The future pipeline of BACK IN TIME

Step 1: Finding a new document

Document as image

Finding of a handwritten encrypted document, without associated decryption, and without a known key.

The user uploads a photograph or scan of the document to the software, called Glyphea.

metadata

Alongside the document, the user provides information on the period, country of origin and presumed or confirmed language of the encrypted text, if possible.

photo of an encrypted letter

Step 2: Transliteration

Characters Recognition

The transliteration module recognizes handwritten characters individually and converts the uploaded documents into text files that can be read by a computer.

To do so, we use neural networks that have been specially trained for this task. Therefore, the dedicated artificial intelligence only performs a transliteration task (recognizing and naming each character) and not a deciphering task (restoring the content).

screenshot of the transliteration module

Consolidated Export

The text that has been transliterated is now ready for cryptanalysis.

exported transliterated text

Step 3: Cryptanalysis

screenshot of the transliteration module

Algorithm Selection

The transliterated text is directed to the most appropriate cryptanalysis algorithm depending on the metadata provided (location, date and language). The attack method used depends on the cryptographic system employed, which is often deducible from the document's date and location.

User Feedback

The user is provided with an initial transcription, and can then indicate or correct any inconsistencies and complete any remaining undeciphered characters (such as names and abbreviations).

Step 4: The Final Result

consolidated decrypted text

The objective has been achieved: the user obtains a consolidated version of the decrypted text...

consolidated final text

Cipher key

... and the key. It usually takes the form of a clear/cipher correspondence table.

recovered cipher key