Göm menyn

Proceedings of the 1st International Conference on Historical Cryptology HistoCrypt 2018
Beáta Megyesi: Uppsala University, Sweden
No. of pages:
Linköping Electronic Conference Proceedings
ISSN (print):
ISSN (online):
Linköping University Electronic Press, Linköpings universitet

We are very pleased to introduce the proceedings of the International Conference on Historical Cryptology (HISTOCRYPT 2018), held at the Department of Linguistics and Philology on the English Park Campus, Uppsala University, Sweden, between June 18 and 20, 2018.

HISTOCRYPT addresses all aspects of historical cryptology/cryptography including work in closely related disciplines (such as history, history of ideas, computer science, AI, computational linguistics, linguistics, or image processing) with relevance to historical ciphertexts and codes. The subjects of the conference include, but are not limited to the use of cryptography in military, diplomacy, business, and other areas, analysis of historical ciphers with the help of modern computerized methods, unsolved historical cryptograms, the Enigma and other encryption machines, the history of modern (computer-based) cryptography, linguistic aspects of cryptology, the influence of cryptography on the course of history, or teaching and promoting cryptology in schools, universities, and the public.

HISTOCRYPT represents a continuation of the friendly events of European Historical Ciphers Colloquiums (EuroHCC) held in Heusenstamm (2012), Kassel (2016), and Smolenice (2017) to discuss on-going research in historical cryptology in Europe. Considering EuroHCC’s growing popularity among the crypto-historians and cryptographers and the established HICRYPT network on historical cryptology with over 90 members from 20 countries around the world, our aim is to establish HISTOCRYPT as an annual, world-wide event. The first event in the series takes place in 2018 at Uppsala University, Sweden. We are very happy that the conference has been internationally recognized outside Europe as well, and submissions are received from all over the world. It is a great honor to serve as the Program Chair for HISTOCRYPT 2018, to be held in Uppsala for the first time.

The scientific program was carefully planned by an international scientific program committee, consisting of researchers in cryptology, history, intelligence and language technology. The program committee invited paper submissions in two distinct tracks: regular papers up to 10 pages on substantial, original, and unpublished research, including empirical evaluation results, where appropriate; short papers up to 4 pages on smaller, focused contributions, work in progress, negative results, surveys, tutorials, or opinion pieces; or summarizing a software system to be accompanied by a live demonstration at the conference.

The conference received 24 submissions from all over Europe (Czechia, Denmark, France, Germany, Hungary, Italy, Netherlands, Poland, Slovakia, Sweden, and the UK) as well as from Ghana, Israel, New Zealand, Russia, the United States, and Uruguay.

Our primary goal in the program committee was to achieve a high quality program using a double-blind, rigorous review process. All papers were reviewed by at least three experts invited by the program committee members for reviewing. After discussion among the reviewers to synchronize recommendations, the final selection of the papers was made by the program committee. The decision was not an easy task due to many submissions with high scores and overall positive reviews, and the time and space constraints of the two day long main conference. Our goal was to include papers dealing with a wide variety of topics from various scientific areas of relevance to historical cryptology. We aimed at achieving balance between regular and short papers, and chose to accept papers—being regular or short—with high scores as oral talks, while we were more lenient with poster presentations. 66% of the regular papers and 33% of the short papers were accepted for oral presentations, while 22% of the regular papers and 50% of the short papers were accepted as posters and/or demos. In the final program, there are 16 regular, and 5 short papers, all collected in this volume, thematically structured, in the same order as they are presented during the conference.

In addition to the accepted papers, we are proud to present six invited keynote speakers, distinguished researchers from France, Germany, Israel, and the US. They cover different areas of the conference. Craig Bauer (York College of Pennsylvania) presents highlights from his book on the world’s greatest ciphers. Katherine Ellison (Illinois State University) talks about the central role of cryptology in the history of reading. Rémi Géraud tells us about his and David Naccache’s work (Ècole normale supérieure) on a French code from the late 19th century. Ephraim Lapid (Bar-Ilan University and IDC Herzliya) presents the thrilling story behind the British “Israeli Enigma”.

Given the location of HISTOCRYPT at Uppsala University, special attention is given to the heritage of Prof. Arne Beurling and his role in breaking the German teletype ciphers. Therefore, we invited Kjell-Ove Widman, professor emeritus in applied mathematics (University of Linköping) to talk about Arne Beurling as a mathematician and code breaker, and George Lasry (University of Kassel) to tell us about his very new methods to solve the “completely hopeless” T52, which Arne Beurling worked on and which can be found in the archives of the Swedish National Defence Radio Establishment (FRA). And in connection to the poster and demo session, we organize an exhibition to show four Enigma machines, usually hidden in the FRA archive.

Lastly, the conference program also includes two workshops, organized by their own committees. The workshop on (Automated) Cryptanalysis of Classical Ciphers with CrypTool 2 demonstrates the open-source e-learning tool consisting of several classical and modern cryptographic algorithms where participants can learn and practice how to use CrypTool. The workshop Solving codes rather than ciphers. Is there a software challenge? focuses on the fascinating codes, encrypted messages word by word, aiming at finding solutions for breaking these.

These proceedings will provide a permanent record of the program. The conference proceedings are published by the Northern European Association for Language Technology (NEALT) Proceedings Series by Linköping University Electronic Press, as freely available Gold Open Access. The proceedings are indexed in the DBLP computer science bibliography and also published in the anthology of the Association of Computational Linguistics (ACL Anthology) in parallel.

