Most people familiar with codes and cryptography have at least heard of the German

Similar documents
Baudot code channels

Eric Roberts and Jerry Cain Handout #36 CS 106J May 15, The Enigma Machine

Exploring the Enigma [The MATH Connection]

CS408 Cryptography & Internet Security

Breaking the Enigma. Dmitri Gabbasov. June 2, 2015

Lecture 8: Cracking the Codes based on Tony Sale s Codes & Ciphers Web Page. History of Computing. Today s Topics. History of Computing Cipher Systems

1 Introduction 2. 3 Zygalski Sheets Using Zygalski Sheets Programmatic Replication Weaknesses/Problems 7

VIDEO intypedia001en LESSON 1: HISTORY OF CRYPTOGRAPHY AND ITS EARLY STAGES IN EUROPE. AUTHOR: Arturo Ribagorda Garnacho

Stream Cipher. Block cipher as stream cipher LFSR stream cipher RC4 General remarks. Stream cipher

Enigma. Developed and patented (in 1918) by Arthur Scherbius Many variations on basic design Eventually adopted by Germany

Institute of Southern Punjab, Multan

The Evolution of the Cryptologic Bombe. Chris Christensen Department of Mathematics Northern Kentucky University

LFSR stream cipher RC4. Stream cipher. Stream Cipher

Colossus, codebreaking, and the digital age. Stephen Budiansky Stephen Budiansky

Relies on hiding a message by jumbling up individual letters of the message. Sending a whole message with the letters jumbled up using a cipher

Sherlock Holmes and the adventures of the dancing men

PA Substitution Cipher

Playfair Cipher. From the earliest forms of stenography to the most advanced forms of encryption, the

An Introduction to Cryptography

The Swiss cipher machine NeMa

The Web Cryptology Game CODEBREAKERS.EU edition 2015

Foundations of Computing and Communication Lecture 5. The Universal Machine

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver.

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver.

Attacking of Stream Cipher Systems Using a Genetic Algorithm

Appendix Cryptograms

Cryptography. The Codebreakers: The Story of Secret Writing. by David Kahn A Bit of History. Seminal Text on Cryptography

Facts and Myths of Enigma: Breaking Stereotypes

Substitution cipher. Contents

Cabinet War Rooms SIGSALY. The A-3 scrambler

The Paper Enigma Machine

Dorabella Cipher. Cryptography peppers the world s history as an aid to military communication

PART FOUR. Polyalphabetic Substitution Systems PERIODIC POLYALPHABETIC SUBSTITUTION SYSTEMS

Edward Simpson: Bayes at Bletchley Park

Cryptology Notes ~ 1. Frank Tapson 2003 [trolc0:2]

Nomenclators. Nomenclator Example. Alberti s Cipher Disk. Early code/cipher combination, popular form 1400s-1800s. Philip of Spain (1589, see Kahn):

cryptography, plaintext; ciphertext. key,

The Code Book: The Science Of Secrecy From Ancient Egypt To Quantum Cryptography Download Free (EPUB, PDF)

Code-makers & Codebreakers. Substitution ciphers and frequency analysis

How I Broke the Confederate Code (137 Years Too Late)

The Weakest Link: The Human Factor Lessons Learned from the German WWII Enigma Cryptosystem

Computing History. Natalie Larremore 2 nd period

PART FIVE. Transposition Systems TYPES OF TRANSPOSITION SYSTEMS

Colossus and the Origins of Programmability. Draft for discussion at the 2016 SIGCIS Workshop. Do not quote or cite without permission of the authors.

Decrypted Secrets. Friedrich L. Bauer. Methods and Maxims of Cryptology. Fourth, Revised and Extended Edition

The Universal Machine

The Weakest Link: The Human Factor Lessons Learned from the German WWII Enigma Cryptosystem

FOR OFFICIAL USE ONLY

ENIGMA RELOADED I N T E R N A T I O N A L E V E N T

New Address Shift Linear Feedback Shift Register Generator

The Weakest Link: The Human Factor Lessons Learned from the German WWII Enigma Cryptosystem

Teaching and Promoting Cryptology at Faculty of Science University of Hradec Králové

Hidden Codes and Grand Designs

Alan Turing, Enigma (Computerkultur) (German Edition) By Andrew Hodges

Ciphers that Substitute Symbols

Modified Version of Playfair Cipher Using Linear Feedback Shift Register and Transpose Matrix Concept

A Motor can be in many groups, by assigning additional channel# on it.

