X-Nico

3 unusual facts about Cipher


Cipher

David A. King, The ciphers of the monks - A forgotten number notation of the Middle Ages, Stuttgart: Franz Steiner, 2001 (ISBN 3-515-07640-9)

Abraham Sinkov, Elementary Cryptanalysis: A Mathematical Approach, Mathematical Association of America, 1966.

Ralph Vibert

During the War he served as a cypher instructor with the Special Operations Executive (SOE) in Beaulieu, New Forest before being promoted to Chief instructor of Force 136, the Asian outpost of the SOE in India.


Ace Combat Zero: The Belkan War

After this engagement, Cipher and PJ go off to destroy Avalon Dam, which houses an experimental V2 superweapon which a "A World With No Boundaries" plans to use to erase the borders in the world.

Alberti

Alberti cipher, an early polyalphabetic cipher (late 15th century)

Arthur Scherbius

Arthur Scherbius (20 October 1878 – 13 May 1929) was a German electrical engineer who patented an invention for a mechanical cipher machine, later sold as the Enigma machine.

AVA Radio Company

Władysław Kozaczuk, Enigma: How the German Machine Cipher Was Broken, and How It Was Read by the Allies in World War Two, edited and translated by Christopher Kasparek, Frederick, MD, University Publications of America, 1984, ISBN 0-89093-547-5.

BackupHDDVD

The utility circumvents content protection by decrypting video files directly with AES, the underling cryptographic cipher used by AACS.

Beaufort cipher

The Beaufort cipher, created by Sir Francis Beaufort, is a substitution cipher similar to the Vigenère cipher, with a slightly modified enciphering mechanism and tableau.

BS4

Biuro Szyfrów 4, the German section of the Polish Cipher Bureau

C. Lorenz AG

Placed on the commercial market as the Enigma machine, it was adopted by the German Navy and Army in the 1920s The Enigma, however had deficiencies, and the German Army High Command asked Lorenz to develop a new cipher machine that would allow communication by radio in extreme secrecy.

Called the Schlüsselzusatz (cipher attachment), the Lorenz cipher was an in-line addition to their standard teleprinter.

Colin Grazier

Able Seaman Colin Grazier, GC was posthumously awarded the George Cross for the "outstanding bravery and steadfast devotion to duty in the face of danger" which he displayed on 30 October 1942 in action in the eastern Mediterranean when capturing codebooks vital for the breaking of the German naval "Shark" Enigma cipher from the sinking U-559.

Crypto AG

With headquarters in Steinhausen, the company is a long-established manufacturer of encryption machines and a wide variety of cipher devices.

CyaSSL

CTaoCrypt Provides RSA, DSS, Diffie–Hellman, EDH, NTRU, DES, Triple DES, AES (CBC, CTR, CCM, GCM), Camellia, ARC4, HC-128, MD2, MD4, MD5, SHA-1, SHA-2, BLAKE2, RIPEMD-160, Random Number Generation, Large Integer support, and base 16/64 encoding/decoding.

Étienne Bazeries

Candela, Rosario, The Military Cipher of Commandant Bazeries.

Feistel cipher

For example, MISTY1 is a Feistel cipher using a three-round Feistel network in its round function, Skipjack is a modified Feistel cipher using a Feistel network in its G permutation, and Threefish (part of Skein) is a non-Feistel block cipher that uses a Feistel-like MIX function.

Good–Turing frequency estimation

Good–Turing frequency estimation was developed by Alan Turing and his assistant I. J. Good as part of their efforts at Bletchley Park to crack German ciphers for the Enigma machine during World War II.

Gregory of Nazianzus

"'Religion' as the Cipher for Identity: The Cases of Emperor Julian, Libanius, and Gregory Nazianzus," Harvard Theological Review 93.4 (2000): 373–400.

Hans-Thilo Schmidt

Władysław Kozaczuk, Enigma: How the German Machine Cipher Was Broken, and How It Was Read by the Allies in World War Two, edited and translated by Christopher Kasparek, Frederick, MD, University Publications of America, 1984.

Henri Braquenié

Władysław Kozaczuk, Enigma: How the German Machine Cipher Was Broken, and How It Was Read by the Allies in World War Two, edited and translated by Christopher Kasparek, Frederick, MD, University Publications of America, 1984, pp.

