Alexis Køhl: a Danish Inventor of Cryptosystems

نویسنده

  • Niels Faurholt
چکیده

A Danish engineer, Alexis Køhl (1846–1920), invented a number of cryptographic systems between 1876 and 1919. Some of these systems were simple, others were more complicated machine systems. Few of Køhls systems were ever used. One system was used to some extent in the Nordic countries, but generally Køhl felt that his ‘‘genius’’ was not properly recognized. There were no sensational cryptographic innovations in his systems, but some of them were quite smartly implemented. His first machine systems made use of some of the earliest mechanical typewriters. All his life Køhl claimed that his systems were unbreakable. He never made the fortune that he thought he deserved. This paper discusses Alexis Køhl’s life, his systems, and describes the known surviving devices. Additional information would be highly appreciated by the author.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient elliptic curve cryptosystems

Elliptic curve cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on elliptic curve is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation...

متن کامل

QTRU: quaternionic version of the NTRU public-key cryptosystems

In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...

متن کامل

Comparison of two Public Key Cryptosystems

Since the time public-key cryptography was introduced by Diffie andHellman in 1976, numerous public-key algorithms have been proposed. Some of thesealgorithms are insecure and the others that seem secure, many are impractical, eitherthey have too large keys or the cipher text they produce is much longer than theplaintext. This paper focuses on efficient implementation and analysis of two mostpo...

متن کامل

An Early Danish Computer Game - The Case of Nim, Piet Hein, and Regnecentralen

This paper reports on the development of Nimbi, which is an early computer game implemented at the Danish Computer Company Regnecentralen in 1962-63. Nimbi is a variant of the ancient game Nim. The paper traces the primary origins of the development of Nimbi. These include a mathematical analysis from 1901 of Nim that “killed the game” as the outcome could be predicted quite easily; the desire ...

متن کامل

Evaluation of the Two Methods for Thinning in Oak Plantation based on Ecological Capability (Case staudy: Neka area, Mazadaran Province)

The study was aimed to assess of the Danish and Swiss methods of thinning in 20 years old plantations of Chestnut leaved Oak (Quercus castaneifolia C. A. Mey.) in terms of quantitative and qualitative characteristics of trees, natural regeneration, plant and soil invertebrate diversity. The study area is located in Neka forests, east of Mazandaran province in the Caspian region. This research w...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Cryptologia

دوره 30  شماره 

صفحات  -

تاریخ انتشار 2006