Wheatstone Cryptograph and related devices
Thomas Kaeding
Abstract
We examine some historical proto-mechanical cryptographic devices, such as the Wheatstone Cryptograph, that employ revolving clock hands or rotating concentric disks. The action of these “cipher clocks” can be factored into a stream cipher followed by a monoalphabetic substitution. This allows us to perform a stochastic hill-climbing attack to break the substitution. The attack maximizes a fitness that measures how well a decryption of the substitution cipher resembles an encryption of the stream cipher alone.
Metadata
- Available format(s)
- Publication info
- Preprint. MINOR revision.
- Keywords
- Wheatstone CryptographWadsworth cipher diskUrkryptografencipher clockhill-climbing attack
- Contact author(s)
- hippykitty @ protonmail com
- History
- 2022-11-30: revised
- 2020-11-29: received
- See all versions
- Short URL
- https://ia.cr/2020/1492
- License
-
CC BY