Загрузка страницы

Break an Encrypted Postcard from 1907

#cryptology, #cryptography, #cryptanalysis

In this video, I cryptanalyze an encrypted postcard sent in 1907. I saw the postcard in a blog post by Klaus Schmeh on his blog in July 2020. Here, I first make my own transcription of the postcard. Then, I check if the sender used a monoalphabetic or a polyalphabetic encryption. Finally, I break the ciphertext with the monoalphabetic substitution analyzer.

You may also try to cryptanalyze it on your own. To make it easier for you, I put my transcription at the end of the video description here. The transcription may have some errors, so you might want to correct it or even make your own one :-)

For details on the postcard, you should have a look at Klaus Schmeh's blog post. Here is the original blog article of Klaus Schmeh: https://scienceblogs.de/klausis-krypto-kolumne/2020/07/31/an-encrypted-postcard-from-1907/

If you are interested in learning the basics of cryptology, you should also have a look at our video series about basics of cryptology – also for beginners: https://youtu.be/jbumW7Ym03o

You may download the latest version of CrypTool 2 from here: https://www.cryptool.org/en/ct2/downloads

The two pictures of the thumbnail were taken from Klau Schmeh's blog article :-)

Here is my final transcription:
YZ12PD 24 VT6RY

2WRY1O YRRV OW
IR VZ94 2T33RQR19R T1
O4TY OWB1 IROBRR1 YZ12PD
P12 BRRU2PD SWW2 1TS4O
2PQ6T1S DWZQ WB1 3QR2

VD 2RPQ 6TOO6R BT3R B4R1 BR
BWUR ZG PO 1WQBT94 O4TY
VWQ1T1S TO BPY YOT66 QPT1T1S
IZO TO 96RPQR2 W33 2ZQT1S O4R
VWQ1T1S P12 BR YOPQOR2 3WQ
4RQR P3ORQ 2T11RQ O4R AT66PSRY
BR GPYYR2 2PQ6T1S BRQR P66
Y4ZO ZG YW T 9WZ62 1WO SRO
P1D VWQR 9PQ2Y IZO O4RQR

Видео Break an Encrypted Postcard from 1907 канала Cryptography for Everybody
Показать
Комментарии отсутствуют
Введите заголовок:

Введите адрес ссылки:

Введите адрес видео с YouTube:

Зарегистрируйтесь или войдите с
Информация о видео
13 сентября 2020 г. 20:27:24
00:10:53
Другие видео канала
Zodiac Killer Ciphers – Let's have a Look at Unicity Distances With ExcelZodiac Killer Ciphers – Let's have a Look at Unicity Distances With Excel04 - Internationalization of the Component (CrypTool 2 Development Series)04 - Internationalization of the Component (CrypTool 2 Development Series)My Cryptologic Highlights of 2020My Cryptologic Highlights of 2020Crypto Challenge Contest – Video 1Crypto Challenge Contest – Video 1Basics of Cryptology – Part 2 (Cryptanalysis – Terminology & Classical Ciphers)Basics of Cryptology – Part 2 (Cryptanalysis – Terminology & Classical Ciphers)Enigma Machine – Part 1 of 2 – How does it work?Enigma Machine – Part 1 of 2 – How does it work?Basics of Cryptology – Part 20 (Cryptanalysis – Cost & Fitness Functions - Language Models)Basics of Cryptology – Part 20 (Cryptanalysis – Cost & Fitness Functions - Language Models)Digital File Signatures – How Do They Protect Your Computer?Digital File Signatures – How Do They Protect Your Computer?Basics of Cryptology – Part 22 (Cryptography – Kerckhoffs' Principle & Modern Cryptographic Goals)Basics of Cryptology – Part 22 (Cryptography – Kerckhoffs' Principle & Modern Cryptographic Goals)Let's Decipher a Letter of the Silent Film Star Mary Miles Minter That Lead to a ScandalLet's Decipher a Letter of the Silent Film Star Mary Miles Minter That Lead to a ScandalBasics of Cryptology – Part 9 (Modern Cryptography – Block Ciphers – Feistel Ciphers & SDES)Basics of Cryptology – Part 9 (Modern Cryptography – Block Ciphers – Feistel Ciphers & SDES)The Straddling Checkerboard Cipher ExplainedThe Straddling Checkerboard Cipher ExplainedLet's Decipher Two Encrypted English Postcards – Secret Messages From the Past RevealedLet's Decipher Two Encrypted English Postcards – Secret Messages From the Past RevealedBasics of Cryptology – Part 23 (Cryptography – Modern Hybrid Encryption)Basics of Cryptology – Part 23 (Cryptography – Modern Hybrid Encryption)Break an Encrypted Letter of a Child KillerBreak an Encrypted Letter of a Child KillerBasics of Cryptology – Part 17 (Cryptography/Cryptanalysis – Keyspace and Keyspace Size)Basics of Cryptology – Part 17 (Cryptography/Cryptanalysis – Keyspace and Keyspace Size)An Encrypted Description of a Secret Magic Machine in an 18th Century Alchemy BookAn Encrypted Description of a Secret Magic Machine in an 18th Century Alchemy BookLet's Program a Hash Preimage Searcher to Break PasswordsLet's Program a Hash Preimage Searcher to Break PasswordsBasics of Cryptology – Part 14 (Modern Cryptography – Passwords)Basics of Cryptology – Part 14 (Modern Cryptography – Passwords)The Trithemius Cipher and the Tabula Recta – Let's Create and Break ThemThe Trithemius Cipher and the Tabula Recta – Let's Create and Break ThemA Musical Cipher Challenge – End of 2021 – Win a Crypto BookA Musical Cipher Challenge – End of 2021 – Win a Crypto Book
Яндекс.Метрика