How a 1674 Encrypted Letter Traveled 10,000 km
#cryptology, #cryptography, #cryptanalysis
In this video, we discover the story of a 1674 Dutch East India Company encrypted letter. Carried by a secretary of the VOC over 10,000 km and sent from Ceylon, it contained vital military and trade plans. We were able to decrypt its content easily and wrote a paper and an article about that. In this video, I present the story behind the letter, the ciphertext and cipher itself and of course its decryption.
Literature mentioned in the video:
[1] Dinnissen , J., & Kopal, N. Island Ramanacoil a Bridge too Far. A Dutch Ciphertext from 1674. In International Conference on Historical Cryptology (pp. 48 57). 2021.
[2] Kopal , N. & Dinnissen, J. Konzerngeheimnisse – Entschlüsselt: Ein Brief der Niederländischen Ostindien- Kompanie . c't 16/2022 p. 130
[3] Record 1564 in the DECODE database: “The Ramanacoil Transcript”.https://de-crypt.org/decrypt-web/RecordsView/1564
If you are interested in learning the fundaments of cryptology, let me invite you to have a look at our video series about the basics of cryptology, also for beginners: https://youtu.be/jbumW7Ym03o
You can download the latest version of CrypTool 2 from here: https://www.cryptool.org/en/ct2/downloads
Visit my blog: https://www.kopaldev.de
Join Discord server: https://discord.gg/8JeTZd8EpT
Видео How a 1674 Encrypted Letter Traveled 10,000 km канала Cryptography for Everybody
In this video, we discover the story of a 1674 Dutch East India Company encrypted letter. Carried by a secretary of the VOC over 10,000 km and sent from Ceylon, it contained vital military and trade plans. We were able to decrypt its content easily and wrote a paper and an article about that. In this video, I present the story behind the letter, the ciphertext and cipher itself and of course its decryption.
Literature mentioned in the video:
[1] Dinnissen , J., & Kopal, N. Island Ramanacoil a Bridge too Far. A Dutch Ciphertext from 1674. In International Conference on Historical Cryptology (pp. 48 57). 2021.
[2] Kopal , N. & Dinnissen, J. Konzerngeheimnisse – Entschlüsselt: Ein Brief der Niederländischen Ostindien- Kompanie . c't 16/2022 p. 130
[3] Record 1564 in the DECODE database: “The Ramanacoil Transcript”.https://de-crypt.org/decrypt-web/RecordsView/1564
If you are interested in learning the fundaments of cryptology, let me invite you to have a look at our video series about the basics of cryptology, also for beginners: https://youtu.be/jbumW7Ym03o
You can download the latest version of CrypTool 2 from here: https://www.cryptool.org/en/ct2/downloads
Visit my blog: https://www.kopaldev.de
Join Discord server: https://discord.gg/8JeTZd8EpT
Видео How a 1674 Encrypted Letter Traveled 10,000 km канала Cryptography for Everybody
Показать
Комментарии отсутствуют
Информация о видео
9 декабря 2023 г. 23:27:27
00:18:48
Другие видео канала
Zodiac Killer Ciphers – Let's have a Look at Unicity Distances With Excel10 - Automatic Translation of CrypTool 2 To a New Language04 - Internationalization of the Component (CrypTool 2 Development Series)My Cryptologic Highlights of 2020Crypto Challenge Contest – Video 1Basics of Cryptology – Part 2 (Cryptanalysis – Terminology & Classical Ciphers)Enigma Machine – Part 1 of 2 – How does it work?Basics of Cryptology – Part 20 (Cryptanalysis – Cost & Fitness Functions - Language Models)Digital File Signatures – How Do They Protect Your Computer?What is New in the CrypTool 2 Release 2020.1?Basics of Cryptology – Part 22 (Cryptography – Kerckhoffs' Principle & Modern Cryptographic Goals)Let's Decipher a Letter of the Silent Film Star Mary Miles Minter That Lead to a ScandalBasics of Cryptology – Part 9 (Modern Cryptography – Block Ciphers – Feistel Ciphers & SDES)The Straddling Checkerboard Cipher ExplainedLet's Decipher Two Encrypted English Postcards – Secret Messages From the Past RevealedLet's Break My Self-Made Cryptographic Challenges From HistoCrypt 2019Basics of Cryptology – Part 23 (Cryptography – Modern Hybrid Encryption)Basics of Cryptology – Part 17 (Cryptography/Cryptanalysis – Keyspace and Keyspace Size)An Encrypted Description of a Secret Magic Machine in an 18th Century Alchemy BookLet's Program a Hash Preimage Searcher to Break PasswordsBasics of Cryptology – Part 14 (Modern Cryptography – Passwords)