Lecture 8: Cracking the Codes based on Tony Sale s Codes & Ciphers Web Page. History of Computing. Today s Topics. History of Computing Cipher Systems

Similar documents
Breaking the Enigma. Dmitri Gabbasov. June 2, 2015

CS408 Cryptography & Internet Security

The Paper Enigma Machine

Exploring the Enigma [The MATH Connection]

Enigma. Developed and patented (in 1918) by Arthur Scherbius Many variations on basic design Eventually adopted by Germany

Eric Roberts and Jerry Cain Handout #36 CS 106J May 15, The Enigma Machine

1 Introduction 2. 3 Zygalski Sheets Using Zygalski Sheets Programmatic Replication Weaknesses/Problems 7

Appendix B: Project Literature Review

Sherlock Holmes and the adventures of the dancing men

VIDEO intypedia001en LESSON 1: HISTORY OF CRYPTOGRAPHY AND ITS EARLY STAGES IN EUROPE. AUTHOR: Arturo Ribagorda Garnacho

The Tentatve List of Enigma and Other Machine Usages, formatted by Tony Sale. (c) July March l945 page 1

The Swiss cipher machine NeMa

Most people familiar with codes and cryptography have at least heard of the German

Substitution cipher. Contents

An Introduction to Cryptography

The Weakest Link: The Human Factor Lessons Learned from the German WWII Enigma Cryptosystem

The Weakest Link: The Human Factor Lessons Learned from the German WWII Enigma Cryptosystem

Relies on hiding a message by jumbling up individual letters of the message. Sending a whole message with the letters jumbled up using a cipher

Foundations of Computing and Communication Lecture 5. The Universal Machine

The Weakest Link: The Human Factor Lessons Learned from the German WWII Enigma Cryptosystem

cryptography, plaintext; ciphertext. key,

PART FIVE. Transposition Systems TYPES OF TRANSPOSITION SYSTEMS

Le Sphinx. Controls. 1 sur 5 17/04/ :59. Pocket cipher device

PART FOUR. Polyalphabetic Substitution Systems PERIODIC POLYALPHABETIC SUBSTITUTION SYSTEMS

The reduced Enigma. Keywords: Education, Enigma, Public Understanding of Cryptography, reduced Enigma

Institute of Southern Punjab, Multan

Playfair Cipher. From the earliest forms of stenography to the most advanced forms of encryption, the

Working with the ENIGMA at Panmunjom (Korea)

The Web Cryptology Game CODEBREAKERS.EU edition 2015

The reduced Enigma. Harold Thimbleby * Gresham Professor of Geometry. Gresham College Barnard s Inn Hall Holborn LONDON, EC1N 2HH

Cryptology Notes ~ 1. Frank Tapson 2003 [trolc0:2]

The Evolution of the Cryptologic Bombe. Chris Christensen Department of Mathematics Northern Kentucky University

PC-250. SMD Taped Parts Counter Operator s Manual. ISO 9001:2008 Certified. V-TEK, Incorporated 751 Summit Avenue Mankato, MN USA

Baudot code channels

MAGNETIC CARD READER DESIGN KIT TECHNICAL SPECIFICATION

Everybody has seen Telechron clocks and even. US Navy Warren Telechron Clock System. by Robert Simon (CA)

1.0: Introduction: 1.1: "Banburismus":

Cardano Girolamo Cardano invented: Fleissner, after Austrian cryptologist (Eduard). Described by Jules Verne in the story Mathias Sandorf.

LFSR stream cipher RC4. Stream cipher. Stream Cipher

(Refer Slide Time: 00:55)

PA Substitution Cipher

Dorabella Cipher. Cryptography peppers the world s history as an aid to military communication

Part No. ENC-LAB01 Users Manual Introduction EncoderLAB

1. Turing Joins the Government Code and Cypher School

FOR OFFICIAL USE ONLY

LECTURE NOTES ON Classical Cryptographic Techniques ( Substitution Ciphers System)

Stream Cipher. Block cipher as stream cipher LFSR stream cipher RC4 General remarks. Stream cipher

CRYPTOGRAPHY AND STATISTICS: A DIDACTICAL PROJECT. Massimo BORELLI, Anna FIORETTO, Andrea SGARRO, Luciana ZUCCHERI

CPS311 Lecture: Sequential Circuits

General Wiring and Installation Guidelines. Typical Mounting Installations Electrical Connections General Guidelines Common Questions & Answers

Key- The key k for my cipher is a single number from 1-26 which is shared between the sender and the reciever.

Transportation Engineering - II Dr. Rajat Rastogi Department of Civil Engineering Indian Institute of Technology - Roorkee

Appendix Cryptograms

The reduction in the number of flip-flops in a sequential circuit is referred to as the state-reduction problem.

MT-RJ SECURE Product Expansion Now 10 Variants of the MT-RJ SECURE Products

Peak Atlas IT. RJ45 Network Cable Analyser Model UTP05. Designed and manufactured with pride in the UK. User Guide

Chapter 6. sequential logic design. This is the beginning of the second part of this course, sequential logic.