Cable installation guidelines

The reduced Enigma. Keywords: Education, Enigma, Public Understanding of Cryptography, reduced Enigma

Stream Ciphers. Debdeep Mukhopadhyay

V.Sorge/E.Ritter, Handout 5

1. Turing Joins the Government Code and Cypher School

Curriculum Connections

LECTURE NOTES ON Classical Cryptographic Techniques ( Substitution Ciphers System)

Appendix B: Project Literature Review

Informatics Enlightened Station 1 Sunflower

PAPER SUBMISSION GUIDELINES TEM CONFERENCE 2011

The First Hundred Instant Sight Words. Words 1-25 Words Words Words

Alan Turing The Enigma The Book That Inspired The Film The Imitation Game

MITOCW max_min_second_der_512kb-mp4

Performance Evaluation of Stream Ciphers on Large Databases

Randomness analysis of A5/1 Stream Cipher for secure mobile communication

The Tentatve List of Enigma and Other Machine Usages, formatted by Tony Sale. (c) July March l945 page 1

decodes it along with the normal intensity signal, to determine how to modulate the three colour beams.

Fry Instant Phrases. First 100 Words/Phrases

CPS311 Lecture: Sequential Circuits

Cardano Girolamo Cardano invented: Fleissner, after Austrian cryptologist (Eduard). Described by Jules Verne in the story Mathias Sandorf.

CARLETON UNIVERSITY. Facts without theory is trivia. Theory without facts is bull 2607-LRB

The Geheimschreiber Secret

The reduced Enigma. Harold Thimbleby * Gresham Professor of Geometry. Gresham College Barnard s Inn Hall Holborn LONDON, EC1N 2HH

CRYPTOGRAPHY AND STATISTICS: A DIDACTICAL PROJECT. Massimo BORELLI, Anna FIORETTO, Andrea SGARRO, Luciana ZUCCHERI

illuminate innovation that ignites creativity iconform SD to HD 2K or 4K directly from your film originals without EDLs

HCCA: A Cryptogram Analysis Algorithm Based on Hill Climbing

Sequences and Cryptography

The Bletchley Park 1944 Cryptographic Dictionary formatted by Tony Sale (c) 2001

SCANNER TUNING TUTORIAL Author: Adam Burns

The Book Thief: Part Three Discussion Preparation

Alan Turing s Work on Voice Encryption. Craig Bauer

Super Secret Surprise Society

Grade School Crypto. Part 1. Dr. Rick Smith, Cryptosmith October, 2013

MICROFOCUS X-RAY SOURCE PROJECT*

Light Emitting Diodes (LEDs)

1.0: Introduction: 1.1: "Banburismus":

Keywords- Cryptography, Frame, Least Significant Bit, Pseudo Random Equations, Text, Video Image, Video Steganography.

Marimba. When trying to decide what to do for my project, I came across the idea of

How to Predict the Output of a Hardware Random Number Generator

Of course, the bit twiddler weenies had to take it a step further and produce something called ASCII art:

NON-BREAKABLE DATA ENCRYPTION WITH CLASSICAL INFORMATION

The Product of Two Negative Numbers 1

Directions: Read the following passage then answer the questions below. The Lost Dog (740L)

Transcription:

