Last update:
Mon Jan 20 16:47:16 MST 2025
Brian J. Winkel Why Cryptologia? . . . . . . . . . . . . 1--3 Greg E. Mellen and Lloyd Greenwood The Cryptology of Multiplex System: Part I: Simulation and Cryptanalysis . . . . 4--16 Barbara Harris A Different Kind of Column . . . . . . . 17--19 James A. Reeds ``Cracking'' a Random Number Generator 20--26 David Kahn The Biggest Bibliography . . . . . . . . 27--42 David Shulman A Reply to Kahn's Review . . . . . . . . 43--45 Cipher A. Deavours Unicity Points in Cryptanalysis . . . . 46--68 Louis Kruh Cipher Equipment: Cipher Disks . . . . . 69--75 Jack Levine and Joel V. Brawley Some Cryptographic Applications of Permutation Polynomials . . . . . . . . 76--92 Brian J. Winkel Poe Challenge Cipher Finally Broken . . 93--96 Anonymous Biographies of Contributory . . . . . . 97--99
Blanchard Hiatt Age of Decipherment . . . . . . . . . . 101--105 Blanchard Hiatt ``Count Forward Three Score and Ten \ldots'' . . . . . . . . . . . . . . . . 106--115 Bruce R. Schatz Automated Analysis of Cryptogram Cipher Equipment . . . . . . . . . . . . . . . 116--142 Louis Kruh Cipher Equipment: Converter M-325(T) . . 143--149 Greg E. Mellen and Lloyd Greenwood The Cryptology of Multiplex System: Part II . . . . . . . . . . . . . . . . . . . 150--165 David Kahn ``Get Out Your Secret Decoders, Boys and Girls \ldots'' . . . . . . . . . . . . . 166--166 Cipher A. Deavours Analysis of the Hebern Cryptograph Using Isomorphs . . . . . . . . . . . . . . . 167--185 James A. Reeds Rotor Algebra . . . . . . . . . . . . . 186--194 Walter Penney Grille Reconstruction . . . . . . . . . 195--201 Anonymous Biographies of Contributors . . . . . . 202--204
David Kahn The Significance of Codebreaking and Intelligence in Allied Strategy and Tactics . . . . . . . . . . . . . . . . 209--222 Cipher A. Deavours The Kappa Test . . . . . . . . . . . . . 223--231 Brian J. Winkel Word Ways, a Journal Worth Going Your Way . . . . . . . . . . . . . . . . . . 232--234 James A. Reeds Entropy Calculations and Particular Methods of Cryptanalysis . . . . . . . . 235--254 Louis Kruh Cipher Equipment: Hagelin Pocket Cryptographer, Type CD-57 . . . . . . . 255--260 Albert C. Leighton The Earliest Use of a Dot Cipher . . . . 261--274 Royal Canadian Mint DPEPE DPJO: a Canadian Coin Piece With a Message . . . . . . . . . . . . . . . . 275--277 Cipher A. Deavours Kullback's ``Statistical Methods in Cryptanalysis'', a Book Review . . . . . 278--280 Robert Morris and Neil J. A. Sloane and Aaron D. Wyner Assessment of the National Bureau of Standards Proposed Federal Data Encryption Standard . . . . . . . . . . 281--291 National Bureau of Standards Proposed Federal Information Processing Data Encryption Standard . . . . . . . . 292--306 Anonymous Biographies of Contributors . . . . . . 307--308 Brian J. Winkel Epilogue . . . . . . . . . . . . . . . . 309--309
Cipher A. Deavours The Ithaca Connection: Computer Cryptography in the Making --- a Special Report . . . . . . . . . . . . . . . . . 312--317 Brian J. Winkel Poe Challenge Cipher Solutions . . . . . 318--325 A. Ross Eckler A Rapid Yes--No Computer-Aided Communicator . . . . . . . . . . . . . . 326--333 Louis Kruh Cipher Equipment: MA4210 Alphanumeric Pocket Cipher . . . . . . . . . . . . . 334--336 David Kahn Ecclesiastical Cryptography --- a Review 337--337 Joel V. Brawley and Jack Levine Equivalence of Vigen\`ere Systems . . . 338--361 D. C. B. Marsh Courses in Cryptology --- Cryptography at the Colorado School of Mines . . . . 362--363 David W. Straight Courses in Cryptology --- Cryptanalysis and Data Security Course at the University of Tennessee . . . . . . . . 363--365 Herbert S. Bright Cryptanalytic Attack and Defense: Cipher-Text Only, Known-Plaintext, Chosen-Plaintext . . . . . . . . . . . . 366--370 David Kahn Reports From the Reich . . . . . . . . . 371--371 Louis Kruh The Churchyard Ciphers . . . . . . . . . 372--375 Harold Joseph Highland CENSORED: a Simulation Exercise . . . . 376--377 David Kahn German Military Eavesdroppers . . . . . 378--380 Cipher A. Deavours and James A. Reeds The Enigma: Part I: Historical Perspectives . . . . . . . . . . . . . . 381--391 Brian J. Winkel Solution . . . . . . . . . . . . . . . . 391--391 Peter P. Fagone A Message in Cipher Written by General Cornwallis During the Revolutionary War 392--395 Brian J. Winkel There and There --- a Department . . . . 396--405 Unknown They Should Be Paranoid . . . . . . . . 400--401 Gustavus J. Simmons and Michael J. Norris Preliminary Comments on the M.I.T. Public-Key Cryptosystem . . . . . . . . 406--414 Anonymous Biographies of Contributors . . . . . . 415--417 Unknown Letter from the Editor . . . . . . . . . ??
Wayne G. Barker Solving a Hagelin, Type CD-57, Cipher 1--8 David Wilson Courses in Cryptology --- Cryptanalysis Course Down Under . . . . . . . . . . . 9--11 David Kahn The Forschungsamt: Nazi Germany's Most Secret Communications Intelligence Agency . . . . . . . . . . . . . . . . . 12--19 Hans Rohrbach Mathematical and Mechanical Methods in Cryptography. I . . . . . . . . . . . . 20--37 Louis Kruh The Inventions of William F. Friedman 38--61 Ronald L. Rivest Remarks on a Proposed Cryptanalytic Attack on the M.I.T. Public-Key Cryptosystem . . . . . . . . . . . . . . 62--65 Cipher A. Deavours A Book Review: \booktitleCryptanalysis of the Hagelin Cryptograph, by Wayne G. Barker . . . . . . . . . . . . . . . . . 66--67 H. Gary Knight Cryptanalyst's Corner . . . . . . . . . 68--74 Ralph E. Weber James Lovell and Secret Ciphers During the American Revolution . . . . . . . . 75--88 Brian J. Winkel There and There --- a Department . . . . 89--94 Anonymous Biographies of Contributors . . . . . . 95--96
Hans Rohrbach Mathematical and Mechanical Methods in Cryptography. II . . . . . . . . . . . . 101--121 David Kahn Friedman's Life: a Book Review . . . . . 122--123 H. Gary Knight Cryptanalyst's Corner . . . . . . . . . 124--129 Louis Kruh Who Wrote ``The American Black Chamber''? . . . . . . . . . . . . . . . 130--133 Cipher A. Deavours Courses in Cryptology --- Cryptology at Kean College . . . . . . . . . . . . . . 134--138 David Kahn Nuggets from the Archives: Yardley Tries Again . . . . . . . . . . . . . . . . . 139--143 Wayne G. Barker The Unsolved D'Agapeyeff Cipher . . . . 144--147 David Straight ``Modern Methods for Computer Security and Privacy'': a Book Review . . . . . . 148--150 David Straight ``An Outline of Computer Security'': a Book Review . . . . . . . . . . . . . . 148--150 David Kahn ``Pictures Galore'': a Book Review . . . 151--151 Frank Rubin Computer Methods for Decrypting Multiplex Ciphers . . . . . . . . . . . 152--160 Brian J. Winkel Casanova and the Beaufort Cipher . . . . 161--163 Louis Kruh Cryptology as a Career . . . . . . . . . 164--167 Anonymous Encryption Challenge . . . . . . . . . . 168--171 Names Withheld Encryption Challenge . . . . . . . . . . 168--171 Louis Kruh Cipher Equipment: DH-26 Handheld Encryption Unit . . . . . . . . . . . . 172--177 Brian J. Winkel A Tribute to Alf Monge . . . . . . . . . 178--185 Brian J. Winkel There and There --- a Department . . . . 186--194 Anonymous Biographies of Contributors . . . . . . 195--197 Unknown ``Codes and Ciphers'' --- a Book Review ?? Unknown ``The Man Who Broke Purple'' --- a Book Review . . . . . . . . . . . . . . . . . ??
J. Rives Childs My Recollections of G.2 A.6 . . . . . . 201--214 Frank Rubin Computer Methods for Decrypting Random Stream Ciphers . . . . . . . . . . . . . 215--231 Philip M. Arnold A Forgotten Book on Ciphers . . . . . . 232--235 Caxton C. Foster Courses in Cryptology --- Cryptanalysis and Computers . . . . . . . . . . . . . 236--237 H. Gary Knight Cryptanalysts' Corner . . . . . . . . . 238--241 Louis Kruh A Catalog of Historical Interest . . . . 242--253 Brian J. Winkel Astle Cipher Solved . . . . . . . . . . 254--256 David Kahn A Famous Variation --- a Book Review . . 257--257 David Kahn Reveling in Deception --- a Book Review 258--259 Richard Heitzenrater Decoding Wesley's Diaries . . . . . . . 260--264 David Kahn Short Notices --- Reviews . . . . . . . 265--266 Robert Morris The Hagelin Cipher Machine (M-209): Reconstruction of the Internal Settings 267--289 Louis Kruh Capsule Reviews for Crypto Buffs . . . . 290--292 Brian J. Winkel There and There --- a Department . . . . 293--298 Anonymous Biographies of Contributors . . . . . . 299--300
Bob Blakley and G. R. Blakley Security of number-theoretic public key cryptosystems against random attack. I 305--321 Louis Kruh What the Nazis Were Doing . . . . . . . 322--323 Howard T. Oakley The Riverbank Publications on Cryptology 324--330 David Kahn Extraordinary Codebreakers, Outstanding Family: a Review . . . . . . . . . . . . 331--333 Louis Kruh A Nineteenth Century Challenge Cipher 334--334 H. Gary Knight Cryptanalysts' Corner . . . . . . . . . 335--337 Louis Kruh A Catalog of Historical Interest --- Part II . . . . . . . . . . . . . . . . 338--349 Nicholas P. Callas An Application of Computers to Cryptology . . . . . . . . . . . . . . . 350--364 David Kahn One of the Worst --- a Book Review . . . 365--365 Louis Kruh Rent a Code . . . . . . . . . . . . . . 366--367 Brian J. Winkel ``Action Line'' Challenge . . . . . . . 368--370 Paul Kinnucan Data Encryption Gurus: Tuchman and Meyer 371--381 Brian J. Winkel There and There --- a Department . . . . 382--393 Anonymous Biographies of Contributors . . . . . . 394--395
David Kahn The Ultra Conference . . . . . . . . . . 1--8 Carl Hammer How Did TJB Encode B2? . . . . . . . . . 9--15 Hans Rohrbach Report on the Decipherment of the American Strip Cipher O-2 by the German Foreign Office . . . . . . . . . . . . . 16--26 Boshra H. Makar Cryptology at St. Peter's College . . . 27--28 Bob Blakley and G. R. Blakley Security of number theoretic public key cryptosystems against random attack. II 29--42 James R. Ford The HP-67/97 Cryptograph . . . . . . . . 43--50 Louis Kruh A Xerograph of a Classic . . . . . . . . 50--50 A. O. Sulzberger, Jr. Papers Disclose Allies' Edge in Knowing German Codes . . . . . . . . . . . . . . 51--53 Brian J. Winkel Studies on Cryptology . . . . . . . . . 52--53 David Shulman A Sherlockian Cryptogram . . . . . . . . 54--56 Brian J. Winkel There and There . . . . . . . . . . . . 57--62 Anonymous Biographies of Contributors . . . . . . 63--64
I. J. Good Early work on computers at Bletchley Park . . . . . . . . . . . . . . . . . . 65--77 Louis Kruh Devices and Machines: The Hagelin Cryptographer, Type C-52 . . . . . . . . 78--82 James A. Reeds Solution of Challenge Cipher . . . . . . 83--95 David Kahn ``American Codes'': a Book Review . . . 96--99 David Shulman The Macbeth Test Message . . . . . . . . 100--104 Bob Blakley and G. R. Blakley Security of number theoretic public key cryptosystems against random attack. III 105--118 David Kahn A German Consular Cipher . . . . . . . . 119--119 David Wilson Littlewood's Cipher: Part I: a Challenge 120--121 Bradford Hardie Book Review: Ultra Goes to War . . . . . 122--126 Anonymous Biographies of Contributors . . . . . . 127--128
Bobby R. Inman The NSA Perspective on Telecommunications Protection in the Nongovernmental Sector . . . . . . . . . 129--135 Greg Mellen J. F. Byrne and the Chaocipher: Work in Progress . . . . . . . . . . . . . . . . 136--154 Frank Rubin Solving a Cipher Based on Multiple Random Number Streams . . . . . . . . . 155--157 David Kahn The Futility of It All . . . . . . . . . 158--165 Louis Kruh The Deadly Double Advertisements: Pearl Harbor Warning or Coincidence . . . . . 166--171 David Wilson Littlewood's Cipher: Part II: a Method of Solution . . . . . . . . . . . . . . 172--176 Jack Levine and Michael Willet The Two-Message Problem in Cipher Text Autokey. Part I . . . . . . . . . . . . 177--186 Gideon Yuval How to Swindle Rabin . . . . . . . . . . 187--189 David Kahn Classic Revive ??: a Review . . . . . . 190--191 Anonymous The Second Beale Cipher Symposium --- Call for Papers . . . . . . . . . . . . 191--191 Anonymous Biographies of Contributors . . . . . . 192--192 David Kahn The Significance of Codebreaking and Intelligence in Allied Strategy and Tactics . . . . . . . . . . . . . . . . 209--222 C. A. Deavours The Kappa Test . . . . . . . . . . . . . 223--231 Brian J. Winkel Word Ways, a Journal Worth Going Your Way . . . . . . . . . . . . . . . . . . 232--234 James Reeds Entropy Calculations and Particular Methods of Cryptanalysis . . . . . . . . 235--254 Louis Kruh Cipher Equipment . . . . . . . . . . . . 255--260 Albert C. Leighton ``The Earliest Use of a Dot Cipher'' . . 261--274 Royal Canadian Mint DPEPE DPJO: a Canadian Coin Piece With a Message . . . . . . . . . . . . . . . . 275--277 C. A. Deavours Kullback's ``Statistical Methods in Cryptanalysis'' --- Book Review . . . . 278--280 Robert Morris and N. J. A. Sloane and A. D. Wyner Assessment of the National Bureau of Standards Proposed Federal Data Encryption Standard . . . . . . . . . . 281--291 Anonymous Proposed Federal Information Processing Data Encryption Standard . . . . . . . . 292--306 Anonymous Biographies of Contributors . . . . . . 307--308
Eric Sams Musical Cryptography . . . . . . . . . . 193--201 Frank Rubin Cryptographic Aspects of Data Compression Codes . . . . . . . . . . . 202--205 Louis Kruh CP-III: One Time Cypher Pad Manual Encryption Device . . . . . . . . . . . 206--209 David Kahn The Geheimschreiber . . . . . . . . . . 210--214 Unknown Interrogation on German secret teletypewriters . . . . . . . . . . . . 211--214 Philip M. Arnold Ciphers for the Educated Man . . . . . . 215--216 Louis Kruh Short Notices . . . . . . . . . . . . . 217--219 Jack Levine and Michael Willet The Two-Message Problem in Cipher Text Autokey. Part II . . . . . . . . . . . . 220--231 Anonymous A Musical Cipher . . . . . . . . . . . . 232--232 Elliot Fischer Language Redundancy and Cryptanalysis 233--235 Louis Kruh The Day the Friedmans Had a Typo in Their Photo . . . . . . . . . . . . . . 236--241 H. Gary Knight Cryptanalysts' Corner . . . . . . . . . 242--242 Philip M. Arnold A German Code Book . . . . . . . . . . . 243--245 Bradford Hardie A Theory of Cryptography . . . . . . . . 246--247 Brian J. Winkel There and There . . . . . . . . . . . . 248--251 Anonymous Biographies of Contributors . . . . . . 252--253
S. C. Lu and L. N. Lee A Simple and Effective Public-Key Cryptosystem . . . . . . . . . . . . . . ?? Arthur Schuetz Secret Service Unmasked . . . . . . . . ??
Peter P. Fagone The Solution of a Cromwellian Era Spy Message (Circa 1648) . . . . . . . . . . 1--4 Louis Kruh Cipher Devices: The Cryptomatic HC-520 5--14 Solomon W. Golomb Cryptographic Reflections on the Genetic Code . . . . . . . . . . . . . . . . . . 15--19 Michael Richter A Note on Public-Key Cryptosystems . . . 20--22 David Kahn ``Deciphered Texts'': a Book Review . . 22--22 Louis Kruh Memories of Friedman . . . . . . . . . . 23--26 H. Gary Knight Cryptanalysts' Corner . . . . . . . . . 27--29 Ronald L. Rivest ``Forwards and Backwards'' Encryption 30--33 Louis Kruh Ciphering System for a 19th Century Challenge Cipher . . . . . . . . . . . . 34--35 David Kahn Problems of the Unbreakable Cipher . . . 36--40 David Shulman Another Solution to the Sherlockian Cryptogram . . . . . . . . . . . . . . . 41--41 David Kahn The Market for Encryption . . . . . . . 42--44 James R. Ford The HP-67/97 Cryptograph . . . . . . . . 43--49 Louis Kruh Reminiscences of a Master Cryptologist 45--50 A. Ross Eckler Some Comments on the Use of the HP 67/97 as a Cryptograph . . . . . . . . . . . . 51--53 Brian J. Winkel There and There . . . . . . . . . . . . 54--61 Anonymous Biographies of Contributors . . . . . . 62--63
David Kahn Interviews With Cryptologists . . . . . 65--70 Jack Levine and Robert E. Hartwig Applications of the Drazin inverse to the Hill cryptographic system. Part I 71--85 David Shulman A Curious Cryptic Composition . . . . . 86--88 Richard Outerbridge Some Cryptographic and Computing Applications of the Toshiba LC-836MN Memo Note 30 Pocket Calculator . . . . . 89--94 Anonymous Ready-Made Love Letters . . . . . . . . 95--95 Philip M. Arnold An apology for Jacopo Silvestri . . . . 96--103 Francis A. Raven ``Memories of the Pacific'': Book Reviews . . . . . . . . . . . . . . . . 104--108 Rajendra S. Wall Decryption of Simple Substitution Cyphers With Word Divisions Using a Content Addressable Memory . . . . . . . 109--115 James J. Gillogly The Beale Cypher: a Dissenting Opinion 116--119 David Kahn Nuggets from the Archives: a Null Code at the White House . . . . . . . . . . . 120--121 Anonymous Solutions . . . . . . . . . . . . . . . 122--122 Brian J. Winkel Solution to Cryptanalysts' Corner Scotch Homophonic . . . . . . . . . . . . . . . 122--122 Brian J. Winkel There and There . . . . . . . . . . . . 123--126 Anonymous Biographies of Contributors . . . . . . 127--128 Louis Kruh Cipher Devices: TRS-80 Data Privacy System . . . . . . . . . . . . . . . . . 181--183
Cipher A. Deavours The Black Chamber: a column. How the British broke Enigma . . . . . . . . . . 129--132 Herbert S. Bright High-Speed Indirect Cryption . . . . . . 133--139 Donald S. Pady and Laura S. Kline Finger counting and the identification of James VI's secret agents . . . . . . 140--149 Jack Levine and Robert E. Hartwig Applications of the Drazin Inverse to the Hill Cryptographic System. Part II 150--168 Wayne G. Barker Opportunities for the Amateur Cryptanalyst Can Be Anywhere . . . . . . 169--172 Louis Kruh ``The Work of a Diplomat'': a Book Review . . . . . . . . . . . . . . . . . 172--172 David Kahn Spy Ciphers: a Book Review . . . . . . . 173--176 H. Gary Knight Cryptanalysts' Corner . . . . . . . . . 177--180 Louis Kruh Cipher Devices: a Column Cryptext TRS-80 Data Privacy System . . . . . . . . . . 181--183 R. H. Cooper Linear transformations in Galois fields and their application to cryptography 184--188 Anonymous Biographies of Contributors . . . . . . 189--190
Sir Alfred Ewing Some Special War Work: Part I . . . . . 193--203 M. J. Kochanski Remarks on Lu and Lee's proposals for a public-key cryptosystem . . . . . . . . 204--207 H. Gary Knight Cryptanalysts' Corner . . . . . . . . . 208--212 Jim Nelson The Development of Commercial Cryptosystem Standards . . . . . . . . . 213--224 Louis Kruh Cipher Equipment: TST-1221 . . . . . . . 225--229 Boshra H. Makar Transfinite Cryptography . . . . . . . . 230--237 Louis Kruh ``Pearl Harbor Revisited'': a Book Review . . . . . . . . . . . . . . . . . 237--237 David Kahn A Professional's Challenge . . . . . . . 238--239 Cipher A. Deavours The Black Chamber: a column --- la méthode des bâtons . . . . . . . . . . . . 240--247 Louis Kruh A Remarkable View of Ancient America: a Book Review . . . . . . . . . . . . . . 248--249 Anonymous Results of Reader Survey . . . . . . . . 250--251 Anonymous Biographies of Contributors . . . . . . 252--253
Greg Mellen Graphic Solution of a Linear Transformation Cipher . . . . . . . . . 1--19 David Kahn The Public's Secrets . . . . . . . . . . 20--26 Ronald L. Rivest Statistical Analysis of the Hagelin Cryptograph . . . . . . . . . . . . . . 27--32 Sir Alfred Ewing Some Special War Work, Part II . . . . . 33--39 Greg Mellen Cryptanalysts' Corner . . . . . . . . . 40--42 Cipher A. Deavours The Black Chamber: a Column Shutting Off the Spigot in 1981 . . . . . . . . . . . 43--45 Louis Kruh Cipher Equipment: Collins CR-200/220 Data Security Unit . . . . . . . . . . . 46--50 Frank Rubin Decrypting a Stream Cipher Based on J--K Flip-Flops . . . . . . . . . . . . . . . 51--57 Louis Kruh ``From the Ultra Conference'': a Book Review . . . . . . . . . . . . . . . . . 58--58 Elliot Fischer A Theoretical Measure of Cryptographic Performance . . . . . . . . . . . . . . 59--62 Anonymous Biographies of Contributors . . . . . . 63--63
David Kahn German Spy Cryptograms . . . . . . . . . 65--66 Robert E. Hartwig and Jack Levine Applications of the Drazin inverse to the Hill cryptographic system. Part III 67--77 Stephen A. Kallis, Jr. The Code-O-Graph Cipher Disks . . . . . 78--83 Gerald Sturges The House Report on Public Cryptography 84--93 John P. Costas The Hand-Held Calculator As a Cryptographic Machine . . . . . . . . . 94--117 Lee Lembart The Public Cryptography Study Group: U.S. and Mathematicians in Code Dispute 118--122 Greg Mellen Cryptanalysts' Corner . . . . . . . . . 123--123 Louis Kruh ``A Code Problem'': a Book Review . . . 124--125 Anonymous Biographies of Contributors . . . . . . 126--126
Anonymous Report of the Public Cryptography Study Group . . . . . . . . . . . . . . . . . 130--142 George I. Davida The Case Against Restraints on Non-Governmental Research in Cryptography . . . . . . . . . . . . . . 143--148 Philip M. Arnold Palatino and Bibliander on ciphers . . . 149--154 Louis Kruh ``Reward for Reading and Deciphering'': a Book Review . . . . . . . . . . . . . 155--157 Elliot Fischer Measuring Cryptographic Performance With Production Processes . . . . . . . . . . 158--162 R. Creighton Buck Sherlock Holmes in Babylon . . . . . . . 163--173 Louis Kruh Cipher Machine Exhibit at the Smithsonian Institution . . . . . . . . 174--174 Oskar Stuerzinger The A-22 Cryptograph . . . . . . . . . . 175--183 Brian J. Winkel There and There . . . . . . . . . . . . 184--190 Anonymous Biographies of Contributors . . . . . . 191--191
David Kahn The Genesis of the Jefferson/Bazeries Cipher Device . . . . . . . . . . . . . 193--208 Louis Kruh The Genesis of the Jefferson/Bazeries Cipher Device . . . . . . . . . . . . . 193--208 Louis Kruh ``A User's Guide in Voice and Data Communications Protection'': Book Review 208--212 L. Klingler Letter to the Editor . . . . . . . . . . 209--210 J. Costas Letter to the Editor . . . . . . . . . . 210--212 Robert E. Hartwig and Jack Levine Applications of the Drazin Inverse to the Hill Cryptographic System. Part IV 213--228 William Groth Secret Writing Exhibit . . . . . . . . . 229--230 Carl Hammer Higher-Order Homophonic Ciphers . . . . 231--242 Jack Keil Wolf ``Number Theory in Digital Signal Processing'': a Book Review . . . . . . 243--246 C. A. Deavours Interactive Solution of Columnar Transposition Ciphers . . . . . . . . . 247--251 Anonymous Biographies of Contributors . . . . . . 252--253 Unknown Letters to the Editor . . . . . . . . . ??
