Solving the Double Transposition Challenge with a Divide-and-Conquer Approach

被引:12
|
作者
Lasry, George
Kopal, Nils [1 ]
Wacker, Arno [1 ,2 ]
机构
[1] Univ Kassel, Res Grp Appl Informat Secur AIS, Kassel, Germany
[2] Univ Kassel, Kassel, Germany
关键词
challenge; columnar transposition; cryptanalysis; dictionary attack; Doppelwurfel; double transposition; hill climbing; manual ciphers; unsolved ciphers;
D O I
10.1080/01611194.2014.915269
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The double transposition cipher was considered to be one of the most secure types of manual ciphers. It was extensively used in both World Wars and during the Cold War. In 1999, Otto Leiberich, the former head of the German federal office for information security, suggested that a double transposition challenge be published with specific parameters designed to ensure its security. Such a challenge was published by Klaus Schmeh in 2007. In November 2013, the authors solved the challenge using a ciphertext-only hill climbing attack. They also solved the challenge using a dictionary attack. In this article, they describe both methods, which are based on a "divide-and-conquer'' approach. They additionally discuss the impact of their solutions with respect to the general security of the double transposition cipher.
引用
收藏
页码:197 / 214
页数:18
相关论文
共 50 条
  • [1] A Divide-and-Conquer Approach for Solving Interval Algebra Networks
    Li, Jason Jingshi
    Huang, Jinbo
    Renz, Jochen
    21ST INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE (IJCAI-09), PROCEEDINGS, 2009, : 572 - 577
  • [2] Divide-and-conquer Jigsaw Puzzle Solving
    Shih, Huang-Chia
    Lu, Chien-Liang
    2018 IEEE INTERNATIONAL CONFERENCE ON VISUAL COMMUNICATIONS AND IMAGE PROCESSING (IEEE VCIP), 2018,
  • [3] Divide-and-conquer approach for solving singular value decomposition based on MapReduce
    Zhao, Shuoyi
    Li, Ruixuan
    Tian, Wenlong
    Xiao, Weijun
    Dong, Xinhua
    Liao, Dongjie
    Khan, Samee U.
    Li, Keqin
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (02): : 331 - 350
  • [4] DIVIDE-AND-CONQUER
    JEFFRIES, T
    BYTE, 1993, 18 (03): : 187 - &
  • [5] DIVIDE-AND-CONQUER
    SAWYER, P
    CHEMICAL ENGINEER-LONDON, 1990, (484): : 36 - 38
  • [6] DIVIDE-AND-CONQUER
    WRIGHT, DP
    SCOFIELD, CL
    BYTE, 1991, 16 (04): : 207 - 210
  • [7] DIVIDE-AND-CONQUER
    GEORGHIOU, C
    FIBONACCI QUARTERLY, 1992, 30 (03): : 284 - 285
  • [8] A divide-and-conquer approach to evolvable hardware
    Torresen, J
    EVOLVABLE SYSTEMS: FROM BIOLOGY TO HARDWARE, 1998, 1478 : 57 - 65
  • [9] A divide-and-conquer approach to fragment assembly
    Otu, HH
    Sayood, K
    BIOINFORMATICS, 2003, 19 (01) : 22 - 29
  • [10] DIVIDE-AND-CONQUER
    LEWIS, R
    CHEMISTRY IN BRITAIN, 1992, 28 (12) : 1092 - 1093