Hunt 1 John Hunt Professor Derek Bruff FYWS Cryptography 28 October 2010 Most people familiar with codes and cryptography have at least heard of the German Enigma Machines. However, very few people have heard of the Lorenz Cipher Machine. The Lorenz Schlüsselzusatz 43, also known as the Lorenz SZ 43, was the successor of the enigma machines and was used throughout World War II by the Hitler and his commanding officers. The SZ 43 is notable not only for the advancements that it created in the field of cryptography but also the advancements made by cryptanalysis in order to counter the innovation, specifically the invention of Colossus, the predecessor of the modern computer. The German Enigma machines offered the strongest form of encryption available to the Germans for quite a while. Unfortunately those machines had their flaws, namely the difficulty and amount of time needed to send a message. When an enigma machine was used one person would type the message in plaintext, for each letter struck, a different letter of cipher text would be flashed on a bulb and an assistant would record whatever letter appeared in the ciphertext. Then a radio operator would take the encrypted message and, using Morse code, send the message to the receiver. The entire process would then have to be reversed in order for the original message to be read (Copeland 36). This process required six people and obviously took a substantial amount of time to do. The SZ 43 simplified the process by requiring only one person to type in the original message. The machine would then automatically encrypt the message and

Hunt 2 send the encryption to the intended recipient (Kippenhahn 203). Upon arrival, the receiving machine would decrypt the message and print out the original (Kippenhahn 201). While the SZ 43 had rotors and wheels like the Enigma, the two machines operated in entirely different ways. The enigma had six wheels, each of which lead to a different letter ( The Machines ). Whereas the SZ 43 had twelve wheels, two motor wheels, five chi wheels, and five psi wheels. Each wheel had a different number of pins with which to poke holes into a piece of tape. The pins could either be up or down so that the settings of the wheels could be changed. This meant that the wheels could be changed significantly more frequently on the Enigma where an electrician was needed in order to move all of the wires around (Tutte). The ten psi and chi wheels worked together to create one key letter, while the motor wheels worked together to determine when the psi wheels moved. The chi wheels would all turn every time a letter was pushed. The psi wheel would move when the pin on the first motor wheel was up, the first motor wheel would move when the pin on the second motor wheel was up, the second motor wheel would move with the chi wheels. (Copeland 47) The innovation that made this new form of encryption possible was the Vernam method. Named after the man who created it, the Vernam method assigned each letter with five characters, either a dot or a cross. For example a T was represented by + and an S was represented by + +. According to the Vernam method one of the letters would be the key and the other would be user inputted. The other two letters would then be added together so that two of the same yielded a cross but if the letters would different they would be represented by a dot. So + + = +, = +, + =, and +=, so using this principle the two letters would be added together to create a new letter. For example T plus S would yield

Hunt 3 + =, = +, + =, =+, + =, this gives us + + which corresponds to the letter R. Therefore T+S=R. (Kippenhahn 202) The Lorenz took the Vernam method a step further by adding another letter into the equation. When the pin was up on one of the wheels it would poke a hole in the tape running through the machine, this would register as a cross in the Vernam method, when the pin was down no hole was made and this would be represented as a dot in the Vernam method (Copeland 38). So the five chi wheels would create one series of dots and crosses, while the five psi wheels would create another series of dots and crosses. These two series would both represent a different letter. Those two letters were added creating a key letter, and then the inputted letter would be added to the key letter creating the cipher letter. It was a fairly complicated process. However, to unscramble all one would have to do is know what the key letter created by the psi s and the chi s was (Copeland 48). The genius of the method used by Vernam is that no matter which order the characters are read in, they produce the same thing. So there were no difficult calculations to be done, all one had to do was subtract the ciphertext letter from the key letter, and the plaintext letter is once again revealed (Kippenhahn 202). This method also allowed the plain text to appear in the form of dots and spaces so that it was easily readable by the receiving machine, and transmitted via radio waves without the need of Morse code. Because the SZ 43 has about 4x10 different possible sequences the Germans decided that it was the closest possible code to unbreakable (Hinsley 153) and therefore it could be used amongst the most prominent officials in the military, it was in fact the encryption device used by Adolf Hitler to communicate with his commanding officers. The men and women at Bletchley Park immediately recognized the significance of these encryptions. If one would be able to