Marian Rejewski Mathematical Solution of the Enigma Cipher . . . . . . . . . . . . . . . . . 1--18 Christopher Kasparek and Richard A. Woytak In memoriam Marian Rejewski . . . . . . 19--25 David Kahn Why Germany Lost the Code War . . . . . 26--31 Wldyslaw Kozaczuk Enigma Solved . . . . . . . . . . . . . 32--33 C. A. Deavours The Black Chamber . . . . . . . . . . . 34--37 Louis Kruh `Wilderness of Mirrors'': a Book Review 38--38 Louis Kruh ``Beale Society Material'': Book Reviews 39--39 Ralph V. Anderson If I Remember . . . . . . . . . . . . . 40--44 Greg Mellen Cryptanalysts' Corner . . . . . . . . . 45--46 David Kahn Churchill Pleads for the Intercepts . . 47--49 Richard A. Woytak A Conversation With Marian Rejewski . . 50--60 Bradford Hardie ``Unraveling the Enigma Story'': a Book Review . . . . . . . . . . . . . . . . . 61--64 William P. Bundy ``From the Depths to the Heights'': Book Reviews . . . . . . . . . . . . . . . . 65--74 Marian Rejewski Remarks on Appendix 1 to ``British Intelligence in the Second World War'' by F. H. Hinsley . . . . . . . . . . . . 75--83 David Kahn ``Computer Cryptography'': a Book Review 84--84 Louis Kruh The Navy Cipher Box Mark II . . . . . . 85--93 Anonymous Biographies of Contributors . . . . . . 94--95
Mel L. Barclay and Joshua S. Barclay Use of Microcomputer System for Medical Record Encryption and Decryption Using a Sequential Pseudo-Random Key . . . . . . 97--107 Elliot Fischer The Performance of Hellman's Time-Memory Trade-Off Against Some Rotor Ciphers . . 108--114 David Kahn A New Source for Historians: Yardley's Seized Manuscript . . . . . . . . . . . 115--119 David Kahn In Memoriam: Georges-Jean Painvin . . . 120--127 N. J. A. Sloane Error-Correcting Codes and Cryptography. Part I . . . . . . . . . . . . . . . . . 128--153 Louis Kruh Book Reviews: a Book With a Book Cipher 154--168 Greg Mellen Cryptanalysts' Corner . . . . . . . . . 169--174 C. A. Deavours Konheim's ``Cryptography --- A Primer'': a Book Review . . . . . . . . . . . . . 175--176 M. C. W. Kaiserling Sirius . . . . . . . . . . . . . . . . . 177--178 Brian J. Winkel There and There --- a Column . . . . . . 179--188 Anonymous Biographies of Contributors . . . . . . 189--190
Dundas P. Tucker Rhapsody in Purple: a New History of Pearl Harbor --- I . . . . . . . . . . . 193--228 Shimshon Berkovits Factoring via superencryption . . . . . 229--237 Louis Kruh The Mystery of Colonel Decius Wadsworth's Cipher Device . . . . . . . 238--247 Greg Mellen Cryptanalysts' Corner . . . . . . . . . 248--252 Richard Outerbridge Cryptographic Features of the UNIX Operating System . . . . . . . . . . . . 253--257 N. J. A. Sloane Error-Correcting Codes and Cryptography. Part II . . . . . . . . . . . . . . . . 258--278 Donald V. Miller Ciphertext Only Attack on the Merkle--Hellman Public-Key System under Broadcast Situations . . . . . . . . . . 279--281 M. C. W. Kaiserling Solution to Sirius Music Cipher . . . . 282--282 C. A. Deavours Helmich and the KL-7 . . . . . . . . . . 283--284 Anonymous Biographies of Contributors . . . . . . 285--286
Donald W. Davies The Siemens and Halske T52E Cipher Machine . . . . . . . . . . . . . . . . 289--308 Greg Mellen Cryptanalysts' Corner . . . . . . . . . 309--311 Alkiviadis G. Akritas Application of Vincent's Theorem in Cryptography or One-Time Pads Made Practical . . . . . . . . . . . . . . . 312--318 M. O. Vahle and L. F. Tolendino Breaking a Pseudo Random Number Based Cryptographic Algorithm . . . . . . . . 319--328 Henk Meijer and Selim Akl Digital Signature Schemes . . . . . . . 329--338 Richard Outerbridge A Pedagogical Cipher . . . . . . . . . . 339--345 Dundas P. Tucker Rhapsody in Purple: a New History of Pearl Harbor: Part Two of Two . . . . . 346--367 Stephen A. Kallis A Child's Garden of Cryptography . . . . 368--377 Louis Kruh A Basic Probe of the Beale Cipher as a Bamboozlement . . . . . . . . . . . . . 378--382 Anonymous Biographies of Contributors . . . . . . 383--384
David Kahn The Crypto '82 Conference, a Report on [the] Conference . . . . . . . . . . . . 1--5 Greg Mellen Cryptanalysts' Corner . . . . . . . . . 6--11 Denis R. Floyd Annotated bibliography in conventional and public key cryptography . . . . . . 12--24 S. Brent Morris Fraternal Cryptography: Cryptographic Practices of American Fraternal Organizations . . . . . . . . . . . . . 27--36 H. Jurgensen Language Redundancy and the Unicity Point . . . . . . . . . . . . . . . . . 37--48 Viiveke Fak Cryptographic Protection of Files in An Automated Office System . . . . . . . . 49--62 Boshra H. Makar Application of a certain class of infinite matrices to the Hill cryptographic system . . . . . . . . . . 63--78 Thomas H. Dyer ``The Power of Magic'': a Book Review 79--82 Louis Kruh Cipher Equipment: the Cryptographic Unit CSI-10 . . . . . . . . . . . . . . . . . 83--88 Elliot Fischer Uncaging the Hagelin Cryptograph . . . . 89--92 Anonymous Biographies of Contributors . . . . . . 93--94
John B. Lundstrom A Failure of Radio Intelligence: An Episode in the Battle of the Coral Sea 97--118 Brig. Gen. Carter W. Clarke From the Archives: Statement for Record of Participation of Brig. Gen. Carter W. Clarke, GSC in the Transmittal of Letters from Gen. George C. Marshall to Gov. Thomas E. Dewey, the Latter Part of September, 1944 . . . . . . . . . . . . 119--131 John F. Bratzel and Leslie B. Rout Abwehr Ciphers in Latin America . . . . 132--144 Louis Kruh and C. A. Deavours The Typex Cryptograph . . . . . . . . . 145--166 Greg Mellen Cryptanalysis' Corner . . . . . . . . . 167--169 Babacar Alassane Ndam and Amadou Sarr The Problem of Reciprocity in a Delastelle Digraphic Substitution . . . 170--179 Gustavus J. Simmons A ``Weak'' Privacy Protocol Using the RSA Crypto Algorithm . . . . . . . . . . 180--182 Henk Meijer and Selim Akl Remarks on a Digital Signature Scheme 183--186 C. A. Deavours The View From Across the Pond: An Interview With the Geneva Management Group . . . . . . . . . . . . . . . . . 187--190 Anonymous Biographies of Contributors . . . . . . 191--192
Gerhard F. Strasser The Noblest Cryptologist: Duke August the Younger of Brunswick--Luneburg (Gustavus Selenus) and his Cryptological Activities . . . . . . . . . . . . . . . 193--217 Donald H. Bennett An Unsolved Puzzle Solved . . . . . . . 218--234 Donald W. Davies The Early Models of the Siemens and Halske T52 Cipher Machine . . . . . . . 235--253 David Kahn Eurocrypt 83: a Report . . . . . . . . . 254--256 Christian Mueller-Schloer DES-Generated Checksums for Electronic Signatures . . . . . . . . . . . . . . . 257--273 Greg Mellen Cryptanalysts' Corner . . . . . . . . . 274--277 Louis Kruh and Greg Mellen Book, Movie, Article and Game Reviews 278--286 Anonymous Biographies of Contributors . . . . . . 287--288
Louis Kruh How to Use the German Enigma Cipher Machine: a Photographic Essay . . . . . 291--296 Albert C. Leighton and Stephen M. Matyas The Search for the Key Book to Nicholas Trist's Book Ciphers . . . . . . . . . . 297--314 Anonymous From the archives: Examples of Intelligence Obtained from Cryptanalysis, 1 August 1946 . . . . . . 315--326 Peter Winkler The Advent of Cryptology in the Game of Bridge . . . . . . . . . . . . . . . . . 327--332 Oskar Stuerzinger The B-21 Cryptograph . . . . . . . . . . 333--346 Hugo Brändström A public-key cryptosystem based upon equations over a finite field . . . . . 347--358 Daniel Wolf ROTERM: a Microprocessor Based Cipher Terminal System . . . . . . . . . . . . 359--370 Greg Mellen Cryptanalysts' Corner . . . . . . . . . 371--374 Louis Kruh Book Reviews . . . . . . . . . . . . . . 375--379 Anonymous Biographies of Contributors . . . . . . 380--381
J. Levine U.S. Cryptographic Patents 1861--1981 ??
Gustavus J. Simmons A System for Verifying User Identity and Authorization at the Point-Of Sale or Access . . . . . . . . . . . . . . . . . 1--21 Arthur Sorkin LUCIFER, a Cryptographic Algorithm . . . 22--42 Louis Kruh and Greg Mellen Reviews of Things Cryptologic . . . . . 43--53 Louis Kruh Who Did It? . . . . . . . . . . . . . . 54--54 Greg Mellen Cryptanalysts' Corner . . . . . . . . . 55--57 David Kahn Cipher Machine Inventor --- Boris Hagelin Dies . . . . . . . . . . . . . . 60--61 Herbert O. Yardley From the archives: Achievements of Cipher Bureau MI-8 During the First World War. Documents by Major Herbert O. Yardley Prepared Under the Direction of the Chief Signal Officer, 25 May 1945, SPSIS-1. Signal Security Agency. Washington, DC . . . . . . . . . . . . . 62--74 Louis Kruh Because of the Freedom of Information Act (FOIA) . . . . . . . . . . . . . . . 75--77 Louis Kruh Cipher Devices . . . . . . . . . . . . . 78--79 James J. Gillogly The Mysterious Autocryptograph . . . . . 79--81 Donald W. Davies The Autocryptograph . . . . . . . . . . 82--92 Anonymous Biographies of Contributors . . . . . . 93--94
Charles T. Retter Cryptanalysis of a Maclaren--Marsaglia System . . . . . . . . . . . . . . . . . 97--108 Anonymous Project on Secrecy and Openness in Scientific and Technical Communication 109--111 Louis Kruh Hand-Held Crypto Device SEC-36 . . . . . 112--114 Donald W. Davies Sidney Hole's Cryptographic Machine . . 115--126 Louis Kruh Literature Reviews . . . . . . . . . . . 127--131 Borge Tilt On Kullback's $ \chi $-tests for matching and non-matching multinomial distributions . . . . . . . . . . . . . 132--141 John M. Carroll and Pierre G. Laurin Software Protection for Microcomputers 142--160 Jack Levine Corrections for Published Copy of United States Cryptographic Patents: 1861--1981 161--162 Louis Kruh The Slidex RT Code . . . . . . . . . . . 163--172 Ralph Erskine ``British Intelligence --- Volume II'' --- Book Review . . . . . . . . . . . . 173--180 Anonymous From the Archives: Codes and Ciphers for Combined Air-Amphibian Operations . . . 181--186 David Shulman An Unknown Cipher Disk . . . . . . . . . 187--190 Anonymous Biographical Sketches . . . . . . . . . 191--192
Thomas R. Hammant The Origins of Russian Navy Communications Intelligence . . . . . . 193--202 Francis Guelker A Cryptographer's War Memories . . . . . 203--207 Robert Weller Rear Admiral Joseph N. Wenger USN (Ret) and the Naval Cryptologic Museum . . . . 208--234 Philip M. Arnold ``A View of Renaissance Cryptography'' --- a Book Review . . . . . . . . . . . 235--241 C. A. Deavours Reflections on the ``State of the Art'' 242--245 Louis Kruh Cryptology and the Law . . . . . . . . . 246--248 Louis Kruh Cipher Equipment . . . . . . . . . . . . 249--249 Donald W. Davies Sir Percy Scott's Cypher . . . . . . . . 250--252 John M. Delaurentis A further weakness in the Common Modulus Protocol for the RSA cryptoalgorithm . . 253--259 John M. Carroll The Resurrection of Multiple-Key Ciphers 262--265 G. R. Blakley AAAS Crypto Sessions Proceedings: Review 266--269 Greg Mellen Cryptanalysts' Corner . . . . . . . . . 270--275 Louis Kruh Cipher Equipment: Tst 3336 and Tst 9761 278--284 Robert R. Jueneman IACR Announces Bulletin Board Service 285--286 Anonymous Biographies of Contributors . . . . . . 287--288
Louis Kruh The Heraldry of Cryptology . . . . . . . 289--301 O. G. Landsverk Cryptography in Runic Inscriptions . . . 302--319 Greg Mellen Cryptanalysts' Corner . . . . . . . . . 320--325 Louis Kruh Cryptology and the Law . . . . . . . . . 326--331 Ralph Erskine \booktitleAlan Turing: The Enigma --- Book Review . . . . . . . . . . . . . . 332--336 Solomon Kullback Looking Back . . . . . . . . . . . . . . 337--342 Rodney Cooper and Wayne Patterson A generalization of the knapsack algorithm using Galois fields . . . . . 343--347 Roland Anderson Finding Vowels in Simple Substitution Ciphers by Computer . . . . . . . . . . 348--359 C. A. Deavours and Brian J. Winkel ``Cryptanalysis of Shift Stream Generated Stream Cipher Systems'': Book Review . . . . . . . . . . . . . . . . . 360--363 Louis Kruh There and There --- Reviews and News . . 364--373 Anonymous Biographies of Contributors . . . . . . 379--380 Unknown Alan Turing: The Enigma . . . . . . . . ??
David Kahn The Annotated The American Black Chamber 1--37 Louis Kruh An Armchair View of the Smithsonian Institution Cipher Machine Exhibit . . . 38--51 Ralph Erskine An Early Success Story . . . . . . . . . 52--54 James J. Gillogly Fast Pattern Matching for Word Lists . . 55--62 Ole Immanuel Franksen Expert Witness . . . . . . . . . . . . . 63--69 Greg Mellen Cryptanalysts' Corner . . . . . . . . . 70--74 Robert Scott Wide-Open Encryption Design Offers Flexible Implementations . . . . . . . . 75--91 Master Sgt. Charles Murray The Crypt Bug . . . . . . . . . . . . . 92--92 Anonymous Biographies of Contributors . . . . . . 95--96
John R. Michener The ``Generalized Rotor'' Cryptographic Operator and Some of Its Applications 97--113 Charles T. Retter A Key-Search Attack on Maclaren--Marsaglia Systems . . . . . . 114--130 Douglas W. Mitchell A Polygraphic Substitution Cipher Based on Multiple Interlocking Applications of Playfair . . . . . . . . . . . . . . . . 131--139 V. Varadharajan and R. Odoni Extension of RSA cryptosystems to matrix rings . . . . . . . . . . . . . . . . . 140--153 Louis Kruh Cipher Equipment . . . . . . . . . . . . 154--154 Donald W. Davies Charles Wheatstone's Cryptograph and Pletts' Cipher Machine . . . . . . . . . 155--160 Greg Mellen Cryptanalysts' Corner . . . . . . . . . 161--166 Robert Price A conversation with Claude Shannon: one man's approach to problem solving . . . 167--175 Louis Kruh Reviews of the Literature . . . . . . . 176--186 Anonymous Biographies of Contributors . . . . . . 188--189
John R. Michener Application of the Generalized Rotor Cryptographic Operator in the Construction of Substitution-Permutation Network Block Codes . . . . . . . . . . 193--201 Joseph R. Kruskal A Trigraph Cipher With a Short Key for Hand Use . . . . . . . . . . . . . . . . 202--222 H. C. Williams Some Public-Key Crypto-Functions as Intractable as Factorization . . . . . . 223--237 Richard Outerbridge DEA and Lucifer Available on Compuserve 238--239 Fred W. Kranz Early History of Riverbank Acoustical Laboratories . . . . . . . . . . . . . . 240--246 Brian J. Winkel There and There --- a Column of News . . 247--251 Louis Kruh The Kryha Liliput Ciphering Machine . . 252--261 Ralph Erskine British Intelligence --- Volume 3, Part 1 --- Book Review . . . . . . . . . . . 262--272 Louis Kruh Cryptology and the Law --- III . . . . . 273--285 Anonymous Biographies of Contributors . . . . . . 287--288
Greg Mellen Cryptanalysts' Corner . . . . . . . . . 289--293 Louis Kruh and Ralph Erskine Review of Things Cryptologic . . . . . . 294--305 Anonymous Forty One and Strong: Arlington Hall Station . . . . . . . . . . . . . . . . 306--310 Louis Kruh Automatic Communications With the SIGABA and the M-294 . . . . . . . . . . . . . 311--315 Ralph Erskine ``Enigma and the Polish Contribution'': Book Review . . . . . . . . . . . . . . 316--323 Louis Kruh Early communications security in the U.S. Navy . . . . . . . . . . . . . . . 324--331 Robert I. Atha Bombe! ``I Could Hardly Believe It!'' 332--336 Henry D. Ephron An American Cryptanalyst in Australia 337--340 Louis Kruh Cryptology and the Law --- IV . . . . . 348--350 David August Information Theoretic Approach to Secure LSFR Ciphers . . . . . . . . . . . . . . 351--359 Masahiro Yagisawa A New Method for Realizing Public-Key Cryptosystem . . . . . . . . . . . . . . 360--371, 380 Russell Atkinson Ciphers in Oriental Languages . . . . . 373--380 Anonymous Biographies of Contributors . . . . . . 381--382
Brian J. Winkel Letter From One of the Editors . . . . . 1--1 Louis Kruh The Control of Public Cryptography and Freedom of Speech --- a Review . . . . . 2--9 Anonymous Biographies of Contributors . . . . . . 9--9 Roland Anderson Improving the Machine Recognition of Vowels in Simple Substitution Ciphers 10--22 Mike Barlow A Machine Solution of the AMSCO Cipher 23--33 Frode Weierud Machine Secrets: a Book Review . . . . . 34--37 David Kahn Secrets of the Codebreakers . . . . . . 38--41 Louis Kruh Announcements and Reviews of Things Cryptologic . . . . . . . . . . . . . . 42--45 C. A. Deavours Elle a de l'intelligence et de la conversation . . . . . . . . . . . . . . 47--49 Ralph Erskine From the Archives: GC and CS Mobilizes 'Men of the Professor Type' . . . . . . 50--59 Louis Kruh 18th Century Shorthand Expert Needed . . 60--62 Louis Kruh Cipher Equipment . . . . . . . . . . . . 63--63 Donald W. Davies Cipher Equipment: Bolton's Cypher Wheel 64--64
Louis Kruh The Truman Memorandum . . . . . . . . . 65--74 Charles-Hubert Desnoyers Cryptanalytic Essay --- Part I: Solution of Problem No. 166 Published in Elementary Cryptanalysis . . . . . . . . 75--95 Yves Roggeman Remarks on the auto-correlation function of binary periodic sequences . . . . . . 96--100 Louis Kruh Cryptology and the Law --- V . . . . . . 101--107 Louis Kruh Reviews of Things Cryptologic . . . . . 110--122 Martin Minow No Title . . . . . . . . . . . . . . . . 123--125 Louis Kruh 18th Century Shorthand Expert Needed (Re-Run) . . . . . . . . . . . . . . . . 126--127 Anonymous Biographies of Contributors . . . . . . 128--128 Unknown Has Dr. Thouless Survived Death? . . . . ??
Louis Kruh Cryptology and the Law --- VI . . . . . 129--133 Gilbert Bloch and Ralph Erskine Enigma: the Dropping of the Double Encipherment . . . . . . . . . . . . . . 134--141 Richard Outerbridge Some Design Criteria for Feistel-Cipher Key Schedules . . . . . . . . . . . . . 142--156 Charles-Hubert Desnoyers Cryptanalytic Essay --- Part II: Solution of Problem No. 166 Published in Elementary Cryptanalysis . . . . . . . . 158--183 Louis Kruh Reviews of Things Cryptologic . . . . . 184--191 Anonymous Biographies of Contributors . . . . . . 192--192
John M. Carroll and Steve Martin The Automated Cryptanalysis of Substitution Ciphers . . . . . . . . . . 193--209 Michael Barlow The Voynich Manuscript --- By Voynich? 210--216 Frank Rubin Foiling the Known-Plaintext Attack . . . 217--223 Anonymous Free IBM-PC Encryption Software . . . . 224--224 Richard Outerbridge Cadbury Code Confidential . . . . . . . 225--226 Ralph Erskine ``A Link With Pearl Harbor?'' Book Review . . . . . . . . . . . . . . . . . 227--229 Wolfgang W. Mache Geheimschreiber . . . . . . . . . . . . 230--242 Cipher A. Deavours and Louis Kruh Appendix: Mechanics of the German Telecipher Machine . . . . . . . . . . . 243--247 Louis Kruh Cryptology and the Law --- VII . . . . . 248--253 Anonymous Biographies of Contributors . . . . . . 254--255
Martin Kochanski A Survey of Data Insecurity Packages . . 1--15 Robert Winternitz and Martin Hellman Chosen-Key Attacks on a Block Cipher . . 16--20 Samuel M. Levitin Equivalence Classes: Toward More Efficient Search . . . . . . . . . . . . 21--28 Joseph S. Schick With the 849th SIS, 1942--45 . . . . . . 29--39 Bradford Hardie The POTUS-Prime Connection: Two Notes (1) Roosevelt, Churchill, and Me . . . . 40--43 Anonymous (2) History of Converter M-134-C Top Secret Chapter XVIII. the Zero Machine 44--46 C. A. Deavours Cryptology Courses at Kean College . . . 47--50 Louis Kruh Reviews and Things Cryptologic . . . . . 51--63
William P. Bundy Some of My Wartime Experiences . . . . . 65--77 Patrick Beesly Who Was the Third Man at Pyry? . . . . . 78--80 David Kahn The Codebreaker Behind the Footlights 81--84 Linda Y. Gouaz Needles and Haystacks: the Search for Ultra in the 1930's (An Excerpt) . . . . 85--92 James J. Gillogly Breaking An Eighteenth Century Shorthand System . . . . . . . . . . . . . . . . . 93--98 Anonymous Cadbury Caper or Cipher? . . . . . . . . 99--101 Frank Rubin Foiling An Exhaustive Key-Search Attack 102--107 John R. Michener The Use of Complete, Nonlinear, Block Codes for Nonlinear, Noninvertible Mixing of Pseudorandom Sequences . . . . 108--111 Robert M. Richardson Digital Encryption Standard Users Group 112--114 Tom Cheatham Message Decryption and Spelling Checkers 115--118 Louis Kruh An Obscure Cryptographic Device . . . . 119--122 Louis Kruh Reviews and Things Cryptologic . . . . . 123--128
Paul Whitaker and Louis Kruh From Bletchley Park to Berchtesgaden . . 129--141 Gilbert Bloch and C. A. Deavours ENIGMA Before ULTRA: Polish Work and the French Contribution . . . . . . . . . . 142--155 Louis Kruh The Shortsighted View of a Foresighted Admiral . . . . . . . . . . . . . . . . 156--159 Anonymous From the Archives: Memorandum on Non-Military Codes and Ciphers . . . . . 160--161 C. A. Deavours Sois Belle et Tais-Toi . . . . . . . . . 162--165 John R. Michener The Application of Key Dependent and Variable Rotor Sets to Generalized Rotor Cryptographic Systems . . . . . . . . . 166--171 Justo Sancho Enumeration of multivariable decipherable Boolean functions . . . . . 172--181 Subhash C. Kak The Study of the Indus Script General Considerations . . . . . . . . . . . . . 182--191
John M. Carroll and Lynda Robbins The Automated Cryptanalysis of Polyalphabetic Ciphers . . . . . . . . . 193--205 John Bennett Analysis of the Encryption Algorithm Used in the WordPerfect Word Processing Program . . . . . . . . . . . . . . . . 206--210 Jack Levine and Richard Chandler Some further cryptographic applications of permutation polynomials . . . . . . . 211--218 William F. Clarke Government Code and Cypher School: Its Foundation and Development With Special Reference to Its Naval Side . . . . . . 219--226 Gilbert Bloch and C. A. Deavours Enigma Before Ultra: the Polish Success and Check (1933--1939) . . . . . . . . . 227--234 Ralph Erskine and Frode Weierud Naval Enigma: M4 and Its Rotors . . . . 235--244 Louis Kruh British Rockex Cipher Machines . . . . . 245--247 Louis Kruh and Ralph Erskine Reviews and Things Cryptologic . . . . . 248--253
Michael Barlow Voynich Solved? . . . . . . . . . . . . ??
