Changeset 197


Ignore:
Timestamp:
Jan 9, 2009, 9:57:32 PM (13 years ago)
Author:
Thomas Schmid
Message:
  • new setup
Location:
trunk
Files:
1 added
11 edited

Legend:

Unmodified
Added
Removed
  • trunk/CrypCurrentVersionDownload/CurrentVersion.txt

    r194 r197  
    1 version=2.0.3294a(beta)
     1version=2.0.3296a(beta)
  • trunk/CrypCurrentVersionDownload/index.php

    r189 r197  
    22<head>
    33 <meta http-equiv="Content-Type" content="text/html;charset=utf-8">
    4  <meta http-equiv="refresh" content="1; URL=http://cryptool2.vs.uni-due.de/downloads/program/curversion/CrypTool-Setup-v2.0.3294a(beta).msi">
     4 <meta http-equiv="refresh" content="1; URL=http://cryptool2.vs.uni-due.de/downloads/program/curversion/CrypTool-Setup-v2.0.3296a(beta).msi">
    55</head>
    66<body>
  • trunk/CrypPlugins/ADFGVX/DetailedDescription/Description.xaml

    r172 r197  
    11<FlowDocument PagePadding="5,0,5,0" AllowDrop="True" NumberSubstitution.CultureSource="User"
    2                           xmlns="http://schemas.microsoft.com/winfx/2006/xaml/presentation"
    3                           xmlns:x="http://schemas.microsoft.com/winfx/2006/xaml"
    4                           xmlns:misc="clr-namespace:Cryptool.PluginBase.Miscellaneous;assembly=CrypPluginBase"
    5                           Background="White">
     2              xmlns="http://schemas.microsoft.com/winfx/2006/xaml/presentation"
     3                    xmlns:x="http://schemas.microsoft.com/winfx/2006/xaml"
     4                    xmlns:misc="clr-namespace:Cryptool.PluginBase.Miscellaneous;assembly=CrypPluginBase"
     5                    Background="White">
    66   
    7         <Paragraph Margin="0,0,0,0" TextAlignment="Justify" FontFamily="Georgia" FontSize="18.6666666666667">
    8                 <Span FontWeight="Bold" Foreground="#FF15428B" xml:lang="en-us">
    9                 <Span.TextDecorations><TextDecoration Location="Underline" />
    10                 </Span.TextDecorations>ADFGVX Cipher
    11                 </Span>
    12         </Paragraph>
    13  
    14   <Paragraph Margin="0,0,0,0" TextAlignment="Left" FontFamily="Times New Roman" FontSize="16" />
    15  
    16         <Paragraph Margin="0,0,0,0" TextAlignment="Left" FontFamily="Times New Roman" FontSize="16">
    17                 <misc:DescriptionHyperlink NavigateUri="http://en.wikipedia.org/wiki/ADFGVX_cipher">http://en.wikipedia.org/wiki/ADFGVX_cipher</misc:DescriptionHyperlink>
    18         </Paragraph>
    19        
    20         <Paragraph Margin="0,0,0,0" TextAlignment="Left" FontFamily="Times New Roman" FontSize="16" /><Paragraph Margin="0,0,0,0" TextAlignment="Left" FontFamily="Times New Roman" FontSize="16"><Span xml:lang="en-gb" xml:space="preserve">The ADFGVX encoding method was developed by Fritz Nebel, a colonel of the German communications corps, and it was first employed in spring 1918 by the German army. The procedure is an effective </Span><Span FontWeight="Bold" xml:lang="en-gb">two-stage</Span><Run xml:lang="en-gb" xml:space="preserve"> </Run><Run xml:lang="de-de">cascading cipher</Run><Span xml:lang="en-gb">, consisting of a substitution followed by a column transposition. So the whole key of the ADFGVX cipher consists of two partial keys.</Span><Span FontFamily="Times New Roman" FontSize="16" xml:lang="en-gb"><LineBreak /></Span><Span FontFamily="Times New Roman" FontSize="16" xml:lang="en-gb"><LineBreak /></Span><Span xml:lang="en-gb" xml:space="preserve">The plaintext </Span><Span FontWeight="Bold" xml:lang="en-gb">alphabet</Span><Span xml:lang="en-gb"> consists exactly of the letters 'A' to 'Z' and the digits '0' to '9'.</Span><Span FontFamily="Times New Roman" FontSize="16" xml:lang="en-gb"><LineBreak /></Span><Span FontFamily="Times New Roman" FontSize="16" xml:lang="en-gb"><LineBreak /></Span><Span xml:lang="en-gb" xml:space="preserve">The </Span><Span FontWeight="Bold" xml:lang="en-gb">substitution</Span><Span xml:lang="en-gb"> is executed by means of a 6x6-matrix, containing all elements of the alphabet in random order. This order is the substitution key. The rows and columns of the matrix are identified by the letters A, D, F, G, V and X, which make up the ciphertext alphabet.