Hunt 4 decipher what the most prominent military minds in Germany were planning then one would have an immensely strong grasp on the condition and plans of the German military as a whole (Hinsley 167) For several months it appeared as if the code would prove to be unbreakable. There were glimpses of hope mainly in the first twelve letters of every encryption. The cryptanalysts noticed that sometimes the same letters repeated themselves in the first twelve letters of each encryption. This was called a having a depth of two. (Copeland 50). Unfortunately, while it became apparent that the first twelve letters were significant, no one at Bletchley Park knew what the SZ 43 looked like so it was really no help. (Copeland 56) Britain s big break came when a German officer made a lazy mistake that essentially handed the British the answer to the inner workings of the machine. One officer tried to send an encrypted message, comprised of roughly four thousand words to another. Unfortunately for the Germans the receiving officer didn t receive the entire message so he sent back a message in plaintext asking for the initial officer to resend the message. Then the initial officer broke protocol and sent the message over using the same wheel settings. The crew at Bletchley had picked up on the request to resend, and picked up both messages. Both messages started with the same twelve letters so it was safe to assume that they had both been encrypted with the same wheel settings, and the nail in the coffin for the German machine was that the officer had made a few slight changes in wording and abbreviating but had otherwise kept the text the same. (Copeland 56) These mistakes were enough to give British cryptanalyst John Tiltman enough of a crib to not only read both messages, but to infer what the design of the machine was. (Copeland 57). Soon after the crib was found, the British built their own Lorenz which they called Tunny (Hinsley 161)

Hunt 5 As quickly as the success came for the British it was lost just as fast. Only a few months after Tiltman s breakthrough, the Germans realized that having the wheel settings be represented by the first twelve numbers of the code was a severe breach of security so, instead of the twelve significant characters, one three digit number started out the beginning of every message, which corresponded to settings laid forth in a code book. (Copeland 58) If it hadn t been for Bill Tutte s intervention, all of the work done thus far by John Tiltman would have been done in vain. Luckily for the British, Tutte recognized a pattern that played on the fact that the psi wheels moved less frequently than the chi wheels. By shifting the ciphertext over and computing some advanced mathematics Tutte was able to recognize that he could get a rough interpretation of what the chi wheel was generating. (Copeland 58). However, even with this method it was still too much for any human, or team of humans, to work out by hand. It was then that Dr. Max Newman was assigned to create a machine that would be able to test the multiple different possibilities, he called this machine Colossus. (Copeland 59) Colossus is now considered the predecessor of all computers, primarily created by Max Newman and Tommy Flowers. The processing machine was created in order to counter the new complications brought on by the Tunny machine. (Copeland 74) Colossus could read paper tape at 5,000 characters per second and the paper tape in its wheels travelled at 30 miles per hour. ( The Machines ) Colossus was able to do in hours what it once took teams weeks to do. The machine was effectively built entirely by Flowers. It was Newman s idea to bring Flowers in, but his plan of using electricity seemed too farfetched for Newman, so Newman gave Flowers free reign to do whatever he wanted in the creation of Colossus. The rest of Newman s team worked on the machine they called Heath Robinson. Colossus was created late in 1943 and everyone at

Hunt 6 Bletchley was in awe of the power that Colossus exhumed. It was faster and more accurate than not only humans, but all of the machines that Newman and his team had created. (Copeland 74) By the end of the war there were ten Colossi in Bletchley Park, all capable of deciphering messages sent by the Lorenz machine, even though no one in England had ever seen one. The cracking of the Lorenz was a huge feat in cryptanalysis and was a devastating blow to German security. The Germans had created a code that was unbreakable, and yet, because of one officer s mistake the code was broken.

Hunt 7 Works Cited Copeland, B. Jack. Colossus: the Secrets of Bletchley Park's Codebreaking Computers. Oxford: Oxford UP, 2006. Print. Hinsley, F. H., and Alan Stripp. Codebreakers: the inside Story of Bletchley Park. Oxford: Oxford UP, 1993. Print. Kippenhahn, Rudolf. Code Breaking: a History and Exploration. Woodstock, NY: Overlook, 1999. Print. "The Machines." Bletchley Park. Web. 28 Oct. 2010. <http://www.bletchleypark.org.uk/content/machines.rhtm>. Tutte, W. T. "FISH and I." Lecture. University of Waterloo, Waterloo. 19 June 1998. FISH and I. Web. 28 Oct. 2010. <http://frode.home.cern.ch/frode/crypto/tutte.pdf>.