Skip to main content
This article presents three newly rediscovered encrypted Habsburg letters that were sent by Maximilian II to his Polish delegates in 1575. We describe the process of deciphering and the principles and peculiarities of the cipher from a... more
    • by  and +1
    •   5  
      Habsburg StudiesHistory of the Polish-Lithuanian CommonwealthEarly New High GermanHistorical Cryptography
In this paper, we present an empirical study on plaintext entities in historical cipher keys from the 15th to the 18th century to shed light on what linguistic entities have been chosen for encryption. We focus mainly on the nomenclature... more
    • by 
    • by 
    •   3  
      CryptanalysisMciphertext-only attack
The Enigma machines were a series of electromechanical rotor cipher machines developed in Germany and used in the first half of the twentieth century to protect commercial, diplomatic, and military communications. Until 1938, the German... more
    • by 
    • Computer Science
Many historians and linguists are working individually and in an uncoordinated fashion on the identification and decryption of historical ciphers. This is a time-consuming process as they often work without access to automatic methods and... more
    • by 
    •   4  
      Computer ScienceImage ProcessingAutomatic TranscriptionHistorical Cryptography
The Hagelin M-209 was a mechanical encryption device used by the U.S. Army during World War 2 (WWII) and the Korean War, as well as by other armies and diplomatic services. The Hagelin M-209 has been the focus of extensive research by... more
    • by 
    • Computer Science
In Meister's 1906 landmark study, "Die Geheimschrift im Dienste der p€ apstlichen Kurie von ihren Anf€ angen bis zum Ende des XVI Jahrhunderts", the 16th Century papal cryptographic service is described as a vibrant, highly professional... more
    • by 
    • Art
In volunteer computing, participants donate computational resources in exchange for credit points. Cheat detection is necessary to prevent dishonest participants from receiving credit points, without actually providing these resources. We... more
    • by 
    • Computer Science
Cryptanalysis of enciphered documents typically starts with identifying the cipher type. A large number of encrypted historical documents exists, whose decryption can potentially increase the knowledge of historical events. This paper... more
    • by 
    • Computer Science
This paper presents the work on two encrypted diplomatic letters sent by the Lithuanian nobleman Jan Chodkiewicz to emperor Maximilian II in 1574 and 1575. It describes the decipherment process as well as the content and the context of... more
    • by 
    •   2  
      ArtEmperor
After publishing data on the Internet, the data publisher loses control over it. However, there are several situations where it is desirable to remove published information. To support this, the European Union proposed the General Data... more
    • by 
    •   3  
      BusinessComputer ScienceRevocation
Messaging applications are among the most popular internet applications and people use them worldwide on a daily basis. Their supporting infrastructure, though consisting of a multitude of servers, is typically under central control. This... more
    • by 
    • Computer Science
In this paper, we discuss new additions (components) for cryptography and cryptanalysis added to the CrypTool 2 (CT2) software over the course of the last two years. We mainly focus on components for classical and historical ciphers, but... more
    • by 
There are many (historical) unsolved ciphertexts from which we don’t know the type of cipher which was used to encrypt these. A first step each cryptanalyst does is to try to identify their cipher types using different (statistical)... more
    • by 
    • Computer Science
This German paper was written entirely at the University of Duisburg-Essen in 2011 for a 3D modeling masters course in applied computer science. We publish this paper, thus, interested people can acquire a first impression of the topic... more
    • by 
    •   2  
      Computer SciencearXiv
In this German seminar paper, which was written in the year 2011 at the University of Duisburg for a Bachelor Colloquium in Applied computer science, we show a brief overview of the Rational Unified Process (RUP). Thus, interested... more
    • by 
    •   2  
      Computer SciencearXiv
The difficulty of solving classical ciphers varies between very easy and very hard. For example, monoalphabetic substitution ciphers can be solved easily by hand. More complex ciphers like the polyalphabetic Vigenère cipher, are harder to... more
    • by 
    • Computer Science
This paper describes the current progress of our research in the area of breaking homophonic substitution ciphers. Furthermore, it presents the state-of-the-art of cryptanalyzing this kind of cipher. There is a huge gap between the... more
    • by 
    •   2  
      Computer ScienceMaterials Science
The deciphered Ramanacoil ciphertext reveals two Dutch East India Company letters, from 1674 that are, in retrospect, already known in the National Archives as plaintext letters. The letters are written in Dutch. We have been able to... more
    • by 
    •   7  
      HistoryWar StudiesSri LankaCryptography
In this paper, we present an empirical study on plaintext entities in historical cipher keys from the 15th to the 18th century to shed light on what linguistic entities have been chosen for encryption. We focus mainly on the nomenclature... more
    • by  and +3
    • History of Cryptology