</Span><Span FontFamily="Times New Roman" FontSize="16" xml:lang="en-gb"><LineBreak /></Span><Span FontFamily="Times New Roman" FontSize="16" xml:lang="en-gb"><LineBreak /></Span><Span xml:lang="en-gb" xml:space="preserve">The </Span><Span FontWeight="Bold" xml:lang="en-gb">first encryption stage (substitution)</Span><Span xml:lang="en-gb"> determines the position of each plaintext letter within the matrix and replaces it by its row- and column-indicator pair. This way, every plaintext letter is replaced by two ciphertext letters.</Span><Span FontFamily="Times New Roman" FontSize="16" xml:lang="en-gb"><LineBreak /></Span><Span FontFamily="Times New Roman" FontSize="16" xml:lang="en-gb"><LineBreak /></Span><Span xml:lang="en-gb" xml:space="preserve">During the </Span><Span FontWeight="Bold" xml:lang="en-gb">second encryption stage (transposition)</Span><Span xml:lang="en-gb"> the ciphertext generated in the first stage is further encoded by means of a single column transposition. The basis of this transposition is the transposition password, which must consist exclusively of the letters 'A' to 'Z'; redundant characters are not allowed. Thus, the password length is restricted to a maximum of 26 characters.</Span><Span FontFamily="Times New Roman" FontSize="16" xml:lang="en-gb"><LineBreak /></Span><Span FontFamily="Times New Roman" FontSize="16" xml:lang="en-gb"><LineBreak /></Span><Span xml:lang="en-gb">The transposition password forms the second part of the ADFGVX key. The transposition again is realized through a matrix. The first row is filled with the transposition password, which determines the number of columns. The stage 1 ciphertext is then written into the matrix line by line. Now the columns of the matrix are swapped in such a way, that the letters of the transposition password are arranged in alphabetical order. Finally, the stage 2 ciphertext is extracted from the matrix column by column.</Span><Span FontFamily="Times New Roman" FontSize="16" xml:lang="en-gb"><LineBreak /></Span><Span FontFamily="Times New Roman" FontSize="16" xml:lang="en-gb"><LineBreak /></Span><Run xml:lang="en-gb">The security of this cipher is based on the fact that the two ciphertext letters substituting every plaintext letter are separated by the transposition, making a frequency analysis of the bigrams useless.</Run>
    21         </Paragraph>
     7    <Paragraph Margin="0,0,0,0" TextAlignment="Justify" FontFamily="Georgia" FontSize="18.6666666666667">
     8        <Span FontWeight="Bold" Foreground="#FF15428B" xml:lang="en-us">
     9            <Span.TextDecorations>
     10                <TextDecoration Location="Underline" />
     11            </Span.TextDecorations> ADFGVX Cipher
     12        </Span>
     13    </Paragraph>
     14    <Paragraph Margin="0,0,0,0" TextAlignment="Left" FontFamily="Times New Roman" FontSize="16" />
     15
     16    <Paragraph Margin="0,0,0,0" TextAlignment="Left" FontFamily="Times New Roman" FontSize="16">
     17        <Span Foreground="#FF0000FF" xml:lang="en-us">
     18            <misc:DescriptionHyperlink NavigateUri="http://en.wikipedia.org/wiki/ADFGVX_cipher">http://en.wikipedia.org/wiki/ADFGVX_cipher</misc:DescriptionHyperlink>
     19        </Span>
     20    </Paragraph>
     21
     22    <Paragraph Margin="0,0,0,0" TextAlignment="Left" FontFamily="Times New Roman" FontSize="16" />
     23    <Paragraph Margin="0,0,0,0" TextAlignment="Left" FontFamily="Times New Roman" FontSize="16">
     24        <Span Foreground="#FF15428B" xml:lang="en-gb" xml:space="preserve">The ADFGVX encoding method was developed by Fritz Nebel, a colonel of the German communications corps, and it was first employed in spring 1918 by the German army. The procedure is an effective </Span>
     25        <Span FontWeight="Bold" Foreground="#FF15428B" xml:lang="en-gb">two-stage</Span>
     26        <Span Foreground="#FF15428B" xml:lang="en-gb">cascading cipher, consisting of a substitution followed by a column transposition. So the whole key of the ADFGVX cipher consists of two partial keys.</Span>
     27        <Span FontFamily="Times New Roman" FontSize="16" Foreground="#FF15428B" xml:lang="en-gb">
     28            <LineBreak />
     29        </Span>
     30        <Span FontFamily="Times New Roman" FontSize="16" Foreground="#FF15428B" xml:lang="en-gb">
     31            <LineBreak />
     32        </Span>
     33        <Span Foreground="#FF15428B" xml:lang="en-gb" xml:space="preserve">The plaintext </Span>
     34        <Span FontWeight="Bold" Foreground="#FF15428B" xml:lang="en-gb" xml:space="preserve">alphabet </Span>
