You are looking at a specific version 20201129:191711 of this paper. See the latest version.

Paper 2020/1492

Automated ciphertext-only attack on the Wheatstone Cryptograph and related devices

Thomas Kaeding

Abstract

We examine some historical proto-mechanical cryptographic devices, such as the Wheatstone Cryptograph, that employ revolving clock hands or rotating concentric disks. The action of these “cipher clocks” can be factored into a stream cipher followed by a monoalphabetic substitution. This allows us to perform a stochastic hill-climbing attack to break the substitution. The attack maximizes a fitness that measures how well a decryption of the substitution cipher resembles an encryption of the stream cipher alone.

Metadata
Available format(s)
PDF
Publication info
Preprint. MINOR revision.
Keywords
Wheatstone CryptographWadsworth cipher diskUrkryptografencipher clockhill-climbing attack
Contact author(s)
hippykitty @ protonmail com
History
2022-11-30: revised
2020-11-29: received
See all versions
Short URL
https://ia.cr/2020/1492
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.