CS302 - Digital Logic Design FAQs By

Code-makers & Codebreakers. Substitution ciphers and frequency analysis

DLM471S-5.1 MULTICHANNEL AUDIO LEVEL MASTER OPERATION MANUAL IB B. (Mounted in RMS400 Rack Mount & Power Supply) (One of 4 Typical Cards)

How to Predict the Output of a Hardware Random Number Generator

Tens Carry only by Geometry Josef Funke's Adding Device. Stephan Weiss

Cabinet War Rooms SIGSALY. The A-3 scrambler

( InfoSystems Translation )

Reference Manual. Notes 9/16 Series H

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver.

ENIGMA RELOADED I N T E R N A T I O N A L E V E N T

Previous Lecture Sequential Circuits. Slide Summary of contents covered in this lecture. (Refer Slide Time: 01:55)

NON-BREAKABLE DATA ENCRYPTION WITH CLASSICAL INFORMATION

Enigma. Enigma

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver.

4320 SS-25 Self-Strip Terminating Block

Facts and Myths of Enigma: Breaking Stereotypes

CN Remove the scanner assembly (X476 and X576 models) and all doors/covers.

Lynx Broadband Installation Manual for Residential Packages with a 35 db Amp Quick Start Guide (first 3 pages)

7 Lighting Technology

CONVOLUTIONAL CODING

VSX Series Getting Started Guide

Getting Started Guide for the V Series

First Question: Camera head. Lighting unit. Shooting stage

February 2007 Edition /A. Getting Started Guide for the VSX Series Version 8.5.3

How would you go about creating the presentation?

7 SEGMENT LED DISPLAY KIT

May 2006 Edition /A. Getting Started Guide for the VSX Series Version 8.5

application software

3rd Slide Set Computer Networks

Laboratory 10. Required Components: Objectives. Introduction. Digital Circuits - Logic and Latching (modified from lab text by Alciatore)

application software

Keywords- Cryptography, Frame, Least Significant Bit, Pseudo Random Equations, Text, Video Image, Video Steganography.

UVA-OM-1261 REYNALDO ROCHE (D) Day 3: Changes

PCM ENCODING PREPARATION... 2 PCM the PCM ENCODER module... 4

ImproX (TRT) Twin Remote Terminal INSTALLATION MANUAL

Cable System Installation Guide

Owner s Manual. RJ11/RJ12/RJ45 Cable Crimper/Stripper with Built-In Tester. Model: T TST

(12) Patent Application Publication (10) Pub. No.: US 2003/ A1

TV44. Owner s Manual. Amplified/Outdoor Satellite Dish Clip-on Antenna

Optical Distribution Box 300 Installation Guide. Version : R0.0

Data Converters and DSPs Getting Closer to Sensors

KAT5.tv AV Distribution System. KAT5 AVRX User Guide

HDMI Demystified April 2011

Transcription:

Lecture 8: Cracking the Codes based on Tony Sale s Codes & Ciphers Web Page Today s Topics Cipher Systems Substitution Ciphers Cracking Caesar s Cipher Polyalphabetic Substitution The Enigma Machine Rotors, Reflectors, Plugboard Weakness in Disguise The Military Enigma Sending & Receiving The complexity of Enigma Slide 1 Cipher Systems The objective of a cipher system is to make it very difficult and time-consuming, for an interceptor to decrypt the message. Decryption need not be impossible just impractical. This is achieved by arranging for there to be a vast number of different possible message keys, i.e. different ways in which the system could have been configured when the message was enciphered. Otherwise the interceptor can simply try them all out! Slide 2 Substitution Ciphers Substitution ciphers (of which the Enigma was a sophisticated development) involve substituting one letter for another according to some rule. The simplest substitution is Caesar's cipher: ABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFG...ABCDEFGHIJKLMNOPQRSTUVWXYZ To encipher, the letter on the bottom row is written down as the substitution for the text letter on the top row. To decipher, the received cipher is looked up in the bottom row and the text letter read off from the top row above it. Slide 3 1

Cracking Caesar s Cipher ABCDEFGHIJKLMNOPQRSTUVWXYZ YZABCDEFGHIJKLMNOPQRSTUVWX In this case the message key, which the recipient needs to know, is just the displacement between the two alphabets (3). This is a simple example of a cipher system which shows an immediate flaw: there are only 26 possible message keys and so anyone can just try them out. (Example: crack EMRGR) "Vercingetorix Throws Down His Arms At the Feet of Caesar" L. Royer, 1888. By kind permission of Forum Romanum. Slide 4 Caesar Improved A more sophisticated system uses a random series of characters for the lower alphabet. ABCDEFGHIJKLMNOPQRSTUVWXYZ IPHBOSFCQZJNTWGLMYRXDKEUVA Now the recipient has to know the substitution alphabet, and this sequence of letters is in effect the message key. There are a huge numbers of possible substitutions 403,291,461,126,605,635,584,000,000 Slide 5 How Secure? ABCDEFGHIJKLMNOPQRSTUVWXYZ IPHBOSFCQZJNTWGLMYRXDKEUVA Cipher systems of this kind are still easily broken by using common-sense facts such as that E is the most common letter, THE the most common word, and so forth. NB Having a large number of possible keys does not in itself provide security. (This is really the same principle as allows you to solve crossword anagrams. There are vast numbers of possible permutations of the letters, but most of them can be eliminated because they lead to impossible words.) Slide 6 2