Peter K. Pearson Cryptanalysis of the Ciarcia Circuit Cellar Data Encryptor . . . . . . . . . 1--10 Carl Hammer Second Order Homophonic Ciphers . . . . 11--20 John Michener Recent Developments in Electronic Circuitry and Their Effects on the Implementation of Substitution-Permutation Block Codes . . 21--24 Frank Rubin The cryptographic uses of Post tag systems . . . . . . . . . . . . . . . . 25--33 Louis Kruh and Ralph Erskine and Michael Barlow Reviews and Things Cryptologic . . . . . 37--51 William F. Clarke The Years Between . . . . . . . . . . . 52--58 Ralph Erskine From the Archives: Tunny Decrypts . . . 59--61 Jonathan P. Arnold Herbert O. Yardley, Gangbuster . . . . . 62--64
Louis Kruh Stimson, the Black Chamber, and the ``Gentlemen's Mail'' Quote . . . . . . . 65--89 William F. Clarke Bletchley Park 1941--1945 . . . . . . . 90--97 Ralph Erskine From the Archives: U-Boat HF WT Signalling . . . . . . . . . . . . . . . 98--106 Peter Wayner A Redundancy Reducing Cipher . . . . . . 107--112 Subhash Kak The \=Aryabha\dta cipher . . . . . . . . 113--117 Louis Kruh Reviews and Things Cryptologic . . . . . 118--127
Subhash C. Kak A Frequency Analysis of the Indus Script 129--143 Carl M. Ellison A solution of the Hebern messages . . . 144--158 Peter Jamnig Securing the RSA-cryptosystem against cycling attacks . . . . . . . . . . . . 159--164 Martin Kochanski Another Data Insecurity Package . . . . 165--173 (or 165--177??) William F. Clarke Post War Organization . . . . . . . . . 174--177 Gilbert Bloch and C. A. Deavours Enigma Avant Ultra, Enigma Before Ultra 178--184 Louis Kruh Reviews and Things Cryptologic . . . . . 185--192
John M. Carroll and Lynda E. Robbins Using binary derivatives to test an enhancement of DES . . . . . . . . . . . 193--208 Donald V. Miller Cryptanalysis of a Two Round Version of DES Using Index Implications . . . . . . 209--219 Robert Matthews An Empirical Method for Finding the Keylength of Periodic Ciphers . . . . . 220--224 Kaoru Kurosawa and Toshiya Ito and Masashi Takeuchi Public key cryptosystem using a reciprocal number with the same intractability as factoring a large number . . . . . . . . . . . . . . . . . 225--233 Richard I. Polis European Needs and Attitudes Towards Information Security . . . . . . . . . . 234--239 Louis Kruh and Johnnie Murray A Pulp Magazine Cipher . . . . . . . . . 240--240 Louis Kruh The Beale Cipher As a Bamboozlement --- Part II . . . . . . . . . . . . . . . . 241--246 C. A. Deavours Interactive Solution of Beaufort Enciphered Text With Overlapping Keys 247--255 Mike Barlow A Mathematical Word Block Cipher . . . . 256--264 Louis Kruh Reviews and Things Cryptologic . . . . . 265--269
Jack Levine and Richard Chandler The Hill cryptographic system with unknown cipher alphabet but known plaintext . . . . . . . . . . . . . . . 1--28 Robert Matthews On the derivation of a ``chaotic'' encryption algorithm . . . . . . . . . . 29--42 Jeff Belkora Belkoranic Hill Ciphering . . . . . . . 43--49 Gary R. Greenfield A Cryptography Course for the University of Richmond . . . . . . . . . . . . . . 50--60 Roland Anderson Cryptanalytic Properties of Short Substitution Ciphers . . . . . . . . . . 61--72 Subhash C. Kak A New Method for Coin Flipping by Telephone . . . . . . . . . . . . . . . 73--78 Louis Kruh The Heraldry of Cryptology --- Addendum 79--84 Louis Kruh and Ralph Erskine Reviews and Things Cryptologic . . . . . 85--96
Wolfgang W. Mache The Siemens Cipher Teletype in the History of Telecommunications . . . . . 97--117 William F. Clarke Post War Organization . . . . . . . . . 118--122 Louis Kruh British--American Cryptanalytic Cooperation and an Unprecedented Admission by Winston Churchill . . . . . 123--134 Ralph Erskine From the Archives: a Bletchley Park Assessment of German Intelligence on Torch . . . . . . . . . . . . . . . . . 135--142 Lt. Gen. Charles R. Myer Viet Cong Sigint and U.S. Army COMSEC in Vietnam . . . . . . . . . . . . . . . . 143--150 George Georgiou A Method to Strengthen Ciphers . . . . . 151--160 Roland Anderson Recognizing Complete and Partial Plaintext . . . . . . . . . . . . . . . 161--166 Louis C. Guillou and Marc Davio and Jean-Jacques Quisquater Public-Key Techniques: Randomness and Redundancy . . . . . . . . . . . . . . . 167--189 David Kahn A Soviet Wiretapping Office . . . . . . 190--191
Carl Boyd Anguish under Siege: High-Grade Japanese Signal Intelligence and the Fall of Berlin . . . . . . . . . . . . . . . . . 193--209 C. A. Deavours A Ku Klux Klan Cipher . . . . . . . . . 210--214 Louis Kruh Reviews and Things Cryptologic . . . . . 215--242 Daniel D. Wheeler Problems With Chaotic Cryptosystems . . 243--250 C. A. Deavours and Louis Kruh The Swedish HC-9 Ciphering Machine . . . 251--265 Robert Matthews A Rotor Device for Periodic and Random-Key Encryption . . . . . . . . . 266--272 Deane R. Blackman The Gromark Cipher, and Some Relatives 273--282 Unknown OSS Cryptographic Plan . . . . . . . . . 283--287
David A. August Cryptography and Exploitation of Chinese Manual Cryptosystems: Part I: The Encoding Problem . . . . . . . . . . . . 289--302 John M. Carroll and Lynda E. Robbins Computer Cryptanalysis of Product Ciphers . . . . . . . . . . . . . . . . 303--326 Louis Kruh Tales of Yardley: Some Sidelights to His Career . . . . . . . . . . . . . . . . . 327--358 David August Information theoretic approach to secure LSFR ciphers . . . . . . . . . . . . . . 351--359 Louis Kruh Reviews and Things Cryptologic . . . . . 359--377 Unknown From the archives: Compromise of a Navy Code . . . . . . . . . . . . . . . . . . 378--381
F. H. Hinsley British Intelligence in the Second World War: An Overview . . . . . . . . . . . . 1--10 Frank W. Lewis The Day of the Dodo . . . . . . . . . . 11--27 Stanley H. Lipson and Francine Abeles The Matrix Cipher of C. L. Dodgson . . . 28--36 Daniel S. Vogel Inside a KGB Cipher . . . . . . . . . . 37--52 John Rabson and Hugo Rabson The War Office HK POW Cypher System . . 53--60 David A. August Cryptography and Exploitation of Chinese Manual Cryptosystems. Part II: The Encrypting Problem . . . . . . . . . . . 61--78 Subhash C. Kak The Vararuchi Cipher . . . . . . . . . . 79--82 Louis Kruh Reviews and Things Cryptologic . . . . . 83--89
Rear Admiral (disch.) Luigi Donini and Augusto Buonafalce The Cryptographic Services of the Royal British and Italian Navies . . . . . . . 97--127 Francine Abeles and Stanley H. Lipson Some Victorian Periodic Polyalphabetic Ciphers . . . . . . . . . . . . . . . . 128--134 Brian Leigh Dunnigan and Frank Lewis and Mike Barlow The Niagara Cipher --- Part I . . . . . 135--138 C. A. Deavours and Louis Kruh The Swedish HC-9 Ciphering Machine Challenge . . . . . . . . . . . . . . . 139--144 H. Paul Greenough Cryptanalysis of the Uncaged Hagelin . . 145--161 C. A. Deavours Solution of C-35 Texts With Partial Key Overlaps . . . . . . . . . . . . . . . . 162--168 Subhash C. Kak Indus and Brahmi --- Further Connections 169--183 Louis Kruh Reviews and Things Cryptologic . . . . . 184--191
John Byrne and Cipher A. Deavours and Louis Kruh Chaocipher Enters the Computer Age When its Method Is Disclosed to Cryptologia Editors . . . . . . . . . . . . . . . . 193--198 Brian Leigh Dunnigan and Frank Lewis and Mike Barlow The Niagara cipher --- Part II . . . . . 199--203 Wladyslaw Kozaczuk A New Challenge for an Old ENIGMA --- Buster . . . . . . . . . . . . . . . . . 204--216 Charles Connell An Analysis of NEWDES: a Modified Version of DES . . . . . . . . . . . . . 217--224 William A. Kiele A Tensor --- Theoretic Enhancement to the Hill Cipher System . . . . . . . . . 225--233 Louis Kruh Reviews and Things Cryptologic . . . . . 234--252 Louis Kruh Why Was Safford Pessimistic About Breaking the German ENIGMA Cipher Machine in 1942? . . . . . . . . . . . . 253--257 Robert W. Baldwin and Alan T. Sherman How We Solved the US\$100,000} Decipher Puzzle (16 Hours Too Late) . . . . . . . 258--284 Ross J. Anderson Solving a Class of Stream Ciphers . . . 285--288
Terry Ritter Substitution Cipher with Pseudo-Random Shuffling The Dynamic Substitution Combiner . . . . . . . . . . . . . . . . 289--303 Henry D. Ephron S. I. S./CB . . . . . . . . . . . . . . 304--330 C. A. Deavours and Louis Kruh The Turing0 Bombe: Was it Enough? . . . 331--349 Douglas W. Mitchell Nonlinear Key Generators . . . . . . . . 350--354 Caxton C. Foster Vowel Distribution as a Clue to Vowel Identification . . . . . . . . . . . . . 355--362 Louis Kruh Reviews and Things Cryptologic . . . . . 363--373 Ralph E. Weber A Masked Dispatch . . . . . . . . . . . 374--380
Terry Ritter Transposition Cipher with Pseudo-random Shuffling: The Dynamic Transposition Combiner . . . . . . . . . . . . . . . . 1--17 Stanley H. Lipson and Francine Abeles The Key--Vowel Cipher of Charles S. Dodgson . . . . . . . . . . . . . . . . 18--24 Louis Kruh Military Intelligence Corps Hall of Fame 25--28 Louis Kruh Correspondence in Cipher --- a Cipher Typewriter Catalogue . . . . . . . . . . 29--42 Charles Schwartz A New Graphical Method for Encryption of Computer Data . . . . . . . . . . . . . 43--46 Lt. Susan M. Lujan, USNR Agnes Meyer Driscoll . . . . . . . . . . 47--56 H. A. Bergen and W. J. Caelli File Security in WordPerfect 5.0 . . . . 57--66 Louis Kruh Reviews and Things Cryptologic . . . . . 67--80
Terry Ritter The Efficient Generation of Cryptographic Confusion Sequences . . . 81--139 Daniel D. Wheeler and Robert A. J. Matthews Supercomputer Investigations of a Chaotic Encryption Algorithm . . . . . . 140--152 Colin Burke and Ralph Erskine Letters to the Editor: Re: Safford Article . . . . . . . . . . . . . . . . 153--160 Jacques B. M. Guy Letter to the Editor: Re: Voynich Manuscript . . . . . . . . . . . . . . . 161--166 Louis Kruh Reviews and Things Cryptologic . . . . . 167--176
Gilles Garon and Richard Outerbridge DES Watch: An Examination of the Sufficiency of the Data Encryption Standard for Financial Institution Information Security in the 1990's . . . 177--193 Ross J. Anderson Tree Functions and Cipher Systems . . . 194--202 Yvo G. Desmedt The ``$A$'' cipher does not necessarily strengthen security . . . . . . . . . . 203--206 Jacques B. M. Guy Statistical Properties of the Two Folios of the Voynich Manuscript . . . . . . . 207--218 Lambros D. Callimahos The Legendary William F. Friedman . . . 219--236 Louis Kruh and Paul Edden Seizing the ENIGMA: Two Reviews of One Book . . . . . . . . . . . . . . . . . . 237--240 Louis Kruh Reviews and Things Cryptologic . . . . . 241--246 William F. Friedman Information Regarding Cryptographic Systems Submitted for Use by the Military Service and Forms to be Used 247--257 Jacques B. M. Guy Vowel Identification: An Old (But Good) Algorithm . . . . . . . . . . . . . . . 258--262 William F. Friedman A Brief History of the Signal Intelligence Service by the Military Service and Forms to be Used . . . . . . 263--272
David Kahn Pearl Harbor and the Inadequacy of Cryptanalysis . . . . . . . . . . . . . 273--294 Frederick D. Parker The Unsolved Messages of Pearl Harbor 295--313 Roland Anderson Extending the Concept of Interval . . . 314--324 Louis Kruh Reviews and Things Cryptologic . . . . . 325--334 Anonymous From the Archives: Security of Ultra Dexter and Rabid Intelligence War Department . . . . . . . . . . . . . . . 341--354 Daniel D. Wheeler Problems with Mitchell's Nonlinear Key Generators . . . . . . . . . . . . . . . 355--363
Louis Kruh Reviews and Things Cryptologic . . . . . 1--22 Bill Robinson The Fall and Rise of Cryptanalysis in Canada . . . . . . . . . . . . . . . . . 23--38 Ralph Erskine The German Naval Grid in World War II 39--51 John M. Carroll and Jeff Verhagen and Perry T. Wong Chaos in Cryptography: The Escape from the Strange Attractor . . . . . . . . . 52--72 Krzysztof Gaj Polish Cipher Machine --- LUCIDA . . . . 73--80 Louis Kruh ``Betrayal at Pearl Harbor'': Book Review . . . . . . . . . . . . . . . . . 81--85 Louis Kruh Sliding Code Device of Unknown Origin 86--88
Ibrahim A. Al-Kadit Origins of cryptology: The Arab contributions . . . . . . . . . . . . . 97--126 John Rabson All Are Well at Boldon: a Mid-Victorian Code System . . . . . . . . . . . . . . 127--135 Robert McLaughlin Yet Another Machine to Break DES . . . . 136--144 Louis Kruh Army--Navy Collaboration for Cryptanalysis of Enemy Systems . . . . . 145--164 George T. Sassoon The Application of Sukhotin's Algorithm to Certain Non-English Languages . . . . 165--173 David Alvarez A Papal Diplomatic Code . . . . . . . . 174--176 William A. Webb A Public-Key Cryptosystem Based on Complementing Sets . . . . . . . . . . . 177--181 Louis Kruh Reviews and Things Cryptologic . . . . . 182--190
Peter Wayner Mimic Functions . . . . . . . . . . . . 193--214 John C. King and Dennis R. Bahler An Implementation of Probabilistic Relaxation in the Cryptanalysis of Simple Substitution Ciphers . . . . . . 215--225 Ross Anderson Chaos and Random Numbers . . . . . . . . 226--226 Ken Shirriff and Curt Welch and Andrew Kinsman Decoding a VCR Controller Code . . . . . 227--234 Louis Kruh Reviews and Things Cryptologic . . . . . 235--249 Douglas W. Mitchell ``Rubik's Cube'' As a Transposition Device . . . . . . . . . . . . . . . . . 250--256 Alison L. Oswald William Frederick Friedman: a Pictorial Essay . . . . . . . . . . . . . . . . . 257--264 Lieutenant L. F. Safford From the Archives: The Functions and Duties of the Cryptography Section, Naval Communications . . . . . . . . . . 265--281 Caxton C. Foster A Comparison of Vowel Identification Methods . . . . . . . . . . . . . . . . 282--286
David Kahn Roosevelt, MAGIC, and ULTRA . . . . . . 289--319 Anonymous From the Archives: Strategic Use of Communications During the World War . . 320--326 Peter P. Fagone Partial Solutions of Swift's 18th Century Mock Latin Passages . . . . . . 327--338 Louis Kruh Reviews and Things Cryptologic . . . . . 339--346 David W. Gaddy Rochford's Cipher: a Discovery in Confederate Cryptography . . . . . . . . 347--362
Jack Levine and Richard Chandler The Two-message Problem in the Hill Cryptographic System with Unknown Cipher Alphabet . . . . . . . . . . . . . . . . 1--30 Richard Spillman and Mark Janssen and Bob Nelson and Martin Kepner Use of a Genetic Algorithm in the Cryptanalysis of Simple Substitution Ciphers . . . . . . . . . . . . . . . . 31--44 John C. King and Dennis R. Bahler A Framework for the Study of Homophonic Ciphers in Classical Encryption and Genetic Systems . . . . . . . . . . . . 45--54 Douglas W. Mitchell A Nonlinear Random Number Generator with Known, Long Cycle Length . . . . . . . . 55--62 Luke O'Connor The Inclusion--Exclusion Principle and its Applications to Cryptography . . . . 63--79 Louis Kruh A Cryptological Travelogue: Riverbank --- 1992 . . . . . . . . . . . . . . . . 80--94 Louis Kruh Reviews and Things Cryptologic . . . . . 95--110
Colin Burke An Introduction to an Historic Computer Document: The 1946 Pendergass Report Cryptanalysis and the Digital Computer 113--123 C. Burke Cryptanalytic Use of High-Speed Digital Computing Machines . . . . . . . . . . . 124--147 John C. King and Dennis R. Bahler An Algorithmic Solution of Sequential Homophonic Ciphers . . . . . . . . . . . 148--165 Louis Kruh Reviews and Things Cryptologic . . . . . 166--171 Louis Kruh A 77-Year Old Challenge Cipher Known, Long Cycle Length . . . . . . . . . . . 172--174 Chin-Chen Chang and Ren-Junn Hwang Master Keys for an $ M^3 $ Cryptoscheme 175--186 Robert A. J. Matthews The Use of Genetic Algorithms in Cryptanalysis . . . . . . . . . . . . . 187--201 R. S. Ramesh and G. Athithan and K. Thiruvengadam An Automated Approach to Solve Simple Substitution Ciphers . . . . . . . . . . 202--218 David Alvarez The Papal Cipher Section in the Early Nineteenth Century . . . . . . . . . . . 219--224
Karl De Leeuw and Hans Van Der Meer A Homophonic Substitution in the Archives of the Last Great Pensionary of Holland . . . . . . . . . . . . . . . . 225--236 David Kahn An Enigma Chronology . . . . . . . . . . 237--246 David Kahn From the Archives: Compromise of Naval Code F-3 . . . . . . . . . . . . . . . . 247--250 Louis Kruh Reviews and Things Cryptologic . . . . . 251--263 S. J. Shepherd and P. W. Sanders and C. T. Stockel The Quadratic Residue Cipher and Some Notes on Implementation . . . . . . . . 264--282 Timothy K. Nenninger From The Archives: Japanese Codebook Found . . . . . . . . . . . . . . . . . 283--284 Christoph Ruland Realizing Digital Signatures with One-Way Hash Functions . . . . . . . . . 285--300 Yuan-Chung Chin and PeCheng Wang and Jing-Jang Hwang Cryptanalysis on Schwartz Graphical Encryption method . . . . . . . . . . . 301--304 John C. King A Reconstruction of the Key to Beale Cipher Number Two . . . . . . . . . . . 305--317 Editor Stimson Quote . . . . . . . . . . . . . 318
Ravi Ganesan and Alan T. Sherman Statistical Techniques for Language Recognition: An Introduction and Guide for Cryptanalysts . . . . . . . . . . . 321--366 Richard Spillman Cryptanalysis of Knapsack Ciphers Using Genetic Algorithms . . . . . . . . . . . 367--377 Louis Kruh Reviews and Things Cryptologic . . . . . 378--394 Albert C. Leighton The Statesman Who Could Not Read His Own Mail . . . . . . . . . . . . . . . . . . 395--402 Anonymous Riverbank's 1917 Cryptologic Contributions to the United States Officially Recognized as National Security Agency Adopts Editor's Suggestion . . . . . . . . . . . . . . . 403--406 W. S. Forsyth and R. Safavi-Naini Automated Cryptanalysis of Substitution Ciphers . . . . . . . . . . . . . . . . 407--418
Louis Kruh Reviews and Things Cryptologic . . . . . 1--21 C. A. Deavours ``Those Brilliant Brits'': Book Review 22--24 Ed Dawson and Andrew Clark Divide and Conquer Attacks on Certain Classes of Stream Ciphers . . . . . . . 25--40 Gary R. Greenfield Yet Another Matrix Cryptosystem . . . . 41--51 J. Halligan From the Archives: Radio Intelligence and Communication Security . . . . . . . 52--79
Robin Denniston Yardley's Diplomatic Secrets . . . . . . 81--127 Louis Kruh Reviews and Things Cryptologic . . . . . 128--140 D. W. Davies New Information on the History of the Siemens and Halske T52 Cipher Machines 141--146 Ernst S. Selmer The Norwegian Modifications of the Siemens and Halske T52e Cipher Machines 147--149 David Kahn From the Archives: a Real Fake Message 150--152 Frank Rubin Comments on ``Cryptanalysis of Knapsack Ciphers Using Genetic Algorithms'' . . . 153--154 Terry Ritter Estimating Population from Repetitions in Accumulated Random Samples . . . . . 155--190
David Mead The Breaking of the Japanese Army Administrative Code . . . . . . . . . . 193--203 Boris C. W. Hagelin and David Kahn The Story of the Hagelin Cryptos . . . . 204--242 C. G. McKay From the archives: Arvid Damm makes an offer . . . . . . . . . . . . . . . . . 243--249 Louis Kruh The Postal Service Fails to Deliver the Goods . . . . . . . . . . . . . . . . . 250--252 John M. Carroll and Sri Nurdiati On Weak Keys and Weak Data: Foiling the Two Nemeses . . . . . . . . . . . . . . 253--280 Louis Kruh Reviews and Things Cryptologic . . . . . 281--287
Ravi Ganesan and Alan T. Sherman Statistical Techniques for Language Recognition: An Empirical Study Using Real and Simulated English . . . . . . . 289--331 John C. King An Algorithm for the Complete Automated Cryptanalysis of Periodic Polyalphabetic Substitution Ciphers . . . . . . . . . . 332--355 William J. Corcoran A Multiloop Vigen\`ere Cipher with Exceptionally Long Component Series . . 356--371 Chuan-Ming Li and Tzonelih Hwang and Narn-Yih Lee Conspiracy Attacks on the Threshold RSA Signature Scheme . . . . . . . . . . . . 372--380 Louis Kruh A Pictorial Tour of the National Cryptologic Museum . . . . . . . . . . . 381--389 Louis Kruh Reviews and Things Cryptologic . . . . . 390--398
Jim Reeds William F. Friedman's Transcription of the Voynich Manuscript . . . . . . . . . 1--23 Louis Kruh When a Court Ruled for Bacon Instead of Shakespeare --- Temporarily . . . . . . 24--38 Donald W. Davies The Lorenz Cipher Machine SZ42 . . . . . 39--61 Robin Denniston Fetterlein and Others . . . . . . . . . 62--64 A. Ray Miller The Cryptographic Mathematics of Enigma 65--80 Ralph Erskine Ultra and Some U. S. Navy Carrier Operations . . . . . . . . . . . . . . . 81--96
Edward J. Drea Were the Japanese Army Codes Secure? . . 113--136 C. A. Deavours The Autoscritcher . . . . . . . . . . . 137--148 Anonymous In Memoriam: Solomon Kullback . . . . . 149--150 David Kahn The Cryptologic Origin of Braille . . . 151--152 Karl de Leeuw and Hans van der Meer A Turning Grille from the Ancestral Castle of the Dutch Stadtholders . . . . 153--165 David Kahn Enemy Codes and Their Solution . . . . . 166--197 Horng-Twu Liaw and Chin-Laung Lei An Efficient Password Authentication Scheme Based on a Unit Circle . . . . . 198--208 Louis Kruh Reviews and Things Cryptologic . . . . . 209--215
Stephen Schlesinger Cryptanalysis for Peacetime: Codebreaking and the Birth and Structure of the United Nations . . . . . . . . . 217--235 Louis Kruth Riverbank Laboratory Correspondence, 1919 (SRH-50) . . . . . . . . . . . . . 236--246 Michael van der Meulen The Book Cipher System of the \em Wehrmacht . . . . . . . . . . . . . . . 247--260 David Alvarez A Dutch Enciphered Code . . . . . . . . 261--264 Thomas Jakobsen A Fast Method for Cryptanalysis of Substitution Ciphers . . . . . . . . . . 265--274 Frank Rubin The Quadratic and Double Quadratic Residue Ciphers . . . . . . . . . . . . 275--284 Peter Wayner Strong Theoretical Steganography . . . . 285--299 Louis Kruth Reviews and Things Cryptologic . . . . . 300--318 Anonymous Change and Structure . . . . . . . . . . 319--320
Ralph E. Weber Seward's Other Folly: the Fight over America's First Encrypted Cable . . . . 321--348 Michael van der Meulen Werftschlüssel: a German Navy Hand Cipher System Part I . . . . . . . . . . . . . 349--364 Louis Kruh Reviews and Things Cryptologic . . . . . 365--374 Tom Johnson The Mystery of an Old Japanese Codebook 380--384 David W. Gaddy The Cylinder-Cipher . . . . . . . . . . 385--391 Mike Johnson Cryptology in Cyberspace . . . . . . . . 392--396 Frank Rubin Message Authentication Using Quadratic Residues . . . . . . . . . . . . . . . . 397--404 James J. Gillogly Ciphertext-Only Cryptanalysis of Enigma 405--413
David Alvarez Italian Diplomatic Cryptanalysis in World War I . . . . . . . . . . . . . . 1--10 Friedrich L. Bauer Cryptological Devices and Machines in the Deutsches Museum, Munich . . . . . . 11--13 Louis Kruh Reviews and Things Cryptologic . . . . . 14--36 Michael van der Meulen Werftschlüssel: a German Navy Hand Cipher System Part II . . . . . . . . . . . . . 37--54 Charles David A World War II German Army Field Cipher and How We Broke It . . . . . . . . . . 55--76 Edward F. Schaefer A Simplified Data Encryption Standard Algorithm . . . . . . . . . . . . . . . 77--84 Andrew Clark and Ed Dawson and Helen Bergen Combinatorial Optimization and the Knapsack Cipher . . . . . . . . . . . . 85--93
David Alvarez Faded Lustre: Vatican Cryptography, 1815--1920 . . . . . . . . . . . . . . . 97--131 Augusto Buonafalce The Alberti Exhibition . . . . . . . . . 132--134 Rebecca Ratcliff Cryptology and World War II: NSA's 1995 History Symposium . . . . . . . . . . . 135--140 Michael van der Meulen Reihenschieber . . . . . . . . . . . . . 141--154 Greg Mellen Some Adventures in Cryptoland . . . . . 155--164 E. Dawson and L. Nielsen Automated Cryptanalysis of XOR Plaintext Strings . . . . . . . . . . . . . . . . 165--181 Louis Kruh Reviews and Things Cryptologic . . . . . 183--191
