Browse Wiki & Semantic Web

Jump to: navigation, search
Http://dbpedia.org/resource/Japanese cryptology from the 1500s to Meiji
  This page has no properties.
hide properties that link here 
  No properties link to this page.
 
http://dbpedia.org/resource/Japanese_cryptology_from_the_1500s_to_Meiji
http://dbpedia.org/ontology/abstract The cipher system that the Uesugi are saidThe cipher system that the Uesugi are said to have used is a simple substitution usually known as a Polybius square or "checkerboard." The i-ro-ha alphabet contains forty-eight letters, so a seven-by-seven square is used, with one of the cells left blank. The rows and columns are labeled with a number or a letter. In the table below, the numbers start in the top left, as does the i-ro-ha alphabet. In practice these could start in any corner. To encipher, find the plaintext letter in the square and replace it with the number of that row and column. So using the square above, kougeki becomes 55 43 53 63 or 55 34 35 36 if the correspondents decided ahead of time on column-row order. The problem of what to do in the case of letters such as "ga," "de," and "pe" that do not appear in the i-ro-ha alphabet is avoided by using the base form of the letter instead – as above where "kougeki" becomes koukeki. Technically, this is a serious flaw because some messages may have two or more equally valid decipherments. To avoid this the encipherer may have had to rephrase messages. The column and row headers do not have to be numbers. One common variation is to use letters. This was common in European cryptography and is found in the Uesugi cipher as well. However, the Japanese cipher had a twist that never seems to have been used in the West: using the last 14 letters of the Iroha poem to fill in the row and column headers. The table shown below gives an example of this, using "tsurenakumieshiakinoyufukure". This system of using a "checkerboard" to convert an alphabet into numbers or letters was described by Polybius over 2000 years ago. There are three main advantages to this system. First, converting letters into numbers allows for various mathematical transformations which are not possible or not as easy with letters – super-enciphering for example. Second, the checkerboard system reduces the total number of characters. Whether converting to numbers or letters, the Polybius square reduces 25 English letters to five characters. Uesugi's square reduces to seven. This reduction makes crytanalysis slightly more difficult than simple one-to-one substitution. Another benefit of the reduction in the number of letters is that it reduces the chance of error in communicating the message. The letters of the German in World War I were chosen because in morse code they are quite distinct and thus it was unlikely that an error in the morse code transmission would accidentally turn one letter into another. This would have been important for a sengoku daimyō, for instance, if he experimented with sending coded messages over long distances by torches, flags, poles, or similar system. Finally, although the checkerboard system doubles the length of messages, breaking each plaintext letter into two ciphertext letters allows for separate transformations on each of the halves. However, this does not seem to have been used much in American or European cryptology and Japanese cryptologists apparently did not use it at all. It is not known how or even if Uesugi actually used the seven-by-seven checkerboard system. The scarcity of evidence makes it impossible to draw any firm conclusions but tentatively it seems that senkoku period daimyō did not have much use for cryptology. Of course it is possible that they did have their "black chambers" and that those chambers were shrouded in such secrecy that no hint of their existence escaped. This seems unlikely however. Several daimyō compiled codes of conduct or books of advice on governing for their offspring. Had cryptology been an important factor in the success of such men, they might be expected to pass that advantage along to their successor. The fact that they did not do so, in writing at least, does not prove anything but, in light of the other evidence – and lack of it – does make the existence of black chambers of the European sort seem unlikely. The history of cryptology in Japan shows two things. First, the fact that substitution ciphers existed makes the failure of the Japanese to improve on the substitution cipher or to invent the transposition cipher much harder to explain. Second, the lack of a strong cryptographic tradition suggests – almost requires – a correspondingly weak cryptanalytic tradition. In fact there seems to be no cryptanalysis in Japanese history before the late 19th century.nese history before the late 19th century.
