{"id":"https://openalex.org/W3195395719","doi":"https://doi.org/10.1080/01611194.2021.1905734","title":"How we set new world records in breaking Playfair ciphertexts","display_name":"How we set new world records in breaking Playfair ciphertexts","publication_year":2021,"publication_date":"2021-08-13","ids":{"openalex":"https://openalex.org/W3195395719","doi":"https://doi.org/10.1080/01611194.2021.1905734","mag":"3195395719"},"language":"en","primary_location":{"id":"doi:10.1080/01611194.2021.1905734","is_oa":false,"landing_page_url":"https://doi.org/10.1080/01611194.2021.1905734","pdf_url":null,"source":{"id":"https://openalex.org/S185196701","display_name":"Cryptologia","issn_l":"0161-1194","issn":["0161-1194","1558-1586"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptologia","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044170649","display_name":"Elonka Dunin","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Elonka Dunin","raw_affiliation_strings":["View further author information"],"affiliations":[{"raw_affiliation_string":"View further author information","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047277682","display_name":"Magnus Ekhall","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Magnus Ekhall","raw_affiliation_strings":["View further author information"],"affiliations":[{"raw_affiliation_string":"View further author information","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030121174","display_name":"Konstantin Hamidullin","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Konstantin Hamidullin","raw_affiliation_strings":["View further author information"],"affiliations":[{"raw_affiliation_string":"View further author information","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071344454","display_name":"Nils Kopal","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nils Kopal","raw_affiliation_strings":["View further author information"],"affiliations":[{"raw_affiliation_string":"View further author information","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008372044","display_name":"George Lasry","orcid":"https://orcid.org/0000-0002-0269-4793"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"George Lasry","raw_affiliation_strings":["View further author information"],"affiliations":[{"raw_affiliation_string":"View further author information","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028654026","display_name":"Klaus Schmeh","orcid":null},"institutions":[{"id":"https://openalex.org/I4210108542","display_name":"Schlumberger (Ireland)","ror":"https://ror.org/01mcc7007","country_code":"IE","type":"company","lineage":["https://openalex.org/I4210092184","https://openalex.org/I4210108542"]}],"countries":["IE"],"is_corresponding":true,"raw_author_name":"Klaus Schmeh","raw_affiliation_strings":["Correspondenceklaus@schmeh.org"],"affiliations":[{"raw_affiliation_string":"Correspondenceklaus@schmeh.org","institution_ids":["https://openalex.org/I4210108542"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5028654026"],"corresponding_institution_ids":["https://openalex.org/I4210108542"],"apc_list":null,"apc_paid":null,"fwci":0.136,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.5449701,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"46","issue":"4","first_page":"302","last_page":"322"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11269","display_name":"Algorithms and Data Compression","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11269","display_name":"Algorithms and Data Compression","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7299604415893555},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.7153313755989075},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.6458202600479126},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5142006874084473},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.39886483550071716},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.34862110018730164},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.32814541459083557},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24391600489616394},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.15139460563659668}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7299604415893555},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.7153313755989075},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.6458202600479126},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5142006874084473},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.39886483550071716},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.34862110018730164},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.32814541459083557},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24391600489616394},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.15139460563659668}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1080/01611194.2021.1905734","is_oa":false,"landing_page_url":"https://doi.org/10.1080/01611194.2021.1905734","pdf_url":null,"source":{"id":"https://openalex.org/S185196701","display_name":"Cryptologia","issn_l":"0161-1194","issn":["0161-1194","1558-1586"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptologia","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W915756955","https://openalex.org/W1585665690","https://openalex.org/W1994356656","https://openalex.org/W2077844305","https://openalex.org/W2096107944","https://openalex.org/W2099964107","https://openalex.org/W2785963490","https://openalex.org/W2892463691","https://openalex.org/W2893046173","https://openalex.org/W2982310519","https://openalex.org/W2995351844","https://openalex.org/W4236605548","https://openalex.org/W6754897208","https://openalex.org/W6769708618"],"related_works":["https://openalex.org/W2100090372","https://openalex.org/W4361205702","https://openalex.org/W2362689357","https://openalex.org/W2365982350","https://openalex.org/W2508016950","https://openalex.org/W2073145422","https://openalex.org/W2945726177","https://openalex.org/W1986773466","https://openalex.org/W2225202932","https://openalex.org/W2135000443"],"abstract_inverted_index":{"The":[0,98],"Playfair":[1,25,82,125],"cipher":[2],"is":[3],"a":[4,48],"well-known":[5],"manual":[6],"encryption":[7],"method":[8],"developed":[9],"in":[10,44,60,74,116],"the":[11,45,75,80,118],"19th":[12],"century.":[13],"Until":[14],"2018,":[15],"known":[16],"cryptanalysis":[17,62,99],"techniques,":[18],"with":[19],"computer":[20],"assistance,":[21],"could":[22],"solve":[23,43],"non-keyword-based":[24],"ciphertexts":[26,38],"if":[27],"they":[28],"had":[29],"at":[30],"least":[31],"60":[32,88],"letters":[33],"to":[34,42,68,95],"work":[35],"with.":[36],"Shorter":[37],"were":[39],"effectively":[40],"impossible":[41],"absence":[46],"of":[47,128],"crib.":[49],"In":[50],"this":[51],"article,":[52],"we":[53,56,121],"show":[54],"how":[55],"introduced":[57],"several":[58],"improvements":[59],"these":[61],"methods,":[63],"which":[64],"made":[65],"it":[66],"possible":[67],"do":[69],"much":[70],"better.":[71],"This":[72],"resulted":[73],"(unofficial)":[76],"world":[77],"record":[78],"for":[79],"shortest":[81],"message":[83],"broken":[84],"going":[85],"down":[86],"from":[87],"via":[89],"50,":[90],"40,":[91],"32,":[92],"and":[93,109,130],"28":[94],"26":[96],"letters.":[97,132],"techniques":[100],"used":[101],"include":[102],"hill":[103],"climbing,":[104],"simulated":[105],"annealing,":[106],"tabu":[107],"search,":[108],"plaintext-based":[110],"dictionary":[111],"attacks.":[112],"For":[113],"readers":[114],"interested":[115],"improving":[117],"current":[119],"record,":[120],"also":[122],"provide":[123],"unsolved":[124],"challenges":[126],"consisting":[127],"24":[129],"22":[131]},"counts_by_year":[{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