Prescott Currier My ``Purple'' Trip to England in 1941 193--201 Michael van der Meulen Cryptology in the Early Bundesrepublik 202--222 Thomas (Penn) Leary Cryptology in the 15th and 16th Century 223--242 Solomon W. Golomb On Factoring Jevons' Number . . . . . . 243--246 Frank Rubin Designing a High-Security Cipher . . . . 247--257 Howard M. Heys and Stafford E. Tavares Cryptanalysis of Substitution-Permutation Networks Using Key-Dependent Degeneracy . . . . . . . . 258--274 Subhash C. Kak An Indus--Sarasvat\=\i Signboard . . . . 275--279 Louis Kruh Reviews and Things Cryptologic . . . . . 280--288
David Whitehead Cobra and Other Bombes . . . . . . . . . 289--307 Harry Hinsley The Counterfactual History of No Ultra 308--324 James J. Gillogly and Larry Harnisch Cryptograms from the Crypt . . . . . . . 325--329 Ralph Erskine Kriegsmarine Signal Indicators . . . . . 330--340 David Kahn Some Early Hungarian Communist Ciphers 347--358 Frank Rubin One-Time Pad Cryptography . . . . . . . 359--364 Louis Kruh Reviews and Things Cryptologic . . . . . 365--380
Peter Pesic François Vi\`ete, Father of Modern Cryptanalysis --- Two New Manuscripts 1--29 John Cary Sims The Brusa Agreement of May 17, 1943 . . 30--38 David Schimmelpenninck van der Oye A First Look at Russia's Codebreakers: a Book Review . . . . . . . . . . . . . . 39--41 Ralph Erskine The First Naval Enigma Decrypts of World War II . . . . . . . . . . . . . . . . . 42--46 David H. Hamer Enigma: Actions Involved in the 'Double Stepping' of the Middle Rotor . . . . . 47--50 Jacques B. M. Guy The Distribution of Signs \em c and \em o in the Voynich Manuscript: Evidence for a real language? . . . . . . . . . . 51--54 C. C. Chang and J. K. Jan and H. C. Kowng A Digital Signature Scheme Based upon the Theory of Quadratic Residues . . . . 55--70 Paul Constance How Jim Bamford Probed the NSA . . . . . 71--74 Louis Kruh Reviews and Things Cryptologic . . . . . 75--92 George Sassoon British Company Makes PGP Easier to Use 93--94
Aviel D. Rubin An Experience Teaching a Graduate Course in Cryptography . . . . . . . . . . . . 97--109 Louis Kruh Reviews and Things Cryptologic . . . . . 110--128 Andrew Clark and Ed Dawson A Parallel Genetic Algorithm for Cryptanalysis of the Polyalphabetic Substitution Cipher . . . . . . . . . . 129--138 H. F. Chau and H.-K. Lo One-Way Functions in Reversible Computations . . . . . . . . . . . . . . 139--148 Norman Scott Solving Japanese Naval Ciphers 1943--45 149--157 David Kahn British Economic Espionage . . . . . . . 158--164 Anonymous German Wireless Intercept Organization 165--190
C. A. Deavours Lobsters, Crabs, and the Abwehr Enigma 193--199 Michael van der Meulen Bundeswehrtarnverfahren . . . . . . . . 200--217 Louis Kruh Reviews and Things Cryptologic . . . . . 218--236 Thomas R. Cain and Alan T. Sherman How to Break Gifford's Cipher . . . . . 237--286
Stephen J. Kelley The SIGCUM Story: Cryptographic Failure, Cryptologic Success . . . . . . . . . . 289--316 Neal Koblitz Cryptography As a Teaching Tool . . . . 317--326 Nara-Yih Lee and Tzonelih Hwang On the Security of Park et al.'s Key Distribution Protocol for Digital Mobile Communications . . . . . . . . . . . . . 327--334 Louis Kruh Reviews and Things Cryptologic . . . . . 335--349 Caxton C. Foster Drawbacks of the One-Time Pad . . . . . 350--352 H. Paul Greenough Cryptanalysis of the Swedish HC-9: a Known-Plaintext Approach . . . . . . . . 353--367 Lieutenant Commander I. W. Comstock Radio Intelligence and Security . . . . 368--377
David Kahn Soviet Comint in the Cold War . . . . . 1--24 Frode Weierud Sweden Cryptographic Superpower: a Book Review . . . . . . . . . . . . . . . . . 25--28 Colin Burke A Gracious but Tragic Special Ultra Message . . . . . . . . . . . . . . . . 29--32 Michael van der Meulen A First German Cryptologic Exhibition 33--48 Louis Kruh Reviews and Things Cryptologic . . . . . 49--55 A. A. Moldovyan and N. A. Moldovyan Software Encryption Algorithms for Transparent Protection Technology . . . 56--68 Franz-Peter Heider A Colossal Fish . . . . . . . . . . . . 69--95
Louis Kruh Still Waiting to Be Solved: Elgar's 1897 Cipher Message . . . . . . . . . . . . . 97--98 Graydon A. Lewis Setting the Record Straight on Midway 99--101 Anonymous Elementary Cipher Solution . . . . . . . 102--120 Randall K. Nichols The Bible Code . . . . . . . . . . . . . 121--133 A. A. Moldovyan and N. A. Moldovyan Flexible Block Cipher with Provably Inequivalent Cryptalgorithm Modifications . . . . . . . . . . . . . 134--140 Michael van der Meulen The Road to German Diplomatic Ciphers --- 1919 to 1945 . . . . . . . . . . . . 141--166 Louis Kruh Reviews and Things Cryptologic . . . . . 167--191
Kenneth A. Mendelson and Stephen T. Walker and Joan D. Winston The Evolution of Recent Cryptographic Policy in the United States . . . . . . 193--210 David H. Hamer and Geoff Sullivan and Frode Weierud Enigma Variations: an Extended Family of Machines . . . . . . . . . . . . . . . . 211--229 Emanuele Viterbo The Ciphered Autobiography of a 19th Century Egyptologist . . . . . . . . . . 231--243 Thomas Kelly The Myth of the Skytale . . . . . . . . 244--260 Louis Kruh Reviews and Things Cryptologic . . . . . 261--265 Don Coppersmith Attacking Four-Round Luby--Rackoff Ciphers . . . . . . . . . . . . . . . . 266--278 A. Kourtis and Ch. Mantakas Statistical Distribution of Delta Modulated Speech Signals as a Means for Cryptanalysis in Voice Encryption Systems . . . . . . . . . . . . . . . . 279--287
Jim Reeds Solved: the Ciphers in Book III of Trithemius's Steganographia . . . . . . 291--317 Thomas Ernst The Numerical--Astrological Ciphers in the Third Book of Trithemius's Steganographia . . . . . . . . . . . . . 318--341 David Schimmelpenninck van der Oye Tsarist Codebreaking: Some Background and Some Examples . . . . . . . . . . . 342--353 Paul N. Pfeiffer Breaking the German Weather Ciphers in the Mediterranean Detachment G, 849th Signal Intelligence Service . . . . . . 354--369 Louis Kruh Another Herbert O. Yardley Mystery? . . 370--375 Louis Kruh Reviews and Things Cryptologic . . . . . 376--379
Samuel J. Lomonaco A Quick Glance at Quantum Cryptography 1--41 Louis Kruh Reviews and Things Cryptologic . . . . . 42--54 Jim Reeds Breakthrough in Renaissance Cryptography: a Book Review . . . . . . 59--62 David Kahn Students Better Than a Pro (Bazeries) and an Author (Candela) . . . . . . . . 63--64 Ralph Erskine Kriegsmarine Short Signal Systems --- and how Bletchley Park Exploited Them 65--92
Stephen Budiansky A Tribute to Cecil Phillips---and Arlington Hall's ``Meritocracy'' . . . . 97--107 Donald W. Davies The Bombe: a Remarkable Logic Machine 108--138 H. Paul Greenough Cryptanalysis of the Hagelin C-52 and Similar Machines a Known Plaintext Attack . . . . . . . . . . . . . . . . . 139--156 Stephen T. Walker and Joan D. Winston Cryptography Policy Update . . . . . . . 157--163 Louis Kruh Reviews and Things Cryptologic . . . . . 171--188
Heinz Ulbricht Enigma-Uhr . . . . . . . . . . . . . . . 193--205 Friedrich L. Bauer An Error in the History of Rotor Encryption Devices . . . . . . . . . . . 206--210 John J. G. Savard and Richard S. Pekelney The ECM Mark II: Design, History, and Cryptology . . . . . . . . . . . . . . . 211--228 Donald W. Davies Effectiveness of the Diagonal Board . . 229--239 Michael van der Meulen German Air Force Signal Intelligence 1956: a Museum of Comint and Sigint . . 240--256 Craig Graham McKay Swedish Cryptanalysis and the Saga of Arne Beurling: a Book Review . . . . . . 257--258 Louis Kruh Vint Hill Farms Station . . . . . . . . 259--260 Axel Roch Biopolitics and Intuitive Algebra in the Mathematization of Cryptology? a Review of Shannon's ``A Mathematical Theory of Cryptography'' from 1945 . . . . . . . . 261--266 J. H. Ellis The History of Non-Secret Encryption . . 267--273 Louis Kruh Reviews and Things Cryptologic . . . . . 274--286
Alexander Hagerty An Unpublished Yardley Manuscript . . . 289--297 David M. Smith The Use of Decrypted German Weather Reports in the Operations of the Fifteenth Air Force over Europe . . . . 298--304 Robert L. Williams A Note on the Voynich Manuscript . . . . 305--309 Geoff Sullivan and Frode Weierud The Swiss NEMA Cipher Machine . . . . . 310--328 Stephen T. Walker and Joan D. Winston Cryptography Policy Update . . . . . . . 329--342 Louis Kruh Reviews and Things Cryptologic . . . . . 343--352 Ridley Mclean Naval Communications . . . . . . . . . . 353--379
Brian J. Winkel Annual Greg Mellen Memorial Cryptology Scholarship Prize . . . . . . . . . . . 1--3 Heidi Williams Applying Statistical Language Recognition Techniques in the Ciphertext-Only Cryptanalysis of Enigma 4--17 Bruce Schneier A Self-Study Course in Block-Cipher Cryptanalysis . . . . . . . . . . . . . 18--33 Hideki Sawada and Takahiro Abe Groups and RSA Cryptosystems . . . . . . 34--40 David H. Hamer G-312: an Abwehr Enigma . . . . . . . . 41--54 Philip Marks and Frode Weierud Recovering the Wiring of Enigma's Umkehrwalze A . . . . . . . . . . . . . 55--66 Louis Kruh Reviews and Things Cryptologic . . . . . 67--93
Ralph Erskine What Did the Sinkov Mission Receive from Bletchley Park? . . . . . . . . . . . . 97--109 Philip H. Jacobsen A Cryptologic Veteran's Analysis of ``Day of Deceit'' --- a Book Review . . 110--118 Stephen Budiansky Closing the Book on Pearl Harbor . . . . 119--130 Donald W. Davies An Unidentified Cipher Device . . . . . 131--134 Lars R. Knudsen and Vincent Rijmen Ciphertext-Only Attack on Akelarre . . . 135--147 Chih-Hung Wang and Tzonelih Hwang $ (t, m) $ Threshold and Generalized ID-based Conference Key Distribution System . . . . . . . . . . . . . . . . . 148--159 Rebecca A. Ratcliff Cryptology Through the Centuries: NSA's 1999 History Symposium . . . . . . . . . 160--167 Louis Kruh Reviews and Things Cryptologic . . . . . 168--189
Peter Pesic The Clue to the Labyrinth: Francis Bacon and the Decryption of Nature . . . . . . 193--211 Frederick D. Parker How OP-20-G Got Rid of Joe Rochefort . . 212--234 Thomas R. Hammant Russian and Soviet Cryptology I --- Some Communications Intelligence in Tsarist Russia . . . . . . . . . . . . . . . . . 235--249 Chuan-Ming Li and Tzonelih Hwang and Narn-Yih Lee and Juin-Jang Tsai $ (t, n) $ Threshold-Multisignature Scheme and Generalized-Multisignature Scheme where Suspected Forgery Implies Traceability of Adversarial Shareholders 250--268 Louis Kruh Reviews and Things Cryptologic . . . . . 269--286
Stephen Huffman The Navajo Code Talkers: a Cryptologic and Linguistic Perspective . . . . . . . 289--320 Craig McKay From the Archives: Japanese Fears and the Ironies of Interception . . . . . . 321--323 Cecil Phillips The American Solution of a German One-Time-Pad Cryptographic System (G-OTP) . . . . . . . . . . . . . . . . 324--332 Thomas R. Hammant II --- the Magdeburg Incident: the Russian View . . . . . . . . . . . . . . 333--338 John R. Schindler A Hopeless Struggle: Austro-Hungarian Cryptology During World War I . . . . . 339--350 Colin Burke Letter to the Editor . . . . . . . . . . 351--352 Shahrokh Saeednia How to Make the Hill Cipherh Secure . . 353--360 Russell Atkinson David Brian Kern: Theft of Trade Secrets 361--369
Alan M. Turing Visit to National Cash Register Corporation of Dayton, Ohio . . . . . . 1--10 Lee A. Gladwin Alan Turing's Visit to Dayton . . . . . 11--17 Michael Rubin The Telegraph, Espionage, and Cryptology in Nineteenth Century Iran . . . . . . . 18--36 Viviana I. Risca DNA-Based Steganography . . . . . . . . 37--49 Thomas R. Hammant Russian and Soviet Cryptology III --- Soviet Comint and the Civil War, 1918--1921 . . . . . . . . . . . . . . . 50--60 Thomas R. Hammant Russian and Soviet Cryptology IV --- Some Incidents in the 1930's . . . . . . 61--63 Louis Kruh Reviews and Things Cryptologic . . . . . 64--79
Peter Ibbotson Sayers and Ciphers . . . . . . . . . . . 81--87 Colin Burke Kim Philby, the American Intelligence Community, and OP-20-G: the Fox Built the Hen-House and Took the Keys . . . . 88--90 Jonathan Winkler From the Archives: Early Corporate Espionage amid World War I Censorship 91--94 Ben Johnsen Cryptography in Runic Inscriptions: a Remark on the Article, ``Cryptography in Runic Inscriptions,'' by O. G. Landsverk 95--100 Philip Marks Umkehrwalze D: Enigma's Rewirable Reflector --- Part I . . . . . . . . . . 101--141 Louis Kruh Reviews and Things Cryptologic . . . . . 142--159
Anonymous The Glow-Lamp Ciphering and Deciphering Machine: Enigma . . . . . . . . . . . . 161--173 Anonymous The Noncryptanalytic Headaches of Cryptanalysts . . . . . . . . . . . . . 174--176 Philip C. Marks Umkehrwalze D: Enigma's Rewirable Reflector --- Part II . . . . . . . . . 177--212 J. C. Hernández and A. Ribagorda and P. Isasi and J. M. Sierra Genetic Algorithms Can Be Used to Obtain Good Linear Congruential Generators . . 213--229 Louis Kruh Reviews and Things Cryptologic . . . . . 230--239
Stephen Budiansky Codebreaking with IBM Machines in World War II . . . . . . . . . . . . . . . . . 241--255 Karl de Leeuw Johann Friedrich Euler (1741--1800): Mathematician and Cryptologist at the Court of the Dutch Stadholder William V 256--274 Gabriel Landini Evidence of Linguistic Structure in the Voynich Manuscript Using Spectral Analysis . . . . . . . . . . . . . . . . 275--295 Philip C. Marks Umkehrwalze D: Enigma's Rewirable Reflector --- Part III . . . . . . . . . 296--310 Louis Kruh Reviews and Things Cryptologic . . . . . 311--317
Louis Kruh and Cipher Deavours The Commercial Enigma: Beginnings of Machine Cryptography . . . . . . . . . . 1--16 Donald Michie Colossus and the Breaking of the Wartime ``Fish'' Codes . . . . . . . . . . . . . 17--58 Louis Kruh The World of Codes and Ciphers at the Heinz Nixdorf Museumsforum . . . . . . . 59--67 Meenakshi Gnanaguruparan and Subhash Kak Recursive Hiding of Secrets in Visual Cryptography . . . . . . . . . . . . . . 68--76 Louis Kruh Reviews and Things Cryptologic . . . . . 77--79
Georg Glünder and Paul Whitaker Wireless and ``Geheimschreiber'' Operator in the War, 1941--1945 . . . . 81--96 Geoff Sullivan The ECM Mark II: Some Observations on the Rotor Stepping . . . . . . . . . . . 97--100 H. Koot Expert's Opinion on the Enigma Ciphering Machine . . . . . . . . . . . . . . . . 101--102 Keith P. Clive The Battle of the Seals . . . . . . . . 103--112 Bengt Beckman An Early Cipher Device: Fredrik Gripenstierna's Machine . . . . . . . . 113--123 Anonymous Britain Reveals Its Bombe to America from the Archives . . . . . . . . . . . 124--128 Raphael Chung-Wei Phan Further Notes for a Self-Study Course in Block-Cipher Cryptanalysis . . . . . . . 129--137 Louis Kruh Reviews and Things Cryptologic . . . . . 138--158
David Kahn A Riverbank Trove . . . . . . . . . . . 161--164 William Stallings The Advanced Encryption Standard . . . . 165--188 Howard M. Heys A Tutorial on Linear and Differential Cryptanalysis . . . . . . . . . . . . . 189--221 Henry B. Wolfe Non-Cryptanalytic Attacks . . . . . . . 222--234 Louis Kruh Reviews and Things Cryptologic . . . . . 235--239
Anonymous Codetalkers Recognition not Just the Navajos . . . . . . . . . . . . . . . . 241--256 Geoff Sullivan Cryptanalysis of Hagelin Machine Pin Wheels . . . . . . . . . . . . . . . . . 257--273 Craig Bauer and Christian N. S. Tate A Statistical Attack on the Running Key Cipher . . . . . . . . . . . . . . . . . 274--282 Raphael Chung-Wei Phan Mini Advanced Encryption Standard (Mini-AES): a Testbed for Cryptanalysis Students . . . . . . . . . . . . . . . . 283--306 Louis Kruh Reviews and Things Cryptologic . . . . . 307--317
Wes Freeman and Geoff Sullivan and Frode Weierud Purple Revealed: Simulation and Computer-Aided Cryptanalysis of Angooki Taipu B . . . . . . . . . . . . . . . . 1--43 Alan M. Turing Critique of ``Running Short Cribs on the U. S. Navy Bombe'' . . . . . . . . . . . 44--49 Lee A. Gladwin Alan M. Turing's Critique of Running Short Cribs on the US Navy Bombe . . . . 50--54 Louis Kruh Reviews and Things Cryptologic . . . . . 55--72 Karl de Leeuw The Dutch Invention of the Rotor Machine, 1915--1923 . . . . . . . . . . 73--94
David H. Hamer The Enigmas --- and Other Recovered Artefacts --- of U-85 . . . . . . . . . 97--110 Ralph Erskine From the Archives: What the Sinkov Mission Brought to Bletchley Park . . . 111--118 R. A. Ratcliff How Statistics Led the Germans to Believe Enigma Secure and Why They Were Wrong: Neglecting the Practical Mathematics of Cipher Machines . . . . . 119--131 Augusto Buonafalce From the Skytale to the Enigma: Book Review . . . . . . . . . . . . . . . . . 132--134 James David Soviet Secrets in the Ether --- Clandestine Radio Stations at the New York and San Francisco Consulates in World War II . . . . . . . . . . . . . . 135--147 Mohammad A. Musa and Edward F. Schaefer and Stephen Wedig A Simplified AES Algorithm and Its Linear and Differential Cryptanalyses 148--177 Brian J. Winkel Extraordinary Cryptology Collection . . 180--181 Louis Kruh Reviews and Things Cryptologic . . . . . 182--191
Philip H. Jacobsen Foreknowledge of Pearl Harbor? No!: the Story of the US Navy's Efforts on JN-25B 193--205 Niels Faurholt Urkryptografen (``The Clock Cryptograph'') . . . . . . . . . . . . . 206--208 Dorothy Clarkson Cypher Machines Maintenance and Restoration Spanning Sixty Years . . . . 209--216 Francine F. Abeles The Memoria Technica Cipher . . . . . . 217--229 Louis Kruh Reviews and Things Cryptologic . . . . . 230--232 Rose Mary Sheldon The Sator Rebus: an Unsolved Cryptogram? 233--287
Ralph Erskine and Peter Freeman Brigadier John Tiltman: One of Britain's Finest Cryptologists . . . . . . . . . . 289--318 Francesco Fabris and Myron Curtis A Nomenclator Used by Propaganda Fide During the Chinese Rites Controversy . . 319--338 Joachim von zur Gathen Claude Comiers: the First Arithmetical Cryptography . . . . . . . . . . . . . . 339--349 Bob Anderson and George McGinnis Naval Security Group Command Display . . 350--360 Raphael Chung-Wei Phan Impossible Differential Cryptanalysis of Mini-AES . . . . . . . . . . . . . . . . 361--374 Louis Kruh Reviews and Things Cryptologic . . . . . 375--378 Louis Kruh The Shakespeare--Bacon Controversy Continues on the Stage . . . . . . . . . 379--380
David Kahn Charles J. Mendelsohn and Why I Envy Him 1--17 Urban Zetterström Swedish SA Teleprinter Cipher System . . 18--30 Gordon Rugg An Elegant Hoax? A Possible Solution to the Voynich Manuscript . . . . . . . . . 31--46 Anonymous Enigma and Friends Exhibit: Bletchley Park Exhibit Opens . . . . . . . . . . . 47--49 Martin Kochanski The Comedy of Commercial Encryption Software . . . . . . . . . . . . . . . . 50--54 Stuart Savory Pocket Enigma: The Review . . . . . . . 55--59 Louis Kruh Reviews and Things Cryptologic: Kruh, David. Riverbank: The Trial of William Shakespeare, a play. Eldridge Publishing Co., P. O. Box 14367, Tallahassee FL 32317 USA. 2003. 70 pp. \$6.50}; {Jackson, John, Ed. {\em The secret War of Hut 3: The First Story of How Intelligence from Enigma Signals Decoded at Bletchley Park Was Used During World War II}. The Military Press, 1 Gallagher Close, Milton Keynes MK8 01Q UK. 2002. 115 pp. 8 1/2in by 11 3/4in. Hardback 25.00/839.30; Paperback \pounds 15.00\slash \$23.60.0 pp. \$24.95}; {Kennedy, Shawn. {\em Funny Cryptograms}. Sterling Publishing Co., 387 Park Ave. South, New York NY 10016-8810 USA. 2003. 96 pp. \$6.95; Petitcolas, Fabien A. P., Editor. \em Information Hiding. 5th International Workshop, Noordwijkerhout, The Netherlands, Oct., 2000. Springer-Verlag, 175 Fifth Ave., New York NY 10010 USA. 2003. 427 pp. \$69.00}; {Boyd, Colin and Anish Mathuria. {\em Protocols for Authentication and Key Establishment}. Springer-Verlag, 175 Fifth Avenue, New York, NY 10010 USA. 2003. 321 pp. \$54.95; Smith, Sarah. \em Chasing Shakespeare. Atria Books, 1230 Avenue of the America, New York NY 10020 USA. 2003. 337 pp. \$24.00}; {Farago, Ladislas. {\em Burn After Reading: The Espionage History of World War II}. Naval Institute Press, 291 Wood Road, Annapolis MD 21402 USA. 2003 reprint. 319 pp. \$18.95 . . . . . . . . . . . . 60--95
Joshua Holden A Comparison of Cryptography Courses . . 97--111 Louis Kruh Unknown German World War II Cipher Device . . . . . . . . . . . . . . . . . 112--114 Michael J. Cowan Rasterschlüssel 44 --- The Epitome of Hand Field Ciphers . . . . . . . . . . . 115--148 John Lawrence The Versatility of Rejewski's Method: Solving for the Wiring of the Second Rotor . . . . . . . . . . . . . . . . . 149--152 Arturo Quirantes Model Z: a Numbers-Only Enigma Version 153--156 Lisa Driskell Wavelet-based Steganography . . . . . . 157--174 Louis Kruh Reviews and Things Cryptologic: Jackson, John, Ed. \em The Secret War of Hut 3: The First Story of How Intelligence from Enigma Signals Decoded at Bletchley Park Was Used During World War II. The Military Press, 1 Gallagher Close, Milton Keynes MK8 01Q, United Kingdom. 2002, 115 pp., 8 1/2in by 11 3/4in. Hardback \pounds 25.00/\$39.30; Paperback \pounds15.00\slash \$23.60; Carter, Philip and Ken Russell. \em Brain Sizzlers. Sterling Publishing Co., Inc., 387 Park Avenue South, New York NY 10016-8810 USA. 2003. 304 p. \$5.95}; {Jenkins, Gerald and Magdalen Bear. {\em Codes and Ciphers: Clever Devices for Coding and Decoding to cut out and make}. Parkwest Publications Inc., P. O. Box 20261, New York NY 10025 USA. 2003. 32 pp. \$12.00; Jenkins, Gerald and Anne Wild. \em Be a Codebreaker! Mystery messages to puzzle over and decipher. Parkwest Publications Inc., P. O. Box 20261, New York NY 10025 USA. 2003. 32 pp. \$10.00}; {Praham, Jill. {\em So Power Can Be Brought into Play: SIGINT and the Pusan Perimeter}. Center for Cryptologic History, National Security Agency, 9800 Savage Road, Fort Meade MD 20755-6886 USA. 2000. 18 pp}; {Nickles, David Paull. {\em Under the Wire: How the Telegraph Changed Diplomacy}. Harvard University Press, Cambridge MA 02138 USA. 2003. 265 pp. \$30.95; Mowry, David P. \em German Cipher Machines of World War II. Center for Cryptologic History, National Security Agency, 9800 Savage Road, Fort Meade MD 20755-6886 USA. 2003. 32 pp; Myers, Katherine. \em Codebreaker. Salvo Press, 61428 Elder Ridge Street, Bend OR 97702 USA. 2000. 289 pp. \$16.95 paperback}; {Mao, Wenbo. {\em Modern Cryptography: Theory and Practice}. Pearson Education, Prentice Hall Professional Technical Reference, Upper Saddle River NJ 07458 USA. 2004. 707 pp. \$54.99 . . . . . . . . . . . . 175--190
Jan Bury Polish Codebreaking During the Russo--Polish War of 1919--1920 . . . . 193--203 Mike Koss The Paper Enigma Machine . . . . . . . . 204--210 Ralph Erskine and Philip Marks Naval Enigma: Seahorse and Other Kriegsmarine Cipher Blunders . . . . . . 211--241 Louis Kruh Reviews and Things Cryptologic: Mohamad Mrayati, Yahya Meer Alain, and M. Hassan al-Tayyan, Eds. \em Ibn Adlan's Treatise: A Manual on Cryptanalysis written for King alAsraf. Volume Two of Series, Arabic Origins of Cryptology. King Faisal Center for Research and Islamic Studies, P. O. Box 51049, Riyadh 11543, SAUDI ARABIA. 2003. 113 pp. \$15.00} . . . . . . . . . . . . . . . . 242--252 Augusto Buonafalce Sir Samuel Morland's Machina Cyclologica Cryptographica . . . . . . . . . . . . . 253--264 José Ramón Soler Fuensanta Mechanical Cipher Systems in the Spanish Civil War . . . . . . . . . . . . . . . 265--276 Graham A. Niblo The University of Southampton National Cipher Challenge . . . . . . . . . . . . 277--286 Anonymous Correction: \em Model Z: A Numbers-Only Enigma Version, Arturo Quirantes, Volume XXVII, Number 2, pp. 153--156, April 2004 . . . . . . . . . . . . . . . . . . ??
