Letter D being analyzed using the Homophonic Substitution Analyzer component of CrypTool 2. The top of the analyzer displays the encrypted ciphertext. The bottom of the analyzer displays the deciphered plaintext.

Letter D being analyzed using the Homophonic Substitution Analyzer component of CrypTool 2. The top of the analyzer displays the encrypted ciphertext. The bottom of the analyzer displays the deciphered plaintext.

Source publication
Conference Paper
Full-text available
This paper presents the work on two encrypted diplomatic letters sent by the Lithuanian nobleman Jan Chodkiewicz to emperor Maximilian II in 1574 and 1575. It describes the decipherment process as well as the content and the context of the letters. Furthermore, it provides linguistic aspects of the used plaintext language. It continues our previous...

Context in source publication

Context 1
... we also searched the key records in the DECODE database for a possible original key. But to our regret we could not find any key suitable for deciphering letters D and E. Therefore, we started to perform a ciphertext-only attack on letter D. We used the Homophonic Substitution Analyzer component implemented in CrypTool 2 to semi-automatically decipher letter D. Figure 1 shows this process. After that, it turned out that letter E was encrypted using the same key. ...