Herbert Yardley

When Henry L. Stimson, Secretary of State under President Herbert Hoover, found out about Yardley and the Cipher Bureau, he was furious and withdrew funding, summing up his argument with "Gentlemen do not read each other's mail".

Japanese cryptology from the 1500s to Meiji

The cipher system that Uesugi used is basically a simple substitution usually known as a Polybius square or “checkerboard.”

Jerzy Różycki

Władysław Kozaczuk, Enigma: How the German Machine Cipher Was Broken, and How It Was Read by the Allies in World War II, edited and translated by Christopher Kasparek, Frederick, MD, University Publications of America, 1984.

Juliette Dodu

Guy Breton also lays out the inconsistencies of this eventful narrative; among others, that the Prussians had already quit Pithiviers three weeks before the related deeds, and the impossibility of collecting by sound a cipher message in German and passing the retransmission in Morse afterwards without error.

Keith Batey

During 1943, Batey broke the Enigma ciphers of the Sicherheitsdienst, the Nazi party's intelligence service, along with the cipher used by Italian military attachés in Berlin.

M-209

The M-209 was designed by Swedish cryptographer Boris Hagelin in response to a request for such a portable cipher machine, and was an improvement of an earlier machine, the C-36.

Matt Robshaw

Robshaw's notable work includes the cryptanalysis of a number of cryptographic primitives, including the extension of linear cryptanalysis to use multiple approximations, and the design of the block ciphers Crab and RC6.

Ottico Meccanica Italiana

OMI produced the OMI cryptograph, a cipher machine similar to the more famous German Enigma.

Pokémon Colosseum

Inside a nearby building, a Cipher Peon is about to present the Shadow Pokémon prize, but another one recognizes Wes.

PolyEdit

PolyEdit can compress and encrypt documents saved in its native Enhanced Text Format (*.etf), using the Blowfish and SHA-1 algorithms.

Pyry

Before World War II, Pyry was also the seat of the Polish General Staff's Cipher Bureau, the agency that before the war was the only one in the world to break the German Enigma cipher (beginning in December 1932).

Ravenchase

Ravenchase was named in tribute to Edgar Allan Poe, who lived in Richmond, Virginia for a time and was an avid code and cipher enthusiast, and also a formative influence on popularizing the idea of buried treasure, treasure hunting and mystery.

Robert M. Patterson

Patterson was interested in ciphers and regularly exchanged coded correspondence with Thomas Jefferson.

Sandra and Woo

The strip was mentioned in MTV Geek and discussed in the Cipher Mysteries blog of cryptology expert Nick Pelling as well as Klausis Krypto Kolumne of cryptology expert Klaus Schmeh.

SEED

It also has some resemblance to MISTY1 in the recursiveness of its structure: the 128-bit full cipher is a Feistel network with an F-function operating on 64-bit halves, while the F-function itself is a Feistel network composed of a G-function operating on 32-bit halves.

Stefan Mazurkiewicz

During the Polish-Soviet War (1919-1921), Mazurkiewicz as early as 1919 broke the most common Russian cipher for the Polish General Staff's cryptological agency.

Stream cipher attack

Another situation where recovery is trivial is if traffic-flow security measures have each station sending a continuous stream of cipher bits, with null characters (e.g. LTRS in Baudot) being sent when there is no real traffic.

Thomas Knowlton

A month before the outbreak of World War II, in late July 1939, Rejewski and his Cipher Bureau colleagues and superiors, at an official Warsaw conference, initiated French and British military cryptologists into their techniques and technology and gave each of their western allies a German Enigma machine that they had reconstructed.

Tony Fasson

He was posthumously awarded the George Cross "for outstanding bravery and steadfast devotion to duty in the face of danger" when on 30 October 1942 in action in the Mediterranean Sea he captured codebooks vital for the breaking of the German naval "Shark" Enigma cipher from the sinking U-559.

Vigenère

The Vigenère cipher, a cipher whose invention was later misattributed to Vigenère

Wadsworth's cipher

Wadsworth's cipher was a cipher invented by Decius Wadsworth, a Colonel in the Ordnance Corps of the United States Army.

Wilfred Dunderdale

Kozaczuk, Władysław, Enigma: How the German Machine Cipher Was Broken, and How It Was Read by the Allies in World War Two, edited and translated by Christopher Kasparek, Frederick, MD, University Publications of America, 1984, ISBN 0-89093-547-5.


see also