Joseph E. Richard The Breaking of the Japanese Army's Codes . . . . . . . . . . . . . . . . . 289--308 Joachim von zur Gathen Friederich Johann Buck: Arithmetic Puzzles in Cryptography . . . . . . . . 309--324 Peter Donovan The Flaw in the JN25 Series of Ciphers 325--340 Damien Stehlé Breaking Littlewood's cipher . . . . . . 341--357 Mahmood Khalel Ibrahem Al-Ubaidy Black-Box Attack Using Neuro-Identifier 358--372 Louis Kruh Reviews and Things Cryptologic: Young, Adam L. and Moti Yung. Malicious Cryptography: Exposing Cryptovirology. Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis IN 46256 USA. 2004, 392 pp. \$45.00} . . . . . . . . . . . . 373--379 Anonymous Corrections: \em Rasterschlüssel 44 --- The Epitome of Hand Field Ciphers, Cryptologia XXVIII(2): 115--149, April 2004 . . . . . . . . . . . . . . . . . . ?? David Gaddy Letter to the Editor: Vigen\`ere Decryption . . . . . . . . . . . . . . . ??
Hilmar-Detlef Brückner Germany's First Cryptanalysis on the Western Front: Decrypting British and French Naval Ciphers in World War I . . 1--22 Lee A. Gladwin The Diplomacy of Security: Behind the Negotiations of Article 18 of the Sino-American Cooperative Agreement . . 23--42 David Kahn The Man in the Iron Mask --- Encore et Enfin, Cryptologically . . . . . . . . . 43--49 Navneet Mandhani and Subhash Kak Watermarking Using Decimal Sequences . . 50--58 Jeffrey Overbey and William Traves and Jerzy Wojdylo On the Keyspace of the Hill Cipher . . . 59--72 Rodney H. Cooper and Christopher G. Andrews The Public Key Covert Channel . . . . . 73--75 David Kahn From the Archives: Codetalkers not wanted . . . . . . . . . . . . . . . . . 76--87 Louis Kruh Reviews and Things Cryptologic: Bamford, James. \em A Pretext For War: 9/11, Iraq, and the Abuse of America's Intelligence Agencies. Doubleday. 2004. 420 pp. \$26.95}; {Goldreich, Oded. Foundations of Cryptography: Volume II: Basic Applications. Cambridge University Press, 40 West 20th Street, New York NY 10011-4211 USA. 2004. 798 pp. \$75.00; McBain. Ed. \em Hark!. Simon & Schuster, 1230 Avenue of the Americas, New York NY 10020 USA. 2004. 293 pp. \$24.95}; {Spillman, Richard J. Classical and Contemporary Cryptology. Pearson Prentice Hall, Pearson Education, Inc., Upper Saddle River NJ 07458 USA. 2005. 285 pp. \$54.00; Teuscher, Christof (Ed.) Alan Turing: Life and Legacy of a Great Thinker. Springer-Verlag, 175 Fifth Ave., New York NY 10010 USA. 2004. 542 pp. \$69.95}; {Balliett, Blue and Brett Helquist, Illustrator. {\em Chasing Vermeer}. Scholastic Press, 557 Broadway, New York NY 10012 USA. 2004. 254 pp. \$16.96; Caldwell, Ian and Dustin Thomason. \em The Rule of Four. The Dial Press/Random House, Inc., 1745 Broadway NY 10019 USA. 2004. 372 pp. \$24.00/\$34 Canada . . . . . . . . . . 88--93 David Kahn David Shulman Dies --- The Bibliographer of Cryptology . . . . . . . . . . . . . 94--95
Philip H. Jacobsen Pearl Harbor: Radio Officer Leslie Grogan of the SS Lurline and His Misidentified Signals . . . . . . . . . 97--120 David Kahn The Polish Enigma Conference and some Excursions . . . . . . . . . . . . . . . 121--126 Peter Zilahy Ingerman Two Hebern Cryptographic Machines . . . 127--147 Raphael C.-W. Phan How to Explain Block Cipher Cryptanalysis to Your Kids . . . . . . . 148--158 Craig Bauer and Suzanne E. Gladfelter Cryptology in York, Pennsylvania . . . . 159--175 Louis Kruh Reviews and Things Cryptologic . . . . . 176--187 Louis Kruh Unknown Military Coding Device: Can You Identify It? . . . . . . . . . . . . . . 190--191 Anonymous Letter to the Editor . . . . . . . . . . ??
Geoff Sullivan and Frode Weierud Breaking German Army Ciphers . . . . . . 193--232 John Lawrence A Study of Rejewski's Equations . . . . 233--247 Craig Bauer and Elliott J. Gottloeb Results of an Automated Attack on the Running Key Cipher . . . . . . . . . . . 248--254 Richard Pekelney Excellent, Exceptional, Enormous Crypto Source . . . . . . . . . . . . . . . . . 255--256 Robert Cordery and Leon Pintsov History and Role of Information Security in Postage Evidencing and Payment . . . 257--271 Louis Kruh Enigma Articles from Cryptologia . . . . 272--273 Louis Kruh Crypto User's Guide . . . . . . . . . . 273--273 Louis Kruh Confederate Treasure Issues . . . . . . 274--274 Louis Kruh Detective Notebook for Young Adults . . 274--275 Louis Kruh College-level Math Crypto Text . . . . . 275--275 Louis Kruh Code Names Post 9/11 . . . . . . . . . . 276--276 Louis Kruh Coral Sea, Midway, and Aleutians Naval Intelligence . . . . . . . . . . . . . . 276--277 Louis Kruh Broad View of Power of Mathematics . . . 277--278 Louis Kruh Friedman Legacy . . . . . . . . . . . . 278--278 Louis Kruh Pearl Harbor Revisited . . . . . . . . . 278--279 Louis Kruh Global Eavesdropping . . . . . . . . . . 279--280 Louis Kruh Cryptology in American History . . . . . 280--280 Louis Kruh HMS Dunedin Acts on Enigma Material . . 280--281 Louis Kruh Novel Secrets . . . . . . . . . . . . . 281--282 Louis Kruh Reviews and Things Cryptologic . . . . . ??
John F. Dooley Codes and Ciphers in Fiction: An Overview . . . . . . . . . . . . . . . . 290--328 David Kahn How Garbles Tickled History . . . . . . 329--336 Charles F. Rocca Cryptology in General Education . . . . 337--342 John Lawrence Factoring for the Plugboard --- Was Rejewski's Proposed Solution for Breaking the Enigma Feasible? . . . . . 343--366 B. Thilaka and K. Rajalakshmi An Extension of Hill Cipher Using Generalised Inverses and $m$ th Residue Modulo $n$ . . . . . . . . . . . . . . . 367--376 Louis Kruh Reviews and Things Cryptologic . . . . . 377--380 Anonymous Letter from the Editor . . . . . . . . . ??
Ralph Erskine The 1944 Naval BRUSA Agreement and its Aftermath . . . . . . . . . . . . . . . 1--22 Niels Faurholt Alexis Kòhl: a Danish Inventor of Cryptosystems . . . . . . . . . . . . . 23--29 Jan Bury TELMA --- a Polish Wireless Communications Security Machine of World War II . . . . . . . . . . . . . . . . . 31--38 Augusto Buonafalce Bellaso's Reciprocal Ciphers . . . . . . 39--51 Deane R. Blackman Note on Geheimschreiber Cam Wheels . . . 53--54 William Stallings The Whirlpool Secure Hash Function . . . 55--67 Joshua Holden and Richard Layton and Laurence Merkle and Tina Hudson Underwater Hacker Missile Wars: a Cryptography and Engineering Contest . . 69--77 Louis Kruh Reviews and Things Cryptologic . . . . . 79--81
Joel V. Brawley In Memory of Jack Levine (1907--2005) 83--97 Peter Freeman The Zimmermann Telegram Revisited: a Reconciliation of the Primary Sources 98--150 Forrest R. Biard Breaking of Japanese Naval Codes: Pre-Pearl Harbor to Midway . . . . . . . 151--158 Robert Talbert The Cycle Structure and Order of the Rail Fence Cipher . . . . . . . . . . . 159--172 Kiranmayi Penumarthi and Subhash Kak Augmented Watermarking . . . . . . . . . 173--180 Louis Kruh Reviews and Things Cryptologic . . . . . 181--192
John Gallehawk Third Person Singular (Warsaw, 1939) . . 193--198 Lee A. Gladwin Did Sigint Seal The Fates of 19,000 POWs? . . . . . . . . . . . . . . . . . 199--211 Peter W. Donovan The Indicators of Japanese Ciphers 2468, 7890, and JN-25A1 . . . . . . . . . . . 212--235 David Joyner and David Kahn Edited Transcript of Interview with Peter Hilton for ``Secrets of War'' . . 236--250 Klaus Schmeh The East German Encryption Machine T-310 and the Algorithm It Used . . . . . . . 251--257 Alexander Griffing Solving XOR Plaintext Strings with the Viterbi Algorithm . . . . . . . . . . . 258--265 Claudia Oliveira and José António Xexéo and Carlos André Carvalho Clustering and Categorization Applied to Cryptanalysis . . . . . . . . . . . . . 266--280 John L. Simons Bridge Cryptography Fundamentals . . . . 281--286 Louis Kruh Reviews and Things Cryptologic . . . . . 287--291
Brian J. Winkel Letter from the Editor . . . . . . . . . 293--293 Ralph Erskine The Poles Reveal their Secrets: Alastair Denniston's Account of the July 1939 Meeting at Pyry . . . . . . . . . . . . 294--305 Craig Bauer and John Ulrich The Cryptologic Contributions of Dr. Donald Menzel . . . . . . . . . . . . . 306--339 Kent D. Boklan How I Broke the Confederate Code (137 Years Too Late) . . . . . . . . . . . . 340--345 Klaus Pommerening Kasiski's Test: Couldn't the Repetitions be by Accident? . . . . . . . . . . . . 346--352 Augusto Buonafalce and Niels Faurholt and Bjarne Toft Julius Petersen---Danish Mathematician and Cryptologist . . . . . . . . . . . . 353--360 Alexander Griffing Solving the Running Key Cipher with the Viterbi Algorithm . . . . . . . . . . . 361--367 Donald Mills Review of ``Introduction to Coding Theory'' by Ron M. Roth . . . . . . . . 368--369 Louis Kruh Reviews and Things Cryptologic . . . . . 370--374
Craig Bauer Letter from the Editor . . . . . . . . . 1--1 Joachim von zur Gathen Zimmermann Telegram: The Original Draft 2--37 David A. Hatch The Punitive Expedition Military Reform and Communications Intelligence . . . . 38--45 José Ramón Soler Fuensanta and Francisco Javier López-Brea Espiau The Strip Cipher---The Spanish Official Method . . . . . . . . . . . . . . . . . 46--56 Philip H. Jacobsen Station AL---Guadalcanal: a Full Service WWII Cryptologic Unit . . . . . . . . . 57--75 Craig Bauer and Katherine Millward Cracking Matrix Encryption Row by Row 76--83 Colin Burke From the Archives: Codebreaking (or not) in Shanghai . . . . . . . . . . . . . . 84--86 Donald Mills Review of ``Cryptography: Theory and Practice'' by D. R. Stinson . . . . . . 87--88 David Joyner Review of ``Authentication Codes and Combinatorial Designs'' by Dingyi Pei 89--91 Louis Kruh Reviews and Things Cryptologic . . . . . 92--94
Andreas Schinner The Voynich Manuscript: Evidence of the Hoax Hypothesis . . . . . . . . . . . . 95--107 Robert Lewand A Cryptology Course at Bletchley Park 108--111 António Machiavelo and Rogério Reis Automated Ciphertext---Only Cryptanalysis of the Bifid Cipher . . . 112--124 Abhishek Parakh Oblivious Transfer Using Elliptic Curves 125--132 Stelios I. Marnas and Lefteris Angelis and George L. Bleris An Application of Quasigroups in All-Or-Nothing Transform . . . . . . . . 133--142 Nick Hoffman A Simplified IDEA Algorithm . . . . . . 143--151 David Alvarez Wilhelm Fenner and the Development of the German Cipher Bureau, 1922--1939 . . 152--163 Herbert Paulis The Scheuble Apparatus . . . . . . . . . 164--178 Craig Bauer and Joel Burkholder From the Archives: Reading Stimson's Mail . . . . . . . . . . . . . . . . . . 179--184 Chris Christensen Review of ``Mathematical Ciphers from Caesar to RSA'' by Anne L. Young . . . . 185--187 David Kahn The Old Master of Austrian Cryptology 188--191 John F. Dooley Reviews of Cryptologic Fiction . . . . . 192--195 Louis Kruh Reviews and Things Cryptologic . . . . . 196--200
Mark Stamp and Wing On Chan SIGABA: Cryptanalysis of the Full Keyspace . . . . . . . . . . . . . . . . 201--222 Philip H. Jacobsen Radio Silence of the Pearl Harbor Strike Force Confirmed Again: The Saga of Secret Message Serial (SMS) Numbers . . 223--232 Simon J. Shepherd The Tiny Encryption Algorithm . . . . . 233--245 Indivar Gupta and Jasbir Singh and Roopika Chaudhary Cryptanalysis of an Extension of the Hill Cipher . . . . . . . . . . . . . . 246--253 James David Bourbon Operations in China Following World War II . . . . . . . . . . . . . . 254--262 Jukka Rislakki Searching for Cryptology's Great Wreck 263--267 Jan Bury From the Archives: Polish Interwar MFA's Cipher Compromised? . . . . . . . . . . 268--277 David Kahn ``Histoire cryptologique'' --- a Book Review . . . . . . . . . . . . . . . . . 278--280 Chris Christensen Review of ``Decrypted Secrets: Methods and Maxims of Cryptology'', Fourth Edition by F. L. Bauer . . . . . . . . . 281--283 Louis Kruh Reviews and Things Cryptologic . . . . . 284--287
Olin Sibert Robert W. Baldwin, 1957--2007 . . . . . 289--291 W. Olin Sibert and Robert W. Baldwin The Multics \tt encipher\_Algorithm . . 292--304 Lee A. Gladwin Bulldozer: a Cribless Rapid Analytical Machine (RAM) Solution to Enigma and its Variations . . . . . . . . . . . . . . . 305--315 Judy A. Holdener and Eric J. Holdener A Cryptographic Scavenger Hunt . . . . . 316--323 Sheng Zhong An Attack on the Zhou--Fan--Li Authenticated Multiple-Key Agreement Protocol . . . . . . . . . . . . . . . . 324--325 Alex Kuhl Rejewski's Catalog . . . . . . . . . . . 326--331 Edwin Olson Robust Dictionary Attack of Short Simple Substitution Ciphers . . . . . . . . . . 332--342 Jan Bury From the Archives: The U.S. and West German Agent Radio Ciphers . . . . . . . 343--357 David Hamer Review of ``Thirty Secret Years: A. G. Denniston's Work in Signals Intelligence: 1914--1944'' by Robin Denniston . . . . . . . . . . . . . . . 358--360 Augusto Buonafalce Review of ``The Curse of the Voynich. The Secret History of the World's Most Mysterious Manuscript'' by Nicholas Pelling . . . . . . . . . . . . . . . . 361--362 John F. Dooley Reviews of Cryptologic Fiction . . . . . 363--366 Chris Christensen and Robert E. Lewand 2008 Joint Mathematics Meetings Contributed Paper Session: Cryptology for Undergraduates . . . . . . . . . . . 367--367 Craig Bauer A Note of Thanks . . . . . . . . . . . . 368--368
Jeffrey D. Adler and Ryan W. Fuoss and Michael J. Levin and Amanda R. Youell Reading Encrypted Diplomatic Correspondence: An Undergraduate Research Project . . . . . . . . . . . . 1--12 Raphael C.-W. Phan and Adi Shamir Improved Related-key Attacks on DESX and DESX+ . . . . . . . . . . . . . . . . . 13--22 Chris Christensen and Suzanne Gladfelter Taking a Cryptology Class to Bletchley Park . . . . . . . . . . . . . . . . . . 23--32 Wayne S. Chan Key Enclosed: Examining the Evidence for the Missing Key Letter of the Beale Cipher . . . . . . . . . . . . . . . . . 33--36 Abhishek Parakh Oblivious Transfer Based on Key Exchange 37--44 Brian Winkel Lessons Learned from a Mathematical Cryptology Course . . . . . . . . . . . 45--55 David Kahn The Future of the Past---Questions in Cryptologic History . . . . . . . . . . 56--61 Augusto Buonafalce Cicco Simonetta's Cipher-Breaking Rules 62--70 Michael J. Cowan Breaking Short Playfair Ciphers with the Simulated Annealing Algorithm . . . . . 71--83 Jan Bury From the Archives: Intercepting Best Friend? . . . . . . . . . . . . . . . . 84--87 Chris Christensen Review of ``The Collective Works of Captain George P. McGinnis'' by George P. McGinnis . . . . . . . . . . . . . . 88--89 Chris Christensen Review of ``How to Tell a Secret: Tips, Tricks & Techniques for Breaking Codes & Conveying Covert Information'' by P. J. Huff and J. G. Lewin . . . . . . . . . . 90--91 Joshua Holden Review of ``Complexity and Cryptography: An Introduction'' by John Talbot and Dominic Welsh . . . . . . . . . . . . . 92--97 John C. Gallehawk Review of ``Delusions of Intelligence'' by R. A. Ratcliff . . . . . . . . . . . 98--100
Marek Grajek Monument in Memoriam of Marian Rejewski, Jerzy Ró\.zycki and Henryk Zygalski Unveiled in Pozna\'n . . . . . . . . . . 101--103 Mavis Batey Dilly Knox --- a Reminiscence of this Pioneer Enigma Cryptanalyst . . . . . . 104--130 Ching-Nung Yang and Tse-Shih Chen Security Analysis of Authentication of Images Using Recursive Visual Cryptography . . . . . . . . . . . . . . 131--136 Sukamol Srikwan and Markus Jakobsson Using Cartoons to Teach Internet Security . . . . . . . . . . . . . . . . 137--154 Tomi S. Melka Structural Observations Regarding RongoRongo Tablet 'Keiti' . . . . . . . 155--179 David A. Hatch From the Archives: Friedman Takes the Stand . . . . . . . . . . . . . . . . . 180--183 Louis Kruh Review of ``Figuring It Out At Bletchley Park 1939--1945'' by John Gallehawk and Kerry Johnson . . . . . . . . . . . . . 184--185 Chris Christensen Review of ``Voices of the Code Breakers: Personal Accounts of the Secret Heroes of World War II'' by Michael Paterson 186--188 Chris Christensen Review of ``$ A^3 $ and His Algebra'' by Nancy E. Albert . . . . . . . . . . . . 189--196 Anonymous Can You Break the NKU Monopoly? . . . . 197--197
Ralph Erskine Captured \em Kriegsmarine Enigma Documents at Bletchley Park . . . . . . 199--219 Martin Albrecht Algebraic Attacks on the Courtois Toy Cipher . . . . . . . . . . . . . . . . . 220--276 Colin Burke From the Archives: The Last Bombe Run, 1955 . . . . . . . . . . . . . . . . . . 277--278 James L. Massey Review of Series on Arabic Origins of Cryptology . . . . . . . . . . . . . . . 280--283 Chris Christensen Review of \booktitleThe History of Information Security: A Comprehensive Handbook edited by Karl de Leeuw and Jan Bergstra . . . . . . . . . . . . . . . . 284--294 John F. Dooley Reviews of Cryptologic Fiction . . . . . 295--298
Kent D. Boklan How I Broke an Encrypted Diary from the War of 1812 . . . . . . . . . . . . . . 299--310 Christopher Grey and Andrew Sturdy The 1942 Reorganization of the Government Code and Cypher School . . . 311--333 Tobias Schrödel Breaking Short Vigen\`ere Ciphers . . . 334--347 Jerzy Jaworski Rejewski--Ró\.zycki--Zygalski Lectures in Computer Science . . . . . . . . . . . . 348--350 Jan Bury From the Archives: Inside a Cold War Crypto Cell. Polish Cipher Bureau in the 1980s . . . . . . . . . . . . . . . . . 351--367 Whitfield Diffie What Did We Do Before Biometric Passports? A Review of \em Who Are You? Identification, Deception, and Surveillance in Early Modern Europe by Valentin Groebner . . . . . . . . . . . 368--369
Louis Kruh Esq A Belated Tribute to Rosario Candela . . 1--11 Jean-Philippe Aumasson Cryptanalysis of a Hash Function Based on Norm Form Equations . . . . . . . . . 12--15 Cheryl Beaver Cryptology in the Classroom: Analyzing a Zero-Knowledge Protocol . . . . . . . . 16--23 Tomi S. Melka Some Considerations about the \em Kohau Rongorongo Script in the Light of a Statistical Analysis of the `Santiago Staff' . . . . . . . . . . . . . . . . . 24--73 Jan Bury Breaking Unbreakable Ciphers. The Asen Georgiyev Spy Case . . . . . . . . . . . 74--88 Chris Christensen Review of \booktitleModern Cryptanalysis: Techniques for Advanced Code Breaking by Christopher Swenson . . 89--94 David H. Hamer Review of \booktitleHerivelismus and the German Military Enigma by John Herivel 95--97 James David Review of \booktitleThe U.S. Intelligence Community (Fifth Edition) by Jeffrey T. Richelson . . . . . . . . 99--101 Raphael C.-W. Phan Review of \booktitleSecurity Engineering: A Guide to Building Dependable Distributed Systems, 2nd Edition by Ross J. Anderson . . . . . . 102--103 David Kruh Review of \booktitleSpies of the Bible: Espionage in Israel from the Exodus to the Bar Kokhba Revolt by Rose Mary Sheldon . . . . . . . . . . . . . . . . 104--105
John F. Dooley and Yvonne I. Ramirez Who Wrote \booktitleThe Blonde Countess? A Stylometric Analysis of Herbert O. Yardley's Fiction . . . . . . . . . . . 108--117 José Ramón Soler Fuensanta \booktitleTreaty of Cryptography by Joaquín García Carmona? . . . . . . . . . 118--124 Blake Rice and Bill Yankosky Elliptic Curve Cryptography with the TI-83 . . . . . . . . . . . . . . . . . 125--141 Tim McDevitt and Tom Leap Multimedia Cryptology . . . . . . . . . 142--150 Mike May, S. J. Using Maple Worksheets to Enable Student Explorations of Cryptography . . . . . . 151--157 David E. Boliver Cryptology as College Outreach to Young Teens . . . . . . . . . . . . . . . . . 158--165 David Link Resurrecting \em Bomba Kryptologiczna: Archaeology of Algorithmic Artefacts, I 166--182 Jiqiang Liu and Sheng Zhong Analysis of Kim-Jeon-Yoo Password Authentication Schemes . . . . . . . . . 183--187 José de Jesús Angel Angel and Guillermo Morales-Luna Cryptographic Methods During the Mexican Revolution . . . . . . . . . . . . . . . 188--196 Colin Burke Review of \booktitleAmerican Cryptology during the Cold War, 1945--1989 by Thomas R. Johnson . . . . . . . . . . . 197--200 Chris Christensen Review of \booktitleAn Introduction to Mathematical Cryptography by Hoffstein, Pipher, and Silverman . . . . . . . . . 201--204 Howard E. Brandt Review of \booktitleProtecting Information: From Classical Error Correction to Quantum Cryptography by Susan Loepp and William K. Wootters . . 205--207 David Joyner Review of \booktitleAlgorithmic Number Theory: Lattices, Curves and Cryptography, Edited by J. P. Buhler and P. Stevenhagen . . . . . . . . . . . . . 208--211 John F. Dooley Reviews of Cryptologic Fiction . . . . . 212--215