http://dbpedia.org/ontology/wikiPageID 16017967
http://dbpedia.org/ontology/wikiPageLength 40183
http://dbpedia.org/ontology/wikiPageRevisionID 1018211364
http://dbpedia.org/ontology/wikiPageWikiLink http://dbpedia.org/resource/JADE_%28cypher_machine%29 + , http://dbpedia.org/resource/Uesugi_clan + , http://dbpedia.org/resource/Category:History_of_cryptography + , http://dbpedia.org/resource/Russian_copulation + , http://dbpedia.org/resource/Black_Chamber + , http://dbpedia.org/resource/RED_%28cipher_machine%29 + , http://dbpedia.org/resource/Polybius_square + , http://dbpedia.org/resource/Herbert_O._Yardley + , http://dbpedia.org/resource/Hyakutake_Harukichi + , http://dbpedia.org/resource/ADGFX_system + , http://dbpedia.org/resource/Aktiebolaget_Cryptograph + , http://dbpedia.org/resource/William_Friedmann + , http://dbpedia.org/resource/Teleprinter + , http://dbpedia.org/resource/Jan_Kowalewski + , http://dbpedia.org/resource/Hara_Hisashi + , http://dbpedia.org/resource/Japanese_naval_codes + , http://dbpedia.org/resource/Jan_Kowalefsky + , http://dbpedia.org/resource/Category:Military_communication_in_feudal_Japan + , http://dbpedia.org/resource/PURPLE + , http://dbpedia.org/resource/Washington_Naval_Conference + , http://dbpedia.org/resource/Iroha + , http://dbpedia.org/resource/Polybius + , http://dbpedia.org/resource/Category:History_of_science_and_technology_in_Japan + , http://dbpedia.org/resource/One-time_pad +
http://dbpedia.org/property/wikiPageUsesTemplate http://dbpedia.org/resource/Template:Citation_needed + , http://dbpedia.org/resource/Template:Reflist + , http://dbpedia.org/resource/Template:Original_research + , http://dbpedia.org/resource/Template:Multiple_issues + , http://dbpedia.org/resource/Template:Tone + , http://dbpedia.org/resource/Template:Essay-like + , http://dbpedia.org/resource/Template:Openhistory + , http://dbpedia.org/resource/Template:Empty_section +
http://purl.org/dc/terms/subject http://dbpedia.org/resource/Category:Military_communication_in_feudal_Japan + , http://dbpedia.org/resource/Category:History_of_science_and_technology_in_Japan + , http://dbpedia.org/resource/Category:History_of_cryptography +
http://www.w3.org/ns/prov#wasDerivedFrom http://en.wikipedia.org/wiki/Japanese_cryptology_from_the_1500s_to_Meiji?oldid=1018211364&ns=0 +
http://xmlns.com/foaf/0.1/isPrimaryTopicOf http://en.wikipedia.org/wiki/Japanese_cryptology_from_the_1500s_to_Meiji +
owl:sameAs http://www.wikidata.org/entity/Q6158484 + , http://dbpedia.org/resource/Japanese_cryptology_from_the_1500s_to_Meiji + , http://rdf.freebase.com/ns/m.01196n54 + , https://global.dbpedia.org/id/4nwAK +
rdfs:comment The cipher system that the Uesugi are saidThe cipher system that the Uesugi are said to have used is a simple substitution usually known as a Polybius square or "checkerboard." The i-ro-ha alphabet contains forty-eight letters, so a seven-by-seven square is used, with one of the cells left blank. The rows and columns are labeled with a number or a letter. In the table below, the numbers start in the top left, as does the i-ro-ha alphabet. In practice these could start in any corner. practice these could start in any corner.
rdfs:label Japanese cryptology from the 1500s to Meiji
hide properties that link here 
http://dbpedia.org/resource/Cryptography_in_Japan + http://dbpedia.org/ontology/wikiPageRedirects
http://dbpedia.org/resource/Uesugi_clan + , http://dbpedia.org/resource/Cryptography_in_Japan + , http://dbpedia.org/resource/Outline_of_cryptography + http://dbpedia.org/ontology/wikiPageWikiLink
http://en.wikipedia.org/wiki/Japanese_cryptology_from_the_1500s_to_Meiji + http://xmlns.com/foaf/0.1/primaryTopic
http://dbpedia.org/resource/Japanese_cryptology_from_the_1500s_to_Meiji + owl:sameAs
 

 

Enter the name of the page to start semantic browsing from.