Louis Kruh
Hofstra University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Louis Kruh.
Cryptologia | 1990
Cipher A. Deavours; Louis Kruh
The effectiveness of Alan Turings original bombe design is discussed in this article along with organizational methods of implementing it via a microcomputer. To illustrate the material presented, a three part German Werhmacht message is solved.
Cryptologia | 1988
Louis Kruh
Based on inconsistencies in the J. B. Ward pamphlet, The Beale Paper, statistical stylistic comparisons of the writings of Ward and T. J. Beale, and other analyses, the author concludes that the story of a Beale treasure is a hoax.
Cryptologia | 1990
John Bryne; Cipher A. Deavours; Louis Kruh
John F. Byrne invented Chaocipher in 1918 and tried unsuccessfully for almost 40 years to interest the U.S. government in his cipher system. He offered a reward to anyone who could break his cipher but the reward was never claimed. In 1989, John Byrne, son of John F. Byrne, demonstrated Chaocipher to two Cryptologia editors to determine if it had any commercial value. After making some improvements and providing additional information they jointly issue a new challenge to would-be solvers.
Cryptologia | 1989
Louis Kruh
This paper contains little known vignettes in the life of Herbert O. Yardley which include the Cipher Bureau he established in New York, William F. Friedman, publication of The American Black Chamber, his work for the Canadian government, an effort to clear his name with the FBI, and a secret investigation of his loyalty by the Armys Counter Intelligence Corps during World War II.
Cryptologia | 1987
Paul Whitaker; Louis Kruh
This paper presents the travels of a cryptological Intelligence mission through Germany near the end of World War II to locate German Signal Intelligence information documents, and equipment.
Cryptologia | 1981
Louis Kruh
Cipher Device M-94 was adopted by the United States Army in 1922, the same year papers found in the Library of Congress revealed that Thomas Jefferson had invented the same device about 125 years earlier. Almost 100 years after Jefferson, Commandant Etienne Bazeries, a French army cryptologist, independently developed a similar device. Both inventions, which ultimately formed the basis for the most widely used cryptosystems in the 20th century, apparently had a common antecedent in the letter lock, which was popularized in France by Edme Regnier during the late 18th and early 19th centuries.
Cryptologia | 2005
Louis Kruh
In a data processing system having a slave computer connecting to a host central processing unit and a host main memory, the slave computer has no internal random access memory and includes an arithmetic logic operating means. The arithmetic logic operating means calculates an address of the host main memory. A DMA interface directly makes an access to the host main memory to fetch operand data into the slave computer. The arithmetic logic operating means computes the operand data under control of a microprogram control section and directly loads the computed result to the host main memory through the DMA interface.
Cryptologia | 2005
Louis Kruh
Apparatus for simultaneously reproducing information signals that have simultaneously been recorded in four successive, parallel channel tracks on a record medium, with a first pair of first and second ones of the four channel tracks being adjacent to each other and having the information signals recorded therein with different azimuth angles and with the information signals recorded in one of the first or second channel track being delayed relative to the information signals recorded in the other of the first and second channel tracks, and with a second pair of the remaining third and fourth ones of the four channel tracks being adjacent to each other and having the information signals recorded therein with different azimuth angles; said apparatus including four magnetic heads movable in a direction along the four channel tracks for reproducing the signals recorded therein; and a tracking control circuit for controlling the relative positions of the four magnetic heads and the record medium so that the four magnetic heads accurately scan respective ones of the four channel tracks in response to the phase difference between the signals recorded in the first pair of channel tracks or the phase difference between the signals recorded in the second pair of channel tracks.
Cryptologia | 2005
Louis Kruh
An intrinsically safe power supply employing a binary current interrupter connected between the power source and the electrical load. Normally the load is situated in a potentially dangerous environment, like a coal mine, and the intrinsically safe power supply at a safe remote location, e.g., on the earths surface. The interrupter has a pass and switching transistor, current sensor, gating circuitry, a flip-flop switch, and means to delay the turning on of the transistor-but not its turning off. If an overcurrent or overvoltage condition is sensed between the input and output of the intrinsically safe power supply, load current will cease to flow. In normal operation, only the current interrupter pass transistor will open. A reset signal from an oscillator internal of the interrupter may be used to reset the flip-flop after actuation or upon its initial setting, thereby causing the flow of power into the load.
Cryptologia | 2005
Louis Kruh
A solid-state color imager comprised of a solid-state base comprised of a plurality of electrical switching elements arranged in sets of three having superimposed thereon a plurality of photosensor layers which can detect and absorb different colors of light. Each photosensitive layer is comprised of an upper transparent continuous electrode sublayer, a photoconductive sublayer, and a back mosaic electrode sublayer which is electrically connected to said base. When light strikes the outermost photosensitive layer, light of a particular color is absorbed, and in connection with said base, its presence is electrically detected and recorded. The unabsorbed light continues to travel and strike the next succeeding photosensor layer whereat another color of light is absorbed and detected. The unabsorbed light passing through the second photosensor layer strikes the innermost photosensor layer which detects the remaining light. The photosensor layers are electrically insulated from each other and the base and make possible detection of three separate colors of light such as blue, green and red without the use of multi-color filter arrays.