Eimear Gallery and Chris J. Mitchell Trusted Computing: Security and Applications . . . . . . . . . . . . . . 217--245 Jongsung Kim and Raphael C.-W. Phan Advanced Differential-Style Cryptanalysis of the NSA's Skipjack Block Cipher . . . . . . . . . . . . . . 246--270 Chris Christensen Reviews of Two \em Post-Quantum Cryptography Books . . . . . . . . . . . 271--273 David H. Hamer Review of \booktitleFrom Bletchley with Love by Mavis Batey . . . . . . . . . . 274--275 John F. Dooley Another Yardley Mystery . . . . . . . . 276--282 David Chaum and Ben Hosp and Stefan Popoveniuc and Poorvi L. Vora Accessible Voter-Verifiability . . . . . 283--291 Stephen Budiansky Review of \booktitleDecoding the IRA by Tom Mahon and James J. Gillogly . . . . 292--294
Kathryn A. Schwartz Charting Arabic Cryptology's Evolution 297--304 Sean Simmons Algebraic Cryptanalysis of Simplified AES . . . . . . . . . . . . . . . . . . 305--314 Haihua Gu and Dawu Gu Speeding Up the Double-Base Recoding Algorithm of Scalar Multiplication . . . 315--320 Sujith Ravi and Kevin Knight Attacking Letter Substitution Ciphers with Integer Programming . . . . . . . . 321--334 Dae Hyun Yum and Pil Joong Lee Cracking Hill Ciphers with Goodness-of-Fit Statistics . . . . . . . 335--342 Klaus Schmeh Enigma's Contemporary Witness: Gisbert Hasenjaeger . . . . . . . . . . . . . . 343--346 Jan Bury From the Archives: CX--52 Messages Read by Red Poles? . . . . . . . . . . . . . 347--352 Henry B. Wolfe Review of \booktitleEavesdropping on Hell: Historical Guide to Western Communications Intelligence and Holocaust, 1939--1945 by Robert J. Hanyok . . . . . . . . . . . . . . . . . 353--355 Chris Christensen Review of \booktitleThe Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America by James Bamford . . . . . . . . . . . . . . . . 356--358 Chris Christensen Review of \booktitleRandom Curves by Neal Koblitz . . . . . . . . . . . . . . 359--365 Chris Christensen Review of \booktitleUltra Versus U-Boats: Enigma Decrypts in The National Archives by Roy Conyers Nesbit . . . . . 366--369
Anonymous A Tribute to David Kahn . . . . . . . . 1--11 David Kahn How I Discovered World War II's Greatest Spy . . . . . . . . . . . . . . . . . . 12--21 Gerhard F. Strasser Ninth-Century Figural Poetry and Medieval Easter Tables---Possible Inspirations for the Square Tables of Trithemius and Vigen\`ere? . . . . . . . 22--26 Chris Christensen Alan Turing's First Cryptology Textbook and Sinkov's Revision of it . . . . . . 27--43 Niels Faurholt E. S. Schieber German Code Device from WWII . . . . . . . . . . . . . . . . . . 44--51 Marko Hölbl and Tatjana Welzer and Bo\vstjan Brumen Attacks and Improvement of an Efficient Remote Mutual Authentication and Key Agreement Scheme . . . . . . . . . . . . 52--59 Jan Bury Operation Lotos: An Unsuccessful Attempt on U.S. Government Communications . . . 60--87 Chris Christensen Review of \booktitleBletchley Park: An Inmate's Story by James Thirsk . . . . . 88--89 Clyde G. Booker Review of \booktitleWest Wind Clear: Cryptology and the Winds Message Controversy -- A Documentary History . . 90--95 John F. Dooley Reviews of Cryptologic Fiction . . . . . 96--100
Brian Winkel David, Calm Down! On Second and More Reflective Thought, Don't! . . . . . . . 101--103 Jacques Patarin and Valérie Nachef ``I Shall Love You Until Death'' (Marie-Antoinette to Axel von Fersen) 104--114 Benedek Láng Why Don't We Decipher an Outdated Cipher System? The Codex of Rohonc . . . . . . 115--144 Neal Koblitz Secret Codes and Online Security: a Seminar for Entering Students . . . . . 145--154 Yesem Kurt Deciphering an Undergraduate Cryptology Course . . . . . . . . . . . . . . . . . 155--162 William Stallings NIST Block Cipher Modes of Operation for Confidentiality . . . . . . . . . . . . 163--175 Chris Christensen Review of the 2009 Cryptologic History Symposium: \booktitleGlobal Perspectives on Cryptologic History . . . . . . . . . 176--179 John F. Dooley Reviews of Cryptologic Fiction . . . . . 180--185 Clyde G. Booker Review of \booktitleThe Attack on the Liberty: The Untold Story of Israel's Deadly 1967 Assault on a U.S. Spy Ship by James Scott . . . . . . . . . . . . . 186--189 Colin Burke Review of \booktitleThe Secret Sentry: The Untold Story of the National Security Agency by Matthew M. Aid . . . 190--193 Emil H. Levine Review of \booktitleDeciphering the Rising Sun: Navy and Marine Corps Codebreakers, Translators, and Interpreters in the Pacific War by Roger Dingman . . . . . . . . . . . . . . . . 194--196
David Kahn Louis Kruh, Cryptologist, Editor, Activist . . . . . . . . . . . . . . . . 197--199 Ali Assarpour and Kent D. Boklan How We Broke the Union Code (148 Years Too Late) . . . . . . . . . . . . . . . 200--210 Jacob Konikoff and Seth Toplosky Analysis of Simplified DES Algorithms 211--224 William Stallings NIST Block Cipher Modes of Operation for Authentication and Combined Confidentiality and Authentication . . . 225--235 Stefan Popoveniuc and Poorvi L. Vora Secure Electronic Voting --- a Framework 236--257 Abhishek Parakh and Subhash Kak Internet Voting Protocol Based on Improved Implicit Security . . . . . . . 258--268 Chris Christensen Review of \booktitleElementary Cryptanalysis: A Mathematical Approach, Second Edition, by Abraham Sinkov, revised and updated by Todd Feil . . . . 269--272 Chris Christensen Review of \booktitleThe Real Enigma Heroes by Phil Shanahan . . . . . . . . 273--277 Chris Christensen Review of Two ``Gift Books'' about Cryptology . . . . . . . . . . . . . . . 278--279
Ashwin Jain and C. Hari A New Efficient Protocol for $k$-out-of-$n$ Oblivious Transfer . . . 282--290 Klaus Schmeh Alexander von Kryha and His Encryption Machines . . . . . . . . . . . . . . . . 291--300 José Ramón Soler Fuensanta and Francisco Javier López-Brea Espiau and Frode Weierud Spanish Enigma: a History of the Enigma in Spain . . . . . . . . . . . . . . . . 301--328 Dirk Rijmenants Enigma Message Procedures Used by the Heer, Luftwaffe and Kriegsmarine . . . . 329--339 Ralph Erskine Ultra Reveals a Late \em B-Dienst Success in the Atlantic . . . . . . . . 340--358 Colin Burke From the Archives: a Lady Codebreaker Speaks: Joan Murray, the Bombes and the Perils of Writing Crypto-History From Participants' Accounts . . . . . . . . . 359--370 Gerhard F. Strasser Review of \booktitleVersteckte Botschaften. Die faszinierende Geschichte der Steganografie (Hidden Messages. The Fascinating Story of Steganography) . . . . . . . . . . . . . 371--380
John F. Dooley Was Herbert O. Yardley a Traitor? . . . 1--15 Wolfgang Ertel and Lucia Jans and Walter Herzhauser and Joachim Fessler An Enigma Replica and its Blueprints . . 16--21 Jim Reeds American Dragon . . . . . . . . . . . . 22--41 Robert Edward Lewand Secret Keeping 101---Dr. Janice Martin Benario and the Women's College Connection to ULTRA . . . . . . . . . . 42--46 Abdelmalek Azizi and Mostafa Azizi Instances of Arabic Cryptography in Morocco . . . . . . . . . . . . . . . . 47--57 Manik Lal Das A Key Escrow-Free Identity-Based Signature Scheme without using Secure Channel . . . . . . . . . . . . . . . . 58--72 Chris Christensen and David Agard William Dean Wray (1910--1962): the Evolution of a Cryptanalyst . . . . . . 73--96 Chris Christensen Review of \booktitleCryptography and Network Security: Principles and Practice, Fifth Edition . . . . . . . . 97--99 Chris Christensen Review of \booktitleAlgebraic Cryptanalysis . . . . . . . . . . . . . 100--105 Chris Christensen Review of \booktitleUnderstanding Cryptography . . . . . . . . . . . . . . 106--107
David Kahn Letter to the Editor . . . . . . . . . . 109--109 David H. Hamer The David Kahn Collection at NSA's National Cryptologic Museum . . . . . . 110--113 Philip Marks Operational Use and Cryptanalysis of the Kryha Cipher Machine . . . . . . . . . . 114--155 Wayne Patterson The Cryptology of Baseball . . . . . . . 156--163 Betsy Rohaly Smoot An Accidental Cryptologist: The Brief Career of Genevieve Young Hitt . . . . . 164--175 Jan Bury From the Archives: Breaking OTP Ciphers 176--188 Chris Christensen Review of \booktitleThe Secret Life of Bletchley Park: The World War II Codebreaking Centre and the Men and Women Who Were There . . . . . . . . . . 189--191 Chris Christensen Review of Bletchley Park Trust Reports by Frank Carter . . . . . . . . . . . . 192--195 David H. Hamer Review of \booktitleDilly---The Man Who Broke Enigmas by Mavis Batey . . . . . . 196--197
Stephen Budiansky Letter to the Editor . . . . . . . . . . 199--202 Steven M. Bellovin Frank Miller: Inventor of the One-Time Pad . . . . . . . . . . . . . . . . . . 203--222 Franco P. Preparata Steps Toward Unraveling a Vatican Cipher of the 1930s . . . . . . . . . . . . . . 223--234 Jan Hajny and Vaclav Zeman Anonymous Authentication with Spread Revelation . . . . . . . . . . . . . . . 235--246 Zdzis aw J. Kapera Summary Report of the State of the Soviet Military Sigint in November 1942 Noticing ``ENIGMA'' . . . . . . . . . . 247--256 Paul W. Child Cipher against Ciphers: Jonathan Swift's Latino--Anglicus Satire of Medicine . . 257--266 Chris Christensen US Navy Cryptologic Mathematicians during World War II . . . . . . . . . . 267--276 Frank Carter Keith Batey and John Herivel: Two Distinguished Bletchley Park Cryptographers . . . . . . . . . . . . . 277--281 Chris Christensen Review of \booktitleInside Room 40: The Codebreakers of World War I by Paul Grannon . . . . . . . . . . . . . . . . 282--288 Anthony Glees Review of \booktitleGCHQ: The Uncensored Story of Britain's Most Secret Intelligence Agency by Richard J. Aldrich . . . . . . . . . . . . . . . . 289--292 Chris Christensen Review of \booktitleThe Bletchley Park Codebreakers by Ralph Erskine and Michael Smith . . . . . . . . . . . . . 293--296
Jan Bury Operation \em Stonka. An Ultimate Deception Spy Game . . . . . . . . . . . 297--327 Moshe Rubin John F. Byrne's Chaocipher Revealed: An Historical and Technical Appraisal . . . 328--379 Anonymous Editorial Board EOV . . . . . . . . . . ebi--ebi
Craig Bauer Space Crunchers and GOST Busters! . . . 1--1 Nicolas T. Courtois Security Evaluation of GOST 28147-89 in View of International Standardisation 2--13 Klaus Schmeh The Pathology of Cryptology --- a Current Survey . . . . . . . . . . . . . 14--45 Eric Brier and Wenjie Fang and David Naccache How to Scatter a Secret? . . . . . . . . 46--54 Peter Donovan The Flaw in the JN-25 Series of Ciphers, II . . . . . . . . . . . . . . . . . . . 55--61 Kyung-Ah Shim Security Flaws in Three Password-Based Remote User Authentication Schemes with Smart Cards . . . . . . . . . . . . . . 62--69 Matthew V. Ball and Cyril Guyot and James P. Hughes and Luther Martin and Landon Curt Noll The XTS--AES Disk Encryption Algorithm and the Security of Ciphertext Stealing 70--79 John F. Dooley Review of \booktitleThe Mystic Cipher by Dennis L. Mangrum . . . . . . . . . . . 80--83
Craig Bauer 100 Years Times Two: Alan Turing and the Voynich Manuscript . . . . . . . . . . . 85--87 Chris Christensen and David Joyner and Jenna Torres Lester Hill's Error-Detecting Codes . . 88--103 Marine Minier and Raphael C.-W. Phan and Benjamin Pousse On Integral Distinguishers of Rijndael Family of Ciphers . . . . . . . . . . . 104--118 Jan Bury Project Kalina: The Lotos Operation Conundrum . . . . . . . . . . . . . . . 119--128 Alan T. Sherman and Dhananjay Phatak and Vivek G. Relan and Bhushan Sonawane Location Authentication, Tracking, and Emergency Signaling through Power Line Communication: Designs and Protocols for New Out-of-Band Strategies . . . . . . . 129--148 Cheryl Beaver and Stuart Boersma KRYPTOS: a Pacific Northwest Cryptanalysis Contest for Undergraduates 149--156 Chris Christensen Review of the 2011 Cryptologic History Symposium \em Cryptology in War and Peace: Crisis Points in History . . . . 157--160 John F. Dooley Review of \booktitleJoe Rochefort's War by Elliot Carlson . . . . . . . . . . . 161--163 David H. Hamer Review of \booktitleThe Secrets of Station X --- How the Bletchley Park Codebreakers Helped Win the War by Michael Smith . . . . . . . . . . . . . 164--166 Chris Christensen Review of \booktitleSecret Days: Code-Breaking in Bletchley Park by Asa Briggs . . . . . . . . . . . . . . . . . 167--172 Chris Christensen Review of \booktitleNeil Webster's Cribs for Victory edited by Joss Pearson . . . 173--175 Chris Christensen Review of \booktitleIn the Shadow of Pont du Gard: The Polish Enigma in Vichy France (June 1940 to November 1942) by Zdzislaw J. Kapera . . . . . . . . . . . 176--178 Chris Christensen Review of \booktitleInside Enigma: The Secrets of the Enigma Machine and Other Historic Cipher Machines by Tom Perera 179--180 Chris Christensen Review of \booktitleThe Information: A History, A Theory, A Flood by James Gleick . . . . . . . . . . . . . . . . . 181--182 David Agard and Chris Christensen Review of \booktitleThe Theory That Would Not Die by Sharon McGrayne . . . . 183--190
Sandy Zabell Commentary on Alan M. Turing: The Applications of Probability to Cryptography . . . . . . . . . . . . . . 191--214 Jan Bury Assembling the Puzzle Game: The Jacek Jurzak Spy Case . . . . . . . . . . . . 215--229 Gerhard F. Strasser Late 18th-Century French Encrypted Diplomatic ``Letters of Recommendation'' --- Or, How to Unwittingly Carry Your Own Warrant . . . . . . . . . . . . . . 230--239 Gregory V. Bard and Shaun V. Ault and Nicolas T. Courtois Statistics of Random Permutations and the Cryptanalysis of Periodic Block Ciphers . . . . . . . . . . . . . . . . 240--262 J. Ramón Soler Fuensanta and Francisco Javier López-Brea Espiau and Diego Navarro Bonilla A Cryptanalysis Service During the Spanish Civil War . . . . . . . . . . . 263--289 David H. Hamer First Charlotte International Cryptologic Symposium and Exhibit . . . 290--294
Alan M. Turing and D. Bayley Report on Speech Secrecy System DELILAH, a Technical Description Compiled by A. M. Turing and Lieutenant D. Bayley REME, 1945--1946 . . . . . . . . . . . . . . . 295--340 Jan Bury Polish Cold War Codebreaking of 1959--1989: a Preliminary Assessment . . 341--379 Anonymous Editorial Board EOV . . . . . . . . . . ebi--ebi
Nicolas T. Courtois Low-Complexity Key Recovery Attacks on GOST Block Cipher . . . . . . . . . . . 1--10 Saul Kelly Room 47: The Persian Prelude to the Zimmermann Telegram . . . . . . . . . . 11--50 Fco. Alberto Campos and Alberto Gascón and Jesús María Latorre and J. Ramón Soler Genetic Algorithms and Mathematical Programming to Crack the Spanish Strip Cipher . . . . . . . . . . . . . . . . . 51--68 Quynh Dang Changes in Federal Information Processing Standard (FIPS) 180-4, Secure Hash Standard . . . . . . . . . . . . . 69--73 Joshua Holden Demitasse: a `Small' Version of the Tiny Encryption Algorithm and Its Use in a Classroom Setting . . . . . . . . . . . 74--83 John F. Dooley 1929--1931: a Transition Period in U.S. Cryptologic History . . . . . . . . . . 84--98 Chris Christensen Review of \booktitleSecret Postings: Bletchley Park to the Pentagon by Charlotte Webb. Book Tower Publishing, Redditch, Worcestershire, UK, 2011. 72 pages, Paperback, \pounds 6.99. ISBN 978-0-9557164-1-6 . . . . . . . . . . . 99--101 Chris Christensen Review of \booktitleIntroduction to Cryptography with Mathematical Foundations and Computer Implementation by Alexander Stanoyevitch. Chapman and Hall/CRC, Boca Raton, FL, 2010. 699 pages, Hardcover, \$89.95. ISBN 1-4398-1763-4} . . . . . . . . . . . . . 102--104
Chris Christensen Announcement of the 2013 Cryptologic History Symposium ``Technological Change and Cryptology: Meeting the Historical Challenges'' 17-18 October 2013 . . . . 105--106 Joshua Holden A Good Hash Function is Hard to Find, and Vice Versa . . . . . . . . . . . . . 107--119 Samantha Campbell and Max Grinchenko and William Smith Linear Cryptanalysis of Simplified AES Under Change of S-Box . . . . . . . . . 120--138 Randy Rezabek TICOM and the Search for OKW / \em Chi 139--153 Sachin Kumar and R. K. Sharma Recursive Information Hiding of Secrets by Random Grids . . . . . . . . . . . . 154--161 Karl de Leeuw Review of \booktitleForschungsstelle Langeveld: Duits Afluisterstation in bezet Nederland by Hans Knap . . . . . . 162--166 Chris Christensen Review of \booktitleMemories of My Work at the Cipher Bureau of the General Staff Second Department 1930--1945 by Marian Rejewski . . . . . . . . . . . . 167--174 David Joyner Review of \booktitleAlgebraic Shift Register Sequences by Mark Goresky and Andrew Klapper . . . . . . . . . . . . . 175--183 Chris Christensen Review of \booktitleDecoding Organization: Bletchley Park, Codebreaking and Organization Studies by Christopher Grey . . . . . . . . . . . . 184--188 David Joyner Review of \booktitleCryptographic Boolean Functions and Applications by Thomas Cusick and Pantelimon Stanica . . 189--192
Klaus Schmeh A Milestone in Voynich Manuscript Research: Voynich 100 Conference in Monte Porzio Catone, Italy . . . . . . . 193--203 Jeanne Anderson Breaking the BTK Killer's Cipher . . . . 204--209 William G. Flynn and Sharon Maneki The Jack Butcher Case: A Story of Courage, Commitment, and Concern . . . . 210--214 Todd D. Mateer Cryptanalysis of Beale Cipher Number Two 215--232 José Ramón Soler Fuensanta and Francisco Javier López-Brea Espiau and Diego Navarro Bonilla Revealing Secrets in Two Wars: The Spanish Codebreakers at PC Bruno and PC Cadix . . . . . . . . . . . . . . . . . 233--249 Amrapali Dhavare and Richard M. Low and Mark Stamp Efficient Cryptanalysis of Homophonic Substitution Ciphers . . . . . . . . . . 250--281 Chris Christensen Review of \booktitleCode Talker by C. Nez (with J. S. Avila) . . . . . . . . . 282--284 Chris Christensen Review of Two Software-Based Textbooks 285--288
John Alexander and Kevin Coleman and David White and Nick Miers and John Gallehawk Whittingham--Collingwood Cipher Machine 289--304 Darren Glass A First-Year Seminar on Cryptography . . 305--310 William Stallings Digital Signature Algorithms . . . . . . 311--327 Abdelmalek Azizi and Mostafa Azizi Instances of Arabic Cryptography in Morocco II . . . . . . . . . . . . . . . 328--337 Maria Fronczak Atbah-Type Ciphers in the Christian Orient and Numerical Rules in the Construction of Christian Substitution Ciphers . . . . . . . . . . . . . . . . 338--344 Da-Zhi Sun and Zhen-Fu Cao On the Privacy of Khan et al.'s Dynamic ID-Based Remote Authentication Scheme with User Anonymity . . . . . . . . . . 345--355 Chris Christensen Review of Biographies of Alan Turing . . 356--367 David H. Hamer Review of \booktitleHitler's Codebreakers --- German Signals Intelligence in World War 2 by John Jackson . . . . . . . . . . . . . . . . 368--370 Anonymous Editorial Board EOV . . . . . . . . . . ebi--ebi
Jeff Calof and Jeff Hill and Moshe Rubin Chaocipher Exhibit 5: History, Analysis, and Solution of \booktitleCryptologia's 1990 Challenge . . . . . . . . . . . . . 1--25 Guido Bertoni and Joan Daemen and Michaël Peeters and Gilles Van Assche The Making of KECCAK . . . . . . . . . . 26--60 Randy Rezabek The Russian Fish with Caviar . . . . . . 61--76 John F. Dooley and Elizabeth Anne King John Matthews Manly: The \booktitleCollier's Articles . . . . . . 77--88 John F. Dooley Review of \booktitleInferno by Dan Brown 89--92 John F. Dooley Review of \booktitleMr. Penumbra's 24-Hour Bookstore by Robin Sloan . . . . 93--95 Gerhard F. Strasser Review of \booktitleMechanisches Memorieren und Chiffrieren um 1430: Johannes Fontanas Tractatus de instrumentis artis memorie by Horst Kranz and Walter Oberschelp . . . . . . 96--101
Nicholas Rescher Leibniz's \em Machina Deciphratoria: A Seventeenth-Century Proto-Enigma . . . . 103--115 Kelly Chang and Richard M. Low and Mark Stamp Cryptanalysis of Typex . . . . . . . . . 116--132 Kathryn A. Schwartz From Text to Technological Context: Medieval Arabic Cryptology's Relation to Paper, Numbers, and the Post . . . . . . 133--146 Jan Bury Pinpointing the Mark: On the Cold War SIGINT Capability . . . . . . . . . . . 147--151 Chris Christensen The National Cash Register Company Additive Recovery Machine . . . . . . . 152--177 Ki-Hyun Jung and Kee-Young Yoo Three-Directional Data Hiding Method for Digital Images . . . . . . . . . . . . . 178--191 Chris Christensen Review of \booktitleSecret History: The Story of Cryptology by Craig P. Bauer 192--193 Betsy Rohaly Smoot Review of \booktitleWorld War I and the Origins of U.S. Military Intelligence by James L. Gilbert . . . . . . . . . . . . 194--196