Organizing a conference with an interesting and diverse program in a highly crossdisciplinary field is far from easy and relies on the goodwill of many researchers involved in the various scientific areas, all with their own traditions. I would like to express my gratitude and appreciation to my great fellows on the program committee for their invaluable work, for fruitful discussions, and for sharing the effort of creating the program. A special thank goes to the steering committee, especially Arno Wacker, for his support and generous advice. I would also like to record my appreciation for the work of the 23 reviewers and 4 subreviewers for their time and effort to contribute to the reviewing, give constructive and collegial feedback, and help the program committee in the selection of papers. Wholehearted thanks go to the six keynote speakers, and the workshop organizers, as well as Anders H.Wik and Åsa Ljungqvist for bringing to light the Enigma machines and arranging the exhibition in connection to the demo session. I would also like to thank all authors without whom this conference would not have taken place! Nils Blomqvist deserves a huge and special thank for professionally serving as the proceedings co-manager. My greatest debt goes to the local organization, Eva Pettersson, for carrying the burden of the local organization, and Bengt Dahlqvist, for helping out with the on-line registration and the conference website. We are also extremely pleased to have received generous sponsorship from the Swedish Foundation for Humanities and Social Sciences allowing free registration and covered accommodation and travel costs for many conference participants. Lastly, I am grateful to my nearest and dearest—my twins, bonus kids, and partner—for generously giving me the space to disappear into our world of hidden secrets from the past.

I wish you all a fruitful conference and hope you will enjoy HISTOCRYPT 2018!

Beáta Megyesi (Program Chair)

Proceedings of the 1st International Conference on Historical Cryptology HistoCrypt 2018

Craig Bauer
Invited Talk: Updates on the World’s Greatest Unsolved Ciphers
[Abstract and Fulltext]

Katherine Ellison
Invited Talk: Cryptology and the Fantasy of Reading
[Abstract and Fulltext]

David Naccache, Rémi Géraud
Invited Talk: A French Code from the Late 19th Century
[Abstract and Fulltext]

Ephraim Lapid
Invited Talk: The Israeli Enigma
[Abstract and Fulltext]

Kjell-Ove Widman
Invited Talk - Special Session on Arne Beurling: Arne Beurling: Mathematician and Code Breaker
[Abstract and Fulltext]

George Lasry
Invited Talk - Special Session on Arne Beurling: Modern Codebreaking of T52
[Abstract and Fulltext]

Ekaterina Domnina
Nicodemo Tranchedini’s Diplomatic Cipher: New Evidence
[Abstract and Fulltext]

Camille Desenclos
Unsealing the Secret: Rebuilding the Renaissance French Cryptographic Sources (1530-1630)
[Abstract and Fulltext]

Juan José Cabezas, Joachim von zur Gathen, Jorge Tiscornia
Uruguayan Cryptographic Carpet
[Abstract and Fulltext]

Nils Kopal
Solving Classical Ciphers with CrypTool 2
[Abstract and Fulltext]

Mark Stamp, Fabio Di Troia, Miles Stamp, Jasper Huang
Hidden Markov Models for Vigenère Cryptanalysis
[Abstract and Fulltext]

Karl de Leeuw
The Solving of a Fleissner Grille during an Exercise by the Royal Netherlands Army in 1913
[Abstract and Fulltext]

George Lasry
Deciphering German Diplomatic and Naval Attaché Messages from 1914-1915
[Abstract and Fulltext]

Ingo Niebel
Learning Cryptanalysis the Hard Way: A Study on German Culture of Cryptology in World War I
[Abstract and Fulltext]

Paolo Bonavoglia
New Findings in a WWI Notebook of Luigi Sacco
[Abstract and Fulltext]

Anders Wik
The First Classical Enigmas. Swedish Views on Enigma Development 1924-1930
[Abstract and Fulltext]

Marek Grajek
An Inventory of Early Inter-Allied Enigma Cooperation
[Abstract and Fulltext]

Dermot Turing
The Poles and Enigma after 1940: le voile se lève-t-il?
[Abstract and Fulltext]

Magnus Ekhall, Fredrik Hallenberg
US Navy Cryptanalytic Bombe - A Theory of Operation and Computer Simulation
[Abstract and Fulltext]

Carola Dahlke
What We Know About Cipher Device “Schlüsselgerät SG-41” so Far
[Abstract and Fulltext]

Noor R. Al-Kazaz, Sean A. Irvine, William J. Teahan
An Automatic Cryptanalysis of Playfair Ciphers Using Compression
[Abstract and Fulltext]

Eugen Antal, Pavol Zajac
ManuLab System Demonstration
[Abstract and Fulltext]

Niels O. Faurholt
Willard’s System
[Abstract and Fulltext]

Anna Lehofer
The Application of Hierarchical Clustering to Homophonic Ciphers
[Abstract and Fulltext]

Michal Musílek, Štepán Hubálovský
Teaching and Promoting Cryptology at Faculty of Science, University of Hradec Králové
[Abstract and Fulltext]

Klaus Schmeh
Examining The Dorabella Cipher with Three Lesser-Known Cryptanalysis Methods
[Abstract and Fulltext]

Jaap van Tuyll
Design and Strength of a Feasible Electronic Ciphermachine from the 1970s
[Abstract and Fulltext]

Proceedings of the 1st International Conference on Historical Cryptology HistoCrypt 2018

Beáta Megyesi
Proceedings of the 1st International Conference on Historical Cryptology HistoCrypt 2018
Note: the following are taken directly from CrossRef
No citations available at the moment

Responsible for this page: Peter Berkesand
Last updated: 2019-11-06