acl acl2012 acl2012-68 acl2012-68-reference knowledge-graph by maker-knowledge-mining
Source: pdf
Author: Sravana Reddy ; Kevin Knight
Abstract: There has been recent interest in the problem of decoding letter substitution ciphers using techniques inspired by natural language processing. We consider a different type of classical encoding scheme known as the running key cipher, and propose a search solution using Gibbs sampling with a word language model. We evaluate our method on synthetic ciphertexts of different lengths, and find that it outperforms previous work that employs Viterbi decoding with character-based models.
Craig Bauer and Christian Tate. 2002. A statistical attack on the running key cipher. Cryptologia, 26(4). Steven Bird, Edward Loper, and Ewan Klein. 2009. Natural Language Processing with Python. O’Reilly Media Inc. Eric Corlett and Gerald Penn. 2010. An exact A* method of deciphering letter-substitution ciphers. In Proceedings of ACL. Alexander Griffing. 2006. Solving the running key cipher with the Viterbi algorithm. Cryptologia, 30(4). Friedrich Kasiski. 1863. Die Geheimschriften und die Dechiffrir-Kunst. E. S. Mittler und Sohn. Francis Nelson and Henry Kucera. 1979. The Brown Corpus: A Standard Corpus of Present-Day Edited American English. Brown University. Peder Olsen, John Hershey, Steven Rennie, and Vaibhava Goel. 2011. A speech recognition solution to an ancient cryptography problem. Technical Report RC25109 (W1102-005), IBM Research. David Oranchak. 2008. Evolutionary algorithm for decryption of monoalphabetic homophonic substitution ciphers encoded as constraint satisfaction problems. In Proceedings of the Conference on Genetic and Evolutionary Computation. Sujith Ravi and Kevin Knight. 2008. Attacking decipherment problems optimally with low-order n-gram models. In Proceedings of EMNLP. Sujith Ravi and Kevin Knight. 2009. Attacking letter substitution ciphers with integer programming. Cryptologia, 33(4). Sujith Ravi and Kevin Knight. 2011. Bayesian inference for Zodiac and other homophonic ciphers. In Proceedings of ACL. Claude Shannon. 1949. Communication theory of secrecy systems. Bell System Technical Journal, 28(4). 84