George Lasry and Nils Kopal and Arno Wacker Solving the Double Transposition Challenge with a Divide-and-Conquer Approach . . . . . . . . . . . . . . . . 197--214 Subhash Kak and Monisha Prabhu Cryptographic Applications of Primitive Pythagorean Triples . . . . . . . . . . 215--222 Lorelei Koss Writing and Information Literacy in a Cryptology First-Year Seminar . . . . . 223--231 Charles F. Rocca Jr. Mathematics in the History of Cryptography . . . . . . . . . . . . . . 232--243 David Kahn The Naval Intercept Station at Bainbridge Island, Washington . . . . . 244--247 David List and John Gallehawk Revelation for Cilli's . . . . . . . . . 248--265 Christopher Grey From the Archives: Colonel Butler's Satire of Bletchley Park . . . . . . . . 266--275 Chris Christensen Review of the 2013 Cryptologic History Symposium, \em Technological Change and Cryptology: Meeting the Historical Challenge . . . . . . . . . . . . . . . 276--281 David H. Hamer Book Review: \booktitleDönitz, U-Boats, Convoys by Jak P. Mallmann Showell . . . 282--284 Chris Christensen Book Review: \booktitleA Brief History of Cryptology and Cryptographic Algorithms by John F. Dooley . . . . . . 285--286 Chris Christensen Book Review: \booktitleThe History of Traffic Analysis: World War I--Vietnam by Donald A. Borrmann et al. . . . . . . 287--290 Chris Christensen Book Review: \booktitleBletchley Park: The Code-Breakers of Station X by Michael Smith . . . . . . . . . . . . . 291--292
Chris Christensen Lester Hill Revisited . . . . . . . . . 293--332 Kent D. Boklan How I Decrypted a Confederate Diary --- And the Question of the Race of Mrs. Jefferson Davis . . . . . . . . . . . . 333--347 Nicolas T. Courtois Cryptanalysis of Two GOST Variants with $ 128$-Bit Keys . . . . . . . . . . . . 348--361 Raul Rojas Konrad Zuse's Proposal for a Cipher Machine . . . . . . . . . . . . . . . . 362--369 Qinglong Wang and Jintai Ding Cryptanalysis and Improvement of a $k$-out-of-$n$ Oblivious Transfer Protocol . . . . . . . . . . . . . . . . 370--376 Anonymous Editorial Board EOV . . . . . . . . . . ebi--ebi
Betsy Rohaly Smoot NSA Release and Transfer of Records Related to William F. Friedman . . . . . 1--2 L. Babinkostova and A. M. Bowden and A. M. Kimball and K. J. Williams A Simplified and Generalized Treatment of DES-Related Ciphers . . . . . . . . . 3--24 Philip Marks Enigma Wiring Data: Interpreting Allied Conventions from World War II . . . . . 25--65 Roberto Narváez Some Diplomatic Ciphers of the First Mexican Federal Republic (1824--1830) 66--83 Klaus Schmeh Second Charlotte International Cryptologic Symposium . . . . . . . . . 84--91 John F. Dooley Book Review: \booktitleGeorge Fabyan by Richard Munson . . . . . . . . . . . . . 92--98 Chris Christensen Book Review: \booktitleThe Lost World of Bletchley Park by Sinclair McKay . . . . 99--100 David H. Hamer Book Review: \booktitleGordon Welchman: Bletchley Park's Architect of Ultra Intelligence by Joel Greenberg . . . . . 101--103
Lavinia Corina Ciungu and David Kahn A Historical Survey of Romanian Intelligence . . . . . . . . . . . . . . 105--120 Gwoboa Horng Accelerating DSA Signature Generation 121--125 Eugen Antal and Pavol Zajac Key Space and Period of Fialka M-125 Cipher Machine . . . . . . . . . . . . . 126--144 Nicolas T. Courtois and Theodosis Mourouzis and Michal Misztal and Jean-Jacques Quisquater and Guangyan Song Can GOST Be Made Secure Against Differential Cryptanalysis? . . . . . . 145--156 Karl de Leeuw J. F. W. Nuboer and the Reintroduction of Machine Cryptography by the Royal Netherlands Navy, 1915--1940 . . . . . . 157--172 Craig Bauer Friedman Auditorium Times Two . . . . . 173--177 Chris Christensen Review of IEEE Milestone Award to the Polish Cipher Bureau for ``The First Breaking of Enigma Code'' . . . . . . . 178--193 Chris Christensen Book Review: \booktitleMarian Rejewski: The Man Who Defeated Enigma by Zdzis\law Jan Kapera . . . . . . . . . . . . . . . 194--197 Chris Christensen Book Review: \booktitleAlan Turing: His Work and Impact, edited by S. Barry Cooper and Jan van Leeuwen . . . . . . . 198--202
Jeanne Anderson Kaczynski's Ciphers . . . . . . . . . . 203--209 Chris Christensen and Jared Antrobus The Story of Mamba: Aligning Messages Against Recovered Additives . . . . . . 210--243 V. Gayoso Martínez and L. Hernández Encinas and A. Queiruga Dios Security and Practical Considerations When Implementing the Elliptic Curve Integrated Encryption Scheme . . . . . . 244--269 Haihua Gu and Dawu Gu and Wenlu Xie and Ray C. C. Cheung Efficient Pairing Computation on Huff Curves . . . . . . . . . . . . . . . . . 270--275 Benedek Láng Shame, Love, and Alcohol: Private Ciphers in Early Modern Hungary . . . . 276--287 Chris Christensen Book Review: \booktitleBlackett's War by Stephen Budiansky . . . . . . . . . . . 288--290
Alan G. Konheim The Impetus to Creativity in Technology 291--314 Betsy Rohaly Smoot Parker Hitt's First Cylinder Device and the Genesis of U.S. Army Cylinder and Strip Devices . . . . . . . . . . . . . 315--321 Nicolas Courtois On Multiple Symmetric Fixed Points in GOST . . . . . . . . . . . . . . . . . . 322--334 Thomas H. Barr and Andrew J. Simoson Twisting the Keyword Length from a Vigen\`ere Cipher . . . . . . . . . . . 335--341 Klaus Schmeh Encrypted Books: Mysteries that Fill Hundreds of Pages . . . . . . . . . . . 342--361 Chris Christensen Book Review: \booktitleAct of War: Lyndon Johnson, North Korea, and the Capture of the Spy Ship Pueblo by Jack Cheevers . . . . . . . . . . . . . . . . 362--372 Chris Christensen Book Review: \booktitleThe Riddle of the Labyrinth by Margalit Fox . . . . . . . 373--375 Anonymous Editorial Board EOV . . . . . . . . . . ebi--ebi
Tzonelih Hwang and Prosanta Gope RT-OCFB: Real-Time Based Optimized Cipher Feedback Mode . . . . . . . . . . 1--14 Michael Goodman and Huw Dylan British Intelligence and the Fear of a Soviet Attack on Allied Communications 15--32 Jozef Kollár Soviet VIC Cipher: No Respector of Kerckoff's Principles . . . . . . . . . 33--48 George Lasry and Nils Kopal and Arno Wacker Automated Known-Plaintext Cryptanalysis of Short Hagelin M-209 Messages . . . . 49--69 Olaf Ostwald and Frode Weierud History and Modern Cryptanalysis of Enigma's Pluggable Reflector . . . . . . 70--91 John Wright Rejewski's Test Message as a Crib . . . 92--106 John F. Dooley Review of \booktitlePrisoners, Lovers, & Spies, by Kristie Macrakis . . . . . . . 107--112
Jan Bury Operation ``Zachod'': Sex, lies, and ciphers . . . . . . . . . . . . . . . . 113--140 George Lasry and Nils Kopal and Arno Wacker Ciphertext-only cryptanalysis of Hagelin M-209 pins and lugs . . . . . . . . . . 141--176 Harold Thimbleby Human factors and missed solutions to Enigma design weaknesses . . . . . . . . 177--202 José Ramón Soler Fuensanta and Vicente Guasch Portas States by secrecy: Cryptography and guerrillas in the Spanish Civil War . . 203--214
Anders Wik Enigma Z30 retrieved . . . . . . . . . . 215--220 Daniel Loebenberger and Michael Nüsken Design principles of DES-like ciphers: A historical overview . . . . . . . . . . 221--239 Gerhard F. Strasser Samuel Zimmermann's \em Gehaimnussen: The earliest cryptological book in German . . . . . . . . . . . . . . . . . 240--260 Luis Alberto Benthin Sanguino and Gregor Leander and Christof Paar and Bernhard Esslinger and Ingo Niebel Analyzing the Spanish strip cipher by combining combinatorial and statistical methods . . . . . . . . . . . . . . . . 261--284 Tzonelih Hwang and Prosanta Gope PFC-CTR, PFC-OCB: Efficient stream cipher modes of authencryption . . . . . 285--302
Klaus Pommerening Cryptanalysis of nonlinear feedback shift registers . . . . . . . . . . . . 303--315 Roberto Narváez On the cryptography of James Leander Cathcart (1767--1843) . . . . . . . . . 316--326 John Wright A recursive solution for Turing's $H$-$M$ factor . . . . . . . . . . . . . 327--347 Subhash Kak Simulating entanglement in classical computing for cryptographic applications 348--354 Martin Samuels Ludwig Föppl: A Bavarian cryptanalyst on the Western front . . . . . . . . . . . 355--373 George Lasry and Nils Kopal and Arno Wacker Cryptanalysis of columnar transposition cipher with long keys . . . . . . . . . 374--398 Craig Bauer Review of \booktitleUnveiling the Mystic Ciphers by Dave Ramsden . . . . . . . . 399--401
Betsy Rohaly Smoot and David Hatch Ann Zeilinger Caracristi (1 February 1921--10 January 2016) . . . . . . . . . 403 Kent D. Boklan How I deciphered a Robert E. Lee letter --- and a note on the power of context in short polyalphabetic ciphers . . . . 406 Paolo Bonavoglia and Consolato Pellegrino The last poem of Pietro Giannone --- finally decrypted . . . . . . . . . . . 411 Daniel J. Girard Breaking ``Tirpitz'': Cryptanalysis of the Japanese--German joint naval cipher 428 Tom Leap and Tim McDevitt and Kayla Novak and Nicolette Siermine Further improvements to the Bauer--Millward attack on the Hill cipher . . . . . . . . . . . . . . . . . 452 Chris Christensen A review of three books about the women of Bletchley Park . . . . . . . . . . . 469 Nick Hoffman Review of \booktitleIntercept: The Secret History of Computers and Spies by Gordon Corera . . . . . . . . . . . . . 477 David Visco Somerton Man times two . . . . . . . . . 481 Betsy Rohaly Smoot Call for papers: 2017 Symposium on Cryptologic History . . . . . . . . . . 484
George Lasry and Moshe Rubin and Nils Kopal and Arno Wacker Cryptanalysis of Chaocipher and solution of Exhibit 6 . . . . . . . . . . . . . . 487--514 Shane Kepley and David Russo and Rainer Steinwandt Cryptanalysis of a modern rotor machine in a multicast setting . . . . . . . . . 515--521 Qian Yu and Chang N. Zhang A new and fast cryptographic hash function based on RC4 . . . . . . . . . 522--540 Craig Bauer and Gregory Link and Dante Molle James Sanborn's \em Kryptos and the matrix encryption conjecture . . . . . . 541--552 David H. Hamer Review of \booktitleProf: Alan Turing Decoded by Dermot Turing . . . . . . . . 553--555 Chris Christensen Companion review of \booktitleProf: Alan Turing Decoded by Dermot Turing . . . . 556--562 Chris Christensen Review of \booktitleCodes, Ciphers and Spies: Tales of Military Intelligence in World War I by John F. Dooley . . . . . 563--566 Chris Christensen Review of \booktitleU.S. Navy Codebreakers, Linguists, and Intelligence Officers against Japan, 1910--1941 by Steven E. Maffeo . . . . . 567--569 Anonymous Editorial Board . . . . . . . . . . . . ebi--ebi
Rohit Vobbilisetty and Fabio Di Troia and Richard M. Low and Corrado Aaron Visaggio and Mark Stamp Classic cryptanalysis using hidden Markov models . . . . . . . . . . . . . 1--28 Alan T. Sherman and John Seymour and Akshayraj Kore and William Newton Chaum's protocol for detecting man-in-the-middle: Explanation, demonstration, and timing studies for a text-messaging scenario . . . . . . . . 29--54 Rafal Wieczorek Putative duplication glyph in the Rongorongo script . . . . . . . . . . . 55--72 Klaus Schmeh Review of the 15th NSA Cryptologic History Symposium . . . . . . . . . . . 73--80 Chris Christensen Review of \booktitleThe SIGABA/ECM II Cipher Machine: ``A Beautiful Idea'' by Timothy J. Mucklow . . . . . . . . . . . 81--84 Chris Christensen Review of \booktitleThe Neglected Giant: Agnes Meyer Driscoll by K. Johnson . . . 85--89 Chris Christensen Review of \booktitleAn Introduction to Number Theory with Cryptography by James S. Kraft and Lawrence Washington . . . . 90--91 Dominik Landwehr Review of \booktitleSimpliciana: Schriften der Grimmelshausen Gesellschaft 2014 . . . . . . . . . . . 92--96 Jeffrey Ehme A joy to review: Two books about primes and factoring: [Rempe-Gillen, Lasse, and Rebecca Waldecker. \booktitlePrimality Testing for Beginners. Student Mathematical Library, American Mathematical Society, 2013, 244 pages, Paperback, \$39. ISBN 978-0-8218-9883-3. Wagstaff, Jr., Samuel. \booktitle{The Joy of Factoring}, Student Mathematical Library, American Mathematical Society, 2013. 293 pages. Paperback, \$43.39. ISBN 978-1-4704-1048-3] . . . . . . . . 97--100
George Lasry and Ingo Niebel and Nils Kopal and Arno Wacker Deciphering ADFGVX messages from the Eastern Front of World War I . . . . . . 101--136 William Stallings Format-preserving encryption: Overview and NIST specification . . . . . . . . . 137--152 Lauren De Meyer and Serge Vaudenay DES S-box generator . . . . . . . . . . 153--171 Klaus Schmeh Review of the 2nd Historical Ciphers Colloquium in Kassel, Germany . . . . . 172--177 Chris Christensen Review of \em The Imitation Game . . . . 178--181 Chris Christensen Review of \booktitleDemystifying the Bombe by Dermot Turing . . . . . . . . . 182--183 David H. Hamer Review of \booktitleThe Secret World by Hugh Trevor-Roper . . . . . . . . . . . 184--185 David H. Hamer Review of \booktitleSolving Enigma's Secrets by John Jackson . . . . . . . . 186--189 Chris Christensen Review of \booktitleThe Mathematics of Encryption: An Elementary Introduction by M. Cozzens and S. Miller . . . . . . 190--194
David Sherman The National Security Agency and the William F. Friedman Collection . . . . . 195--238 G. Stuart Smith Elizebeth Friedman's security and career concerns prior to World War II . . . . . 239--246 Gordon Rugg and Gavin Taylor Hoaxing statistical features of the Voynich Manuscript . . . . . . . . . . . 247--268 John Alexander and John Gallehawk and John Jackson and Allen Pearce and Edward Simpson A German machine for differencing and testing additives . . . . . . . . . . . 269--280 Chris Christensen A comment on a book review . . . . . . . 281--282 Chris Christensen Review of \booktitleThe Triumph of Zygalski's Sheets: The Polish Enigma in the Early 1940 by Zdzis\law J. Kapera 283--285 Chris Christensen Review of \booktitleSIGINT: The Secret History of Signals Intelligence 1914--1945 by Peter Matthews . . . . . . 286--287 Chris Christensen Review of \booktitleBletchley Park: The Secret Archives by Sinclair McKay . . . 288
Anonymous David Hamer, family man and Enigma expert, remembered and missed . . . . . 289--294 John Wright The Turing Bombe \em Victory and the first naval Enigma decrypts . . . . . . 295--328 Chris Christensen The evolving relationship between mathematics and cryptology, 1951--1952: SCAG and the beginnings of SCAMP and NSASAB . . . . . . . . . . . . . . . . . 329--387 Charles Varga Is Zendia the Isle of Pines? . . . . . . 388--394
Olaf Ostwald and Frode Weierud Modern breaking of Enigma ciphertexts 395--421 Xavier Bultel and Jannik Dreier and Pascal Lafourcade and Malika More How to explain modern security concepts to your children . . . . . . . . . . . . 422--447 Jean-Philippe Échard and Pierrick Gaudry A harmonious encoding of instrument values by a nineteenth-century Parisian violin dealer . . . . . . . . . . . . . 448--458 Gunnar E. Wolf and Gina Gallegos-García Strengthening a curated web of trust in a geographically distributed project . . 459--475 Betsy Rohaly Smoot National Security Agency releases Army Security Agency histories covering 1945--1963 . . . . . . . . . . . . . . . 476--478 Chris Christensen Review of \booktitleSilence Means Security: Secrets of a WWII Code-Breaking WAC by B. Nicodemus . . . 479--480 Chris Christensen Review of \booktitleCode Warriors: NSA's Codebreakers and the Secret Intelligence War against the Soviet Union by S. Budiansky . . . . . . . . . . . . . . . 481--484 Klaus Schmeh Review of \booktitleUnsolved: The History and Mystery of the World's Greatest Ciphers from Ancient Egypt to Online Secret Societies by Craig Bauer 485--490
Phan Du'o'ng Hi\dêu and Neal Koblitz Cryptography during the French and American Wars in Vietnam . . . . . . . . 491--511 Jan Bury Lambda: A Cold War Polish line encryptor and the networks it served . . . . . . . 512--533 S. Agievich and A. Gorodilova and V. Idrisova and N. Kolomeec and G. Shushuev and N. Tokareva Mathematical problems of the Second International Students' Olympiad in Cryptography . . . . . . . . . . . . . . 534--565 Anonymous Editorial Board EOV . . . . . . . . . . ??
Philip Marks Mr. Twinn's bombes . . . . . . . . . . . 1--80 P. R. Mishra and Yogesh Kumar and N. R. Pillai and R. K. Sharma On non-linearity and affine equivalence of permutations over an arbitrary finite commutative ring with unity . . . . . . 81--94
Gregory J. Nedved The Sino--Japanese War of 1894--1895: Partially decrypted . . . . . . . . . . 95--105 Manuel Vázquez and Paz Jiménez-Seral Recovering the military Enigma using permutations --- filling in the details of Rejewski's solution . . . . . . . . . 106--134 William Stallings The offset codebook (OCB) block cipher mode of operation for authenticated encryption . . . . . . . . . . . . . . . 135--145 Dheerendra Mishra Efficient and secure two-factor dynamic ID-based password authentication scheme with provable security . . . . . . . . . 146--175 Klaus Schmeh Review of the 3rd European Historical Ciphers Colloquium in Smolenice, Slovakia . . . . . . . . . . . . . . . . 176--182 John F. Dooley Review of \booktitleA Mind at Play by Jimmy Soni and Rob Goodman . . . . . . . 183--190
Nicolas Courtois Decryption oracle slide attacks on T-310 191--204 Paolo Bonavoglia A 1916 World War I notebook of Luigi Sacco . . . . . . . . . . . . . . . . . 205--221 John Wright Rejewski's equations: Solving for the entry permutation . . . . . . . . . . . 222--226 Hamza Moufek and Kenza Guenda A new variant of the McEliece cryptosystem based on the Smith form of convolutional codes . . . . . . . . . . 227--239 Anonymous Corrections to ``Review of \booktitleThe Triumph of Zygalski's Sheets: The Polish Enigma in the Early 1940s'' 2017. \booktitleCryptologia \bf 41(3): 283--285 . . . . . . . . . . . . . . . . 240 Ryan Shaffer Spies and signals intelligence in the early Cold War . . . . . . . . . . . . . 241--253 David Joyner Review of \booktitleA Life in Code by Stuart G. Smith and \booktitleThe Woman Who Smashed Codes by Jason Fagone . . . 254--257 Deborah Anderson Review of \booktitleCode Girls: The untold story of the American women code breakers of World War II by Liza Mundy 258--261 Ralph Erskine Review of \booktitleThe Hidden History of Bletchley Park: A Social and Organisational History, 1939--1945 by Christopher Smith . . . . . . . . . . . 262--264 Klaus Schmeh Review of \booktitleThe Voynich Manuscript by Raymond Clemens and \booktitleThe Voynich Manuscript: The world's most Mysterious and Esoteric Codex by Stephen Skinner . . . . . . . . 265--270 Chris Christensen Review of \booktitleCode Breaking in the Pacific by Peter Donovan and John Mack 271--273 Chris Christensen Review of \booktitleThe Mathematics of Secrets by Joshua Holden . . . . . . . . 274--277 Chris Christensen Review of \booktitleThe New Codebreakers edited by P. Ryan, D. Naccache, and J.-J. Quisquater . . . . . . . . . . . . 278--283
Levente Zoltán Király and Gábor Tokai Cracking the code of the Rohonc Codex 285--315 Nicolas T. Courtois and Maria-Bristena Oprisanu Ciphertext-only attacks and weak long-term keys in T-310 . . . . . . . . 316--336 Alan T. Sherman and David DeLatte and Michael Neary and Linda Oliva and Dhananjay Phatak and Travis Scheponik and Geoffrey L. Herman and Julia Thompson Cybersecurity: Exploring core concepts through six scenarios . . . . . . . . . 337--377 Chris Christensen Review of \booktitleWorking on the Dark Side of the Moon: Life Inside the National Security Agency by Thomas Reed Willemain . . . . . . . . . . . . . . . 378--380
Norbert Biermann Analysis of Giouan Battista Bellaso's cipher challenges of 1555 . . . . . . . 381--407 Tim McDevitt and Jessica Lehr and Ting Gu A parallel time--memory tradeoff attack on the Hill cipher . . . . . . . . . . . 408--426 Nicolas Courtois and Jörg Drobick and Klaus Schmeh Feistel ciphers in East Germany in the communist era . . . . . . . . . . . . . 427--444 Chris Christensen Review of \booktitleLorenz and comments on the work of William Tutte: Roberts, Captain Jerry. \booktitleLorenz: Breaking Hitler's Top Secret Code at Bletchley Park. The History Press, Stroud, Gloucestershire UK, 2017. 240 pages, Hardcover, \pounds 20. ISBN 978-0-7509-7885-9 . . . . . . . . . . . 445--466 Gerhard F. Strasser Review of \booktitleVersteckte Botschaften. Die faszinierende Geschichte der Steganografie. 2., aktualisierte und erweiterte Auflage (\booktitleHidden Messages. The Fascinating Story of Steganography. 2nd, updated and expanded edition) by Klaus Schmeh . . . . . . . . . . . . . . . . . 467--475
Satoshi Tomokiyo How I reconstructed a Spanish cipher from 1591 . . . . . . . . . . . . . . . 477--484 George Lasry and Nils Kopal and Arno Wacker Ciphertext-only cryptanalysis of short Hagelin M-209 ciphertexts . . . . . . . 485--513 Ulug Kuzuoglu Chinese cryptography: The Chinese Nationalist Party and intelligence management, 1927--1949 . . . . . . . . . 514--539 Chris Christensen Review of \booktitleA Grand Gossip: The Bletchley Park Diary of Basil Cottle edited by James and Judith Hodsdon . . . 540--543 Chris Christensen Review of \booktitleTICOM: The Hunt for Hitler's Codebreakers by Randy Rezabek 544--547 Anonymous Editorial Board EOV . . . . . . . . . . ??