     35        <Span Foreground="#FF15428B" xml:lang="en-gb">consists exactly of the letters 'A' to 'Z' and the digits '0' to '9'.</Span>
     36        <Span FontFamily="Times New Roman" FontSize="16" Foreground="#FF15428B" xml:lang="en-gb">
     37            <LineBreak />
     38        </Span>
     39        <Span FontFamily="Times New Roman" FontSize="16" Foreground="#FF15428B" xml:lang="en-gb">
     40            <LineBreak />
     41        </Span>
     42        <Span Foreground="#FF15428B" xml:lang="en-gb" xml:space="preserve">The </Span>
     43        <Span FontWeight="Bold" Foreground="#FF15428B" xml:lang="en-gb" xml:space="preserve">substitution </Span>
     44        <Span Foreground="#FF15428B" xml:lang="en-gb">is executed by means of a 6x6-matrix, containing all elements of the alphabet in random order. This order is the substitution key. The rows and columns of the matrix are identified by the letters A, D, F, G, V and X, which make up the ciphertext alphabet.</Span>
     45        <Span FontFamily="Times New Roman" FontSize="16" Foreground="#FF15428B" xml:lang="en-gb">
     46            <LineBreak />
     47        </Span>
     48        <Span FontFamily="Times New Roman" FontSize="16" Foreground="#FF15428B" xml:lang="en-gb">
     49            <LineBreak />
     50        </Span>
     51        <Span Foreground="#FF15428B" xml:lang="en-gb" xml:space="preserve">The </Span>
     52        <Span FontWeight="Bold" Foreground="#FF15428B" xml:lang="en-gb" xml:space="preserve">first encryption stage (substitution) </Span>
     53        <Span Foreground="#FF15428B" xml:lang="en-gb">determines the position of each plaintext letter within the matrix and replaces it by its row- and column-indicator pair. This way, every plaintext letter is replaced by two ciphertext letters.</Span>
     54        <Span FontFamily="Times New Roman" FontSize="16" Foreground="#FF15428B" xml:lang="en-gb">
     55            <LineBreak />
     56        </Span>
     57        <Span FontFamily="Times New Roman" FontSize="16" Foreground="#FF15428B" xml:lang="en-gb">
     58            <LineBreak />
     59        </Span>
     60        <Span Foreground="#FF15428B" xml:lang="en-gb" xml:space="preserve">During the </Span>
     61        <Span FontWeight="Bold" Foreground="#FF15428B" xml:lang="en-gb" xml:space="preserve">second encryption stage (transposition) </Span>
     62        <Span Foreground="#FF15428B" xml:lang="en-gb">the ciphertext generated in the first stage is further encoded by means of a single column transposition. The basis of this transposition is the transposition password, which must consist exclusively of the letters 'A' to 'Z'; redundant characters are not allowed. Thus, the password length is restricted to a maximum of 26 characters.</Span>
     63        <Span FontFamily="Times New Roman" FontSize="16" Foreground="#FF15428B" xml:lang="en-gb">
     64            <LineBreak />
     65        </Span>
     66        <Span FontFamily="Times New Roman" FontSize="16" Foreground="#FF15428B" xml:lang="en-gb">
     67            <LineBreak />
     68        </Span>
     69        <Span Foreground="#FF15428B" xml:lang="en-gb">The transposition password forms the second part of the ADFGVX key. The transposition again is realized through a matrix. The first row is filled with the transposition password, which determines the number of columns. The stage 1 ciphertext is then written into the matrix line by line. Now the columns of the matrix are swapped in such a way, that the letters of the transposition password are arranged in alphabetical order. Finally, the stage 2 ciphertext is extracted from the matrix column by column.</Span>
     70        <Span FontFamily="Times New Roman" FontSize="16" Foreground="#FF15428B" xml:lang="en-gb">
     71            <LineBreak />
     72        </Span>
     73        <Span FontFamily="Times New Roman" FontSize="16" Foreground="#FF15428B" xml:lang="en-gb">
     74            <LineBreak />
     75        </Span>
     76        <Run Foreground="#FF15428B" xml:lang="en-gb">The security of this cipher is based on the fact that the two ciphertext letters substituting every plaintext letter are separated by the transposition, making a frequency analysis of the bi-grams useless.</Run>
     77    </Paragraph>
    2278</FlowDocument>
Note: See TracChangeset for help on using the changeset viewer.