TAILIEUCHUNG - Báo cáo khoa học: "Decoding Running Key Ciphers"

There has been recent interest in the problem of decoding letter substitution ciphers using techniques inspired by natural language processing. We consider a different type of classical encoding scheme known as the running key cipher, and propose a search solution using Gibbs sampling with a word language model. | Decoding Running Key Ciphers Sravana Reddy Department of Computer Science The University of Chicago 1100 E. 58th Street Chicago IL 60637 USA sravana@ Kevin Knight Information Sciences Institute University of Southern California 4676 Admiralty Way Marina del Rey CA 90292 USA knight@ Abstract There has been recent interest in the problem of decoding letter substitution ciphers using techniques inspired by natural language processing. We consider a different type of classical encoding scheme known as the running key cipher and propose a search solution using Gibbs sampling with a word language model. We evaluate our method on synthetic ciphertexts of different lengths and find that it outperforms previous work that employs Viterbi decoding with character-based models. 1 Introduction The running key cipher is an encoding scheme that uses a secret key R that is typically a string of words usually taken from a book or other text that is agreed upon by the sender and receiver. When sending a plaintext message P the sender truncates R to the length of the plaintext. The scheme also relies on a substitution function f which is usually publicly known that maps a plaintext letter p and key letter r to a unique ciphertext letter c. The most common choice for f is the tabula recta where c p r mod 26 for letters in the English alphabet with A 0 B 1 and so on. To encode a plaintext with a running key the spaces in the plaintext and the key are removed and for every 0 i P the ciphertext letter at position i is computed to be Ci f Pi Ri . Figure 1 shows an example encoding using the tabula recta. For a given ciphertext and known f the plaintext uniquely determines the running key and vice versa. Research conducted while the author was visiting ISI. 80 Since we know that the plaintext and running key are both drawn from natural language our objective function for the solution plaintext under some language model is P arg max log Pr P Pr Rp c 1 P where the .

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.