Anonymous 2019 Symposium on Cryptologic History 1--1 Nicolas T. Courtois and Maria-Bristena Oprisanu and Klaus Schmeh Linear cryptanalysis and block cipher design in East Germany in the 1970s . . 2--22 Satoshi Tomokiyo Identifying Italian ciphers from continuous-figure ciphertexts (1593) . . 23--46 Alberto Peinado Reconstruction of a 1940 Spanish strip cipher by means of a cyclic rotation model applied to encrypted telegrams . . 47--64 Chris Christensen Review of \booktitleThe Spy Who Couldn't Spell by Yudhijit Bhattacharjee . . . . 65--68 Chris Christensen Review of \booktitleStanley Johnston's Blunder: the Reporter Who Spilled the Secret Behind the U.S. Navy's Victory at Midway by Elliot Carlson . . . . . . . . 69--76 Chris Christensen Review of \booktitleAlastair Denniston: Code-Breaking from Room 40 to Berkeley Street and the Birth of GCHQ by Joel Greenberg . . . . . . . . . . . . . . . 77--80
Chris Christensen Edward Hugh Simpson CB (10 December 1922--5 February 2019) . . . . . . . . . 81--83 Chris Christensen and Jared Antrobus and Edward Simpson Aligning JN-25 messages in depth using weights when the code groups scan . . . 84--137 A. Gorodilova and S. Agievich and C. Carlet and E. Gorkunov and V. Idrisova and N. Kolomeec and A. Kutsenko and S. Nikova and A. Oblaukhov and S. Picek and B. Preneel and V. Rijmen and N. Tokareva Problems and solutions from the fourth International Students' Olympiad in Cryptography (NSUCRYPTO) . . . . . . . . 138--174
Nicolas T. Courtois and Marios Georgiou and Matteo Scarlata Slide attacks and LC-weak keys in T-310 175--189 Hussam S. Alhadawi and Mohamad Fadli Zolkipli and Saba M. Ismail and Dragan Lambi\'c Designing a pseudorandom bit generator based on LFSRs and a discrete chaotic map . . . . . . . . . . . . . . . . . . 190--211 Tanmoy Maitra and Debasis Giri and Ram N. Mohapatra SAS-SIP: A secure authentication scheme based on ECC and a fuzzy extractor for session initiation protocol . . . . . . 212--232 P. Mathivanan and A. Balaji Ganesh and R. Venkatesan QR code-based ECG signal encryption/decryption algorithm . . . . 233--253 Ahmed Bentajer and Mustapha Hedabou and Karim Abouelmehdi and Zakaria Igarramen and Said El Fezazi An IBE-based design for assured deletion in cloud storage . . . . . . . . . . . . 254--265
George Lasry and Nils Kopal and Arno Wacker Cryptanalysis of Enigma double indicators with hill climbing . . . . . 267--292 Alan Sherman and Enis Golaszewski and Edward LaFemina and Ethan Goldschen and Mohammed Khan and Lauren Mundy and Mykah Rather and Bryan Solis and Wubnyonga Tete and Edwin Valdez and Brian Weber and Damian Doyle and Casey O'Brien and Linda Oliva and Joseph Roundy and Jack Suess The SFS summer research study at UMBC: Project-based learning inspires cybersecurity students . . . . . . . . . 293--312 Tasnime Omrani and Rhouma Rhouma and Rabei Becheikh LICID: a lightweight image cryptosystem for IoT devices . . . . . . . . . . . . 313--343 John F. Dooley The Beale ciphers in fiction . . . . . . 344--358
Jean-François Bouchaudy Genuine French WWII M-209 cryptograms 359--371 Khushboo Bussi and Dhananjoy Dey and P. R. Mishra and B. K. Dass MGR Hash Functions . . . . . . . . . . . 372--390 Türker Tuncer Block-based fuzzy-image authentication method . . . . . . . . . . . . . . . . . 391--413 Manashee Kalita and Themrichon Tuithung and Swanirbhar Majumder An adaptive color image steganography method using adjacent pixel value differencing and LSB substitution technique . . . . . . . . . . . . . . . 414--437 Mike Clayton and John Gallehawk Letter repeats in Enigma ciphertext produced by same-letter keying . . . . . 438--457
Paolo Bonavoglia Bellaso's 1552 cipher recovered in Venice . . . . . . . . . . . . . . . . . 459--465 Emma May Smith and Marco Ponzi Glyph combinations across word breaks in the Voynich manuscript . . . . . . . . . 466--485 Otokar Grosek and Eugen Antal and Tomás Fabsic Remarks on breaking the Vigen\`ere autokey cipher . . . . . . . . . . . . . 486--496 S. Masih Ayat and Meysam Ghahramani A recursive algorithm for solving ``a secret sharing'' problem . . . . . . . . 497--503 Neha Kishore and Priya Raina Parallel cryptographic hashing: Developments in the last 25 years . . . 504--535 Chris Christensen Review of \booktitleHistory of Cryptography and Cryptanalysis by John Dooley . . . . . . . . . . . . . . . . . 536--538 Chris Christensen Review of \booktitleThe Cypher Bureau by Eilidh McGinness . . . . . . . . . . . . 539--541 Chris Christensen Review of \booktitleX, Y & Z by Dermot Turing . . . . . . . . . . . . . . . . . 542--544 R. Narváez Roberto Review of \booktitleMensajes secretos. La historia de la criptografía Española desde sus inicios hasta los años 50 (Secret Messages. The History of Spanish Cryptography from its beginnings until the 1950s) by Soler Fuensanta, José Ramón, and Francisco Javier López-Brea Eespiau 545--550 John F. Dooley Review of \booktitle3 Ciphers by Carol Ritz . . . . . . . . . . . . . . . . . . 551--552
Torsten Timm and Andreas Schinner A possible generating algorithm of the Voynich manuscript . . . . . . . . . . . 1--19 Nicolas T. Courtois and Marios Georgiou Variable elimination strategies and construction of nonlinear polynomial invariant attacks on T-310 . . . . . . . 20--38 Paolo Bonavoglia The cifra delle caselle: a XVI Century superencrypted cipher . . . . . . . . . 39--52 Alejandra Diaz and Alan T. Sherman and Anupam Joshi Phishing in an academic community: A study of user susceptibility and behavior . . . . . . . . . . . . . . . . 53--67 Manoj Kumar and T. S. Suresh and Saibal K. Pal and Anupama Panigrahi Optimal differential trails in lightweight block ciphers ANU and PICO 68--78 David Sherman and Betsy Rohaly Smoot and Robert J. Hanyok Introducing a new \booktitleCryptologia series: Sources and methods for cryptologic history . . . . . . . . . . 79--81 Anonymous Review of two collections of essays about Alan Turing: Copeland, Jack, Jonathan Bowen, Mark Sprevak, Robin Wilson, and others, \booktitleThe Turing Guide, Oxford University Press, Oxford, 2017. 546 pages, Paperback, \$29.95. ISBN 978-0-19-874783-3. Floyd, Juliet and Alisa Bokulich (eds.), \booktitle{Philosophical Explorations of the Legacy of Alan Turing: Turing 100}, Springer International Publishing, Cham, Switzerland, 2017. 361 pages, Hardcover, \$139.99. ISBN 978-3-319-53278-3 . . . . 82--86 Anonymous Review of \booktitleReal Life Cryptology by Benedek Láng . . . . . . . . . . . . . 87--90 John F. Dooley Review of \booktitleThe Third Reich is Listening by Christian Jennings . . . . 91--95
Frode Weierud and Sandy Zabell German mathematicians and cryptology in WWII . . . . . . . . . . . . . . . . . . 97--171 Betsy Rohaly Smoot and Robert J. Hanyok Sources and methods for cryptologic history: Research at the US National Archives --- the ``Big Two'' Record Groups . . . . . . . . . . . . . . . . . 172--196
Seongmin Park and Juneyeun Kim and Kookrae Cho and Dae Hyun Yum Finding the key length of a Vigen\`ere cipher: How to improve the twist algorithm . . . . . . . . . . . . . . . 197--204 Thomas Kaeding Slippery hill-climbing technique for ciphertext-only cryptanalysis of periodic polyalphabetic substitution ciphers . . . . . . . . . . . . . . . . 205--222 Anastasiya Gorodilova and Sergey Agievich and Claude Carlet and Xiang-dong Hou and Valeria Idrisova and Nikolay Kolomeec and Alexandr Kutsenko and Luca Mariot and Alexey Oblaukhov and Stjepan Picek and Bart Preneel and Razvan Rosie and Natalia Tokareva The Fifth International Students' Olympiad in cryptography --- NSUCRYPTO: Problems and their solutions . . . . . . 223--256 Cheryl Beaver and Stuart Boersma Celebrating ten years of KRYPTOS: a series of cryptanalysis . . . . . . . . 257--266 David Sherman Sources and methods for cryptologic history: the William and Elizebeth Smith Friedman collections . . . . . . . . . . 267--279 John F. Dooley Review of \booktitleThe Secret World by Christopher Andrew . . . . . . . . . . . 280--284 Jerry McCarthy Review of the 2nd International Conference on Historical Cryptology in Mons, Belgium . . . . . . . . . . . . . 285--288
Nicolas T. Courtois and Aidan Patrick and Matteo Abbondati Construction of a polynomial invariant annihilation attack of degree 7 for T-310 . . . . . . . . . . . . . . . . . 289--314 Shaheena Khatoon and Balwant Singh Thakur Cryptanalysis and improvement of authentication scheme for roaming service in ubiquitous network . . . . . 315--340 Prateek Pandey and Ratnesh Litoriya Securing and authenticating healthcare records through blockchain technology 341--356 Anindya Kumar Biswas and Mou Dasgupta Two polynomials based $ (t, n) $ threshold secret sharing scheme with cheating detection . . . . . . . . . . . 357--370 Sarah Parsons Sources and methods for cryptologic history: NSA.gov --- a tour through its history and resources . . . . . . . . . 371--382 Chris Christensen Review of \booktitleCode Cracking for Kids, by Jean Daigneau . . . . . . . . . 383--384
David Kenyon and Frode Weierud Enigma G: The counter Enigma . . . . . . 385--420 Jonas Alin Principal component analysis of characters in the Voynich manuscript and their classifications based on comparative analysis of writings in known languages . . . . . . . . . . . . 421--437 Lucas Boppré Niehues and Joachim von zur Gathen and Lucas Pandolfo Perin and Ana Zumalacárregui Sidon sets and statistics of the ElGamal function . . . . . . . . . . . . . . . . 438--450 Monjul Saikia and Md. Anwar Hussain Efficient data encryption technique using quaternions for wireless sensor network . . . . . . . . . . . . . . . . 451--471 Robert J. Hanyok and Betsy Rohaly Smoot Sources and methods series: considering other record groups in Nara holding cryptologic and cryptologic-related records . . . . . . . . . . . . . . . . 472--476 John F. Dooley Review of \booktitleA Most Enigmatic War, by James Goodchild . . . . . . . . 477--480
Tomi S. Melka and Robert M. Schoch Exploring a mysterious tablet from Easter Island: the issues of authenticity and falsifiability in \em rongorongo studies . . . . . . . . . . . 481--544 Beáta Megyesi and Bernhard Esslinger and Alicia Fornés and Nils Kopal and Benedek Láng and George Lasry and Karl de Leeuw and Eva Pettersson and Arno Wacker and Michelle Waldispühl Decryption of historical manuscripts: the DECRYPT project . . . . . . . . . . 545--559 Robert J. Hanyok and Betsy Rohaly Smoot Sources and methods: contingency and its role in researching records of cryptologic history --- a discussion and some lessons to apply for future research . . . . . . . . . . . . . . . . 560--568 Chris Christensen Review of \booktitleThe Enigma Bulletin edited by Zdzis\law J. Kapera . . . . . 569--572 Chris Christensen Review of \booktitleBletchley Park and D-Day by David Kenyon . . . . . . . . . 573--576
Kenneth J. Bures Cracking PURPLE: cryptanalysis of the \em Angooki Taipu B switch tables . . . 1--43 István Daruka On the Voynich manuscript . . . . . . . 44--80 Betsy Rohaly Smoot Sources and methods: uncovering the story of American Cryptology in World War I . . . . . . . . . . . . . . . . . 81--87 Chris Christensen Review of \booktitleBreaking Teleprinter Ciphers at Bletchley Park by James A. Reeds, Whitfield Diffie, and J. V. Field 88--93 Paolo Bonavoglia Review of \booktitleClassical cryptology at play by Silvio Coccaro . . . . . . . 94--96
John A. Tokar NSA honors two \booktitleCryptologia board members . . . . . . . . . . . . . 97--101 Gregory J. Nedved Herbert O. Yardley revisited: what does the new evidence say? . . . . . . . . . 102--128 José Ramón Soler Fuensanta and Héctor Soler Bonet and Diego Navarro Bonilla How to make a codebook versatile. The example of the ASLET code . . . . . . . 129--166 Kirsten Tate Identifying concealed messages using authorship attribution . . . . . . . . . 167--177 Nicolas T. Courtois A nonlinear invariant attack on T-310 with the original Boolean function . . . 178--192
Anonymous 18th Cryptologic History Symposium . . . 193--193 Åvald Åslaugson Sommervoll and Leif Nilsen Genetic algorithm attack on Enigma's plugboard . . . . . . . . . . . . . . . 194--226 Dimpy Chauhan and Indivar Gupta and Rashmi Verma Quasigroups and their applications in cryptography . . . . . . . . . . . . . . 227--265 George Teseleanu Quasigroups and substitution permutation networks: a failed experiment . . . . . 266--281 Viktor Wase Benford's Law in the Beale ciphers . . . 282--286 John Dooley Review of \booktitleFlight of the Fox by Gray Basnight . . . . . . . . . . . . . 287--288
Frode Weierud In memoriam: Thomas Ralph Erskine CB (1933--2021) . . . . . . . . . . . . . . 289--308 Jean-François Bouchaudy Enigma: the spoils of Gustave Bertrand, or ``par o\`u tout a commencé'' . . . . . 309--341 Rémi Géraud-Stewart and David Naccache A French cipher from the late 19$^{th}$ century . . . . . . . . . . . . . . . . 342--370 Robert Hanyok Sources and methods: Searching for cryptologic records in the findings of post-World War II allied technical surveys and commissions . . . . . . . . 371--378 Ralph Erskine Review of \booktitleThe Nazi Spy Ring in America by Rhodri Jeffreys-Jones . . . . 379--382
George Lasry and Ingo Niebel and Torbjörn Andersson Deciphering German diplomatic and naval attaché messages from 1900--1915 . . . . 383--425 Ronald Phelan and David Simpson Ludlings: not all fun and games . . . . 426--433 Torsten Timm and Andreas Schinner Review of \booktitleThe linguistics of the Voynich manuscript by Claire Bowern and Luke Lindemann . . . . . . . . . . . 434--438 Blain Patterson Analyzing student understanding of cryptography using the SOLO taxonomy . . 439--449 Malik Zia Ullah Bashir and Rashid Ali Cryptanalysis and improvement of a blind multi-document signcryption scheme . . . 450--464 Betsy Rohaly Smoot Sources and methods for cryptologic history: researching individuals (and the biography boom) . . . . . . . . . . 465--473 Chris Christensen Review of \booktitleOperation Vengeance: The Astonishing Aerial Ambush That Changed World War II by Dan Hampton . . 474--477
George Lasry and Beáta Megyesi and Nils Kopal Deciphering papal ciphers from the 16th to the 18th Century . . . . . . . . . . 479--540 J. Mohamedmoideen Kader Mastan and R. Pandian Cryptanalysis of two similar chaos-based image encryption schemes . . . . . . . . 541--552 Barry J. Griffiths Cryptography in undergraduate education: perceptions of postgraduate students . . 553--562 Chris Christensen Review of \booktitleThe Codebreakers of Bletchley Park by Dermot Turing . . . . 563--564 Chris Christensen Review of \booktitleA Course in Cryptography by Heiko Knospe . . . . . . 565--568 Chris Christensen Review of \booktitleThe U.S. Navy's On-the-Roof Gang, Volume Two, War in the Pacific by Matt Zullo . . . . . . . . . 569--570 Chris Christensen Review of \booktitleCodebreaking: A Practical Guide by Elonka Dunin and Klaus Schmeh . . . . . . . . . . . . . . 571--572
Richard W. Bean and George Lasry and Frode Weierud Eavesdropping on the Biafra--Lisbon link --- breaking historical ciphers from the Biafran war . . . . . . . . . . . . . . 1--66 Enka Blanchard and Ryan Robucci and Ted Selker and Alan T. Sherman Phrase-verified voting: Verifiable low-tech remote boardroom voting . . . . 67--101
Nils Kopal and Michelle Waldispühl Deciphering three diplomatic letters sent by Maximilian II in 1575 . . . . . 103--127 Türker Tuncer and Huseyin Yuce Kurum A novel Collatz conjecture-based digital image watermarking method . . . . . . . 128--147 Vladimir Edemskiy and Chenhuang Wu and Chunxiang Xu Improvements on $k$-error linear complexity of $q$-ary sequences derived from Euler quotients . . . . . . . . . . 148--166 Hervé Talé Kalachi On the failure of the smart approach of the GPT cryptosystem . . . . . . . . . . 167--182 Chris Christensen Review of \booktitleThe U.S. Navy's On-the-Roof Gang, Volume One, Prelude to War by Matt Zullo . . . . . . . . . . . 183--184 Chris Christensen Review of \booktitleOne Day in August by David O'Keefe . . . . . . . . . . . . . 185--192 Chris Christensen Review of \booktitleGeniuses at War: Bletchley Park, Colossus, and the Dawn of the Digital Age by David A. Price . . 193--194
Jean-François Bouchaudy Enigma, the XYZ period (1939--1940) . . 195--271 Chris Christensen Review of \booktitleBefore Bletchley Park: The Codebreakers of the First World War by Paul Gannon . . . . . . . . 272--276 Chris Christensen Review of \booktitleBacking Bletchley: The Codebreaking Outstations from Eastcote to GCHQ by Ronald Koorm . . . . 277--279 Chris Christensen Review of \booktitleMadame X: The Story of `003', the U.S. Army Cryptologic Bombe in World War II by Michael Barbakoff . . . . . . . . . . . . . . . 280--283 Chris Christensen Review of \booktitleImages of the National Archives Codebreakers by Stephen Twigge . . . . . . . . . . . . . 284--286 Chris Christensen Review of \booktitleReflections of Alan Turing: a Relative Story by Dermot Turing . . . . . . . . . . . . . . . . . 287--289 Anonymous Correction . . . . . . . . . . . . . . . 290--290
Paul W. Relkin Solving the Olum 1 Cipher . . . . . . . 291--301 Elonka Dunin and Magnus Ekhall and Konstantin Hamidullin and Nils Kopal and George Lasry and Klaus Schmeh How we set new world records in breaking Playfair ciphertexts . . . . . . . . . . 302--322 Paolo Bonavoglia The ciphers of the Republic of Venice: an overview . . . . . . . . . . . . . . 323--346 David Chaum and Mario Yaksetig and Alan T. Sherman and Joeri de Ruiter UDM: Private user discovery with minimal information disclosure . . . . . . . . . 347--379 Chris Christensen Review of \booktitleUSN & USMC WW II Cryptologists' Oral Histories; Voices from the past, Volumes 1 and 2 by U.S. Naval Cryptologic Veterans Association. Volume 1 of 2 (A--L). 2019. 450 + vi pages, Softcover, \$16.95. ISBN 978-1-7988-8747-9. Volume 2 of 2 (M--Z). 2019. 365 + iv pages, Softcover, \$16.95. ISBN 978-1-7988-8811-7 . . . . 380--381 Chris Christensen Review of \booktitleRadio War: The Secret Espionage War of the Radio Security Service 1938--1946 by David Abrutat. Fonthill Media, Stroud, Gloucestershire, UK. 2019. 192 pages, Hardcover, \pounds 25.00 (\$38.00). ISBN 978-1-78155-759-4} . . . . . . . . . . . 382--384 Chris Christensen Review of \booktitleThe Bombe: The Machine that Defeated Enigma by Dermot Turing. Arcturus Publishing Limited, London, 2021. 64 pages, Trade paperback A-5, \pounds 11.20. ISBN 978-1-3988-1244-4 . . . . . . . . . . . 385--386
Nicolas T. Courtois and Marek Grajek On latin squares, invariant differentials, random permutations and historical Enigma rotors . . . . . . . . 387--421 Anna Lehofer Applying hierarchical clustering to homophonic substitution ciphers using historical corpora . . . . . . . . . . . 422--438 P. R. Mishra and S. C. Ramola FCSR connection integers: efficient generation, testing and counting . . . . 439--460 François Parmentier Deciphering the Voynich manuscript: propositions to unlock research . . . . 461--484
Roger J. Morgan Rudyard Kipling's unsolved cryptogram 485--497 Sedat Bingöl Methods for encryption in early 19th-century Ottoman diplomatic correspondence . . . . . . . . . . . . . 498--524 Dimpy Chauhan and Indivar Gupta and P. R. Mishra and Rashmi Verma Construction of cryptographically strong S-boxes from ternary quasigroups of order 4 . . . . . . . . . . . . . . . . 525--551 Chris Christensen Review of \booktitleEavesdropping on the Emperor: Interrogators and Codebreakers in Britain's War with Japan by Peter Kornicki . . . . . . . . . . . . . . . . 552--555 John F. Dooley Review of \booktitleCodebreaker by Marc McMenamin . . . . . . . . . . . . . . . 556--560
George Lasry Cracking SIGABA in less than 24 hours on a consumer PC . . . . . . . . . . . . . 1--37 Paul W. Relkin Solving the Olum 2 cipher: a new approach to cryptanalysis of transposition ciphers . . . . . . . . . 38--47 George Lasry Analysis of a late 19th century French cipher created by Major Josse . . . . . 48--62 K. Ahmed and S. Pal and R. Mohan A review of the tropical approach in cryptography . . . . . . . . . . . . . . 63--87 Stuart Boersma and Jean Marie Linhart Review of \booktitleThe Woman All Spies Fear by Amy Butler Greenfield and \booktitleCode Breaker, Spy Hunter by Laurie Wallmark, Illustrated by Brooke Smart . . . . . . . . . . . . . . . . . 88--92 Chris Christensen Review of \booktitleCodebreaker Girls: A Secret Life at Bletchley Park by Jan Slimming . . . . . . . . . . . . . . . . 93--96
Craig P. Bauer The new golden age of decipherment . . . 97--100 George Lasry and Norbert Biermann and Satoshi Tomokiyo Deciphering Mary Stuart's lost letters from 1578--1584 . . . . . . . . . . . . 101--202
David Sherman \booktitleThe Codebreakers war: David Kahn, Macmillan, the government, and the making of a cryptologic history masterpiece . . . . . . . . . . . . . . 205--226 Stuart Boersma Elizebeth Smith Friedman and one example of a prohibition era encryption system 227--238 Eugen Antal and Pavol Zajac The first Czechoslovak cipher machine 239--260 Olaf Ostwald and Frode Weierud Modern cryptanalysis of the \em Truppenschlüssel . . . . . . . . . . . . 261--281 Chris Christensen Review of \booktitleThe Rohonc Code: Tracing a Historical Riddle by Benedek Láng . . . . . . . . . . . . . . . . . . 282--284 Patrick D. Anderson Review of \booktitleCrypto Wars --- The Fight for Privacy in the Digital Age: A Political History of Digital Encryption 285--298
Anonymous Cryptologic History Symposium, May 8--10, 2024 . . . . . . . . . . . . . . 299--301 Chris Christensen Genevieve Grotjan's ``great discovery'' 302--317 David Lòberg Code Can musical encryption be both? A survey of music-based ciphers . . . . . . . . . 318--364 George Teseleanu Cryptographic symmetric structures based on quasigroups . . . . . . . . . . . . . 365--392 John F. Dooley Review of \booktitleThe Rose Code by Kate Quinn . . . . . . . . . . . . . . . 393--395
Stuart Boersma Complete examples of encryption systems broken by Elizebeth Smith Friedman: 1923--1934 . . . . . . . . . . . . . . . 397--418 Arvind Kumar and P. R. Mishra and Odelu Ojjela Analysis of rotation and shift based diffusion functions . . . . . . . . . . 419--435 Kenneth J. Bures Cracking PURPLE: the identification of homologs in the cryptanalysis of the \em Angooki Taipu B cipher machine . . . . . 436--448 Zhixiong Chen and Zhihua Niu and Yuqi Sang and Chenhuang Wu Arithmetic autocorrelation of binary $m$-sequences . . . . . . . . . . . . . 449--458 Joshua Holden Resource guide for teaching post-quantum cryptography . . . . . . . . . . . . . . 459--465 Leonardo Campanelli A statistical cryptanalysis of the Beale ciphers . . . . . . . . . . . . . . . . 466--473 Joachim von zur Gathen Unicity distance of the Zodiac-340 cipher . . . . . . . . . . . . . . . . . 474--488 Chris Christensen Review of \booktitleParker Hitt: The Father of American Military Cryptology by Betsy Rohaly Smoot . . . . . . . . . 489--492
Floe Foxon A treatise on the Rilke cryptogram . . . 493--510 Satish Kumar and Indivar Gupta and Ashok Ji Gupta A study of public key cryptosystems based on quasigroups . . . . . . . . . . 511--540 Sedat Bingöl The changes in Ottoman diplomatic cryptography and its methods during the 19th century (1811--1877) . . . . . . . 541--569 R. Santosh Kumar and S. R. M. Krishna Cryptanalysis of RSA with small difference of primes and two decryption exponents: Jochemsz and May approach . . 570--583 Chris Christensen Review of \booktitleThe Secret Life of an American Codebreaker: Codebreaker Girls by Jan Slimming . . . . . . . . . 584--587
Stuart Boersma Elizebeth Smith Friedman's recovery of the wiring of two rotors from an Enigma D machine . . . . . . . . . . . . . . . 1--25 Selma Gomez Orr and Cyrus Jian Bonyadi and Enis Golaszewski and Alan T. Sherman and Peter A. H. Peterson and Richard Forno and Sydney Johns and Jimmy Rodriguez Shadow IT in higher education: survey and case study for cybersecurity . . . . 26--90 John F. Dooley Review of \booktitleFrom the Ground Up by Betsy Rohaly Smoot . . . . . . . . . 91--94 John F. Dooley Review of \booktitleThe Puzzle Master by Danielle Trussoni . . . . . . . . . . . 95--96
Beáta Megyesi and Crina Tudor and Benedek Láng and Anna Lehofer and Nils Kopal and Karl de Leeuw and Michelle Waldispühl Keys with nomenclatures in the early modern Europe . . . . . . . . . . . . . 97--139 Wolfgang Killmann On security aspects of the ciphers T-310 and SKS with approved long-term keys . . 140--172 P. R. Mishra and Arvind Kumar and S. K. Pal and Odelu Ojjela Bit inclusion test: an enhanced avalanche test for stream ciphers . . . 173--192
Eugen Antal The origin of military cryptanalysis in Czechoslovakia . . . . . . . . . . . . . 193--218 Elena Almaraz Luengo Statistical tests suites analysis methods. Cryptographic recommendations 219--251 Philip Marks Review of \booktitleBehind the Enigma by John Ferris . . . . . . . . . . . . . . 252--281 Chris Christensen Review of \booktitle100 People You Never Knew Were at Bletchley Park by Sinclair McKay . . . . . . . . . . . . . . . . . 282--284 Chris Christensen Review of \booktitleNo More Secrets: My Part in Codebreaking at Bletchley Park and the Pentagon by Betty Webb . . . . . 285--288 Anonymous The Immortal David Kahn . . . . . . . . 289--289
Anindya Kumar Biswas and Mou Dasgupta and Sangram Ray Cryptanalysis and improvement of Q. Peng et al.'s PVSS scheme . . . . . . . . . . 291--304 Torsten Timm and Andreas Schinner The Voynich manuscript: discussion of text creation hypotheses . . . . . . . . 305--322 Kamwa Djomou Franck Rivel and Fouotsa Emmanuel and Tadmon Calvin Expanded low-rank parity-check codes and their application to cryptography . . . 323--351 Tomi S. Melka and Robert M. Schoch Review of \booktitleRongorongo: Inscribed Objects from Rapa Nui . . . . 352--380 John F. Dooley Review of \booktitleThe Enigma Affair by Charlie Lovett . . . . . . . . . . . . . 381--383 Elonka Dunin and Klaus Schmeh Review of the second edition of Craig Bauer's ``\booktitleSecret History: The Story of Cryptology, Second Edition'' 384--386
Wayne S. Chan Breaking the Silk Dress cryptogram . . . 387--426 Thomas Larsen Leo Marks' ``mental one-time pad'': an experimental cipher for British special operations in World War II . . . . . . . 427--436 Dimpy Chauhan and Indivar Gupta and P. R. Mishra and Rashmi Verma An ultra-lightweight block cipher with string transformations . . . . . . . . . 437--468 Chris Christensen Review of \booktitleThe Bletchley Park Codebreakers in their own words by Joel Greenberg . . . . . . . . . . . . . . . 469--473 Chris Christensen Review of \booktitleThe First Enigma Codebreaker: The Untold Story of Marian Rejewski Who Passed the Baton to Alan Turing . . . . . . . . . . . . . . . . . 474--478 Chris Christensen Review of \booktitleQueen of Codes: The Secret Life of Emily Anderson, Britain's Greatest Female Codebreaker by Jackie Uí Chionna . . . . . . . . . . . . . . . . 479--482
Jean-Charles Foucrier Why the French military cryptanalysis failed to break Enigma . . . . . . . . . 483--505 M. R. Oberman The undisclosed history of the Dutch governmental telex-message security 1945--1960 . . . . . . . . . . . . . . . 506--518 Chris Christensen The Japanese Green Machine . . . . . . . 519--557 Christian Millichap and Yeeka Yau and Alyssa Pate and Morgan Carns Modifying twist algorithms for determining the key length of a Vigen\`ere cipher . . . . . . . . . . . 558--573 Chris Christensen Review of \booktitleThe Real Special Relationship by Michael Smith . . . . . 574--578
Santosh Kumar R. and Prakash Klnc and Krishna Srm An improved cryptanalysis of multi-prime RSA with specific forms of decryption exponent . . . . . . . . . . . . . . . . 1--14 Viktor Wase Dorabella unMASCed --- the Dorabella Cipher is not an English or Latin Mono-Alphabetical Substitution Cipher 15--24 Chris Christensen and Sandy Zabell and Conner Ernst and Hanna Schmitt and Matthew Henn T. R. Hollcroft's Problem . . . . . . . 25--59 Pavithra Gurushankar and Kunwar Singh Decentralized universally verifiable stake voting system with perfect privacy 60--90 Chris Christensen Review of \booktitleArctic Convoys by David Kenyon . . . . . . . . . . . . . . 91--93 Christian Millichap Review of the expanded edition of \booktitleCodebreaking: A Practical Guide by Elonka Dunin and Klaus Schmeh 94--96
R. Erskine Cipher A. Deavours, David Kahn, Louis Kruh, Greg Mellen, Brian J. Winkel (eds.), Selections from Cryptologia: History, People and Technology . . . . . 247
Peggy Aldrich Kidwell Departments --- Reviews --- Electronic Genie Rescuing Prometheus; Forbes' Greatest Technology Stories; Information Ages; The Mathematical Theory of Communication; LEO: The Incredible Story of the World's First Business; Computer Architects of the Information Society; Cryptologia; The Supply of Information Technology Workers in the US . . . . . . 81--84
Anonymous Departments: For Your Information: Proof Playright Wins Pulitzer; Call for Mathematician Mentors; 45th Reunion Conference for Ross Program; Undergraduate Paper Competitions in Cryptologia; Volunteers Sought for AWM Essay Contest; Corrections . . . . . . . 607--608
Anonymous Alec Dakin: codebreaker who was among the first at Bletchley Park to see the news that Hitler was dead . . . . . . . 1