Polyalphabetic Substitution In the 19th century various schemes for polyalphabetic systems were invented. In these, there is more than one substitution alphabet and they are used in rotation, or by some other rule. System of encoding of Heinrich Cornelius Agrippa von Nettelsheim ( occulted philosophia, Cologne, 1533, Li 3, CH. 30) reproduced in the treaty of numerology of Blaise de Vigenere, Traicté of the figures, or secretes manners ofescrire (Paris, 1586, F 275 v). This is what led to the Enigma. If the rule is simple then statistical methods can still easily break the cipher. By the 20th century it became possible to carry out substitutions by using electrical connections to mechanise the dreary and difficult work of looking up tables in a handbook. Slide 7 The Enigma Machine The basic Enigma was invented in 1918 by Arthur Scherbius in Berlin. It enciphers a message by performing a number of substitutions one after the other. Scherbius' idea was to achieve these substitutions by electrical connections. Slide 8 and so on ad infinitum It is not much more difficult to compose substitutions which are to be performed one after the other. The bottom row of terminals can simply be connected to the entry terminals of another set of wires Slide 9 3

Two steps forward. Now this as it stands is no advance at all, since we might as well have combined the two substitutions into one. but suppose the second set of wirings is displaced by 2 letters Each displacement on the bottom row now gives rise to a completely different substitution alphabet. Slide 10 The Reason for Rotors An effective way to achieve this displacement is to implement the substitutions in a wheel, rather than in the strips we have shown. Then the shifts are achieved by rotations of one wheels against another. This was the basis of the Enigma machine. Adding a third wheel gives rise to 26x26=676 different substitution alphabets. However the Enigma machine was given another element of complexity by the inventor Willi Korn, who added a reflector. Slide 11 The reflector Instead of using the output from the third wheel as the cipher of the input letter, this output is fed into a fixed reflector plate which is simply a swapping of letters in pairs. The output from this is in turn passed back through the rotors in the reverse direction, arriving back at the entry disc. Thus in total seven substitutions are performed in succession by the basic Enigma: by the three wheels, then by the reflector swapping, then by the three wheels in the reverse direction. One effect of this extra complexity is that there are now 26x26x26=17,576 different substitution alphabets arising from different positions of the wheels moving with respect to the fixed reflector. Slide 12 4

Weakness in disguise The addition of the reflector made the Enigma a simpler system. The reflector made the Enigma machine reciprocal. If A is enciphered to Q, then Q will be enciphered to A. This knowledge is of considerable use to the interceptor who is trying to break the system. Also no letter can ever encipher to itself. This severe cryptographic weakness was much exploited first by the Poles and then by Bletchley Park. Slide 13 Enigma Rotors (or wheels) (1)The finger notches used to turn the rotors to a start position. (2)The alphabet RING round the circumference of the rotor (3)The shaft upon which the rotors turn. (4)The catch which locks the alphabet ring to the core (5)The CORE containing the cross-wiring between contacts and discs. (6)The spring loaded contacts to make contact with the next rotor. (7)The discs embedded into the core to make contact with the spring-loaded contacts in the next rotor. (8)The CARRY notch attached to the alphabet ring Slide 14 Enigma Rotors (or wheels) These rotors were manufactured with their wirings buried inside and they could not be modified in use. In the 1930s, the Enigma had only three different kinds of rotor, I II and III. These rotors could be assembled on the shaft in any order giving 6 (i.e. 3x2x1) possible configurations. In 1938 the Germans added rotors IV and V to the repertoire, thus giving 60 (i.e. 5x4x3) configurations by choosing a set of three rotors from the five. Some further wheels were brought into use during the course of the war but basically the rotors remained unchanged throughout. Slide 15 1

Wheels Set 16-14-12 Slide 16 The Rotor Wheels (in situ) Slide 17 Changing Rotors Slide 18 2

Points of Contact Slide 19 Rotors (Side View) Slide 20 Rotor Contacts Slide 21 3

The Military Enigma Machines Slide 22 Under the bonnet. Slide 23 The Plugboard or Stecker The plugboard or 'Stecker', visible on the front of the machine, was the most important addition made to the basic Enigma when turning it into a machine for military use. Unlike the rotors, it could be rewired by the operator. However it was not a rotor it did not rotate. It could effect a 'swapping' of letters, like the reflector. The operator simply inserted plugs so as to connect pairs of letters (generally 10 pairs, in wartime use) and this had the effect of hard-wiring such a swapping. Slide 24 4

The Steckerboard Slide 25 A Stecker Connection Slide 26 The Plugboard Because the plugboard affected both the incoming current from the keyboard and the outgoing current to the lamps. it left unchanged the reciprocal property of the Enigma. It also meant that the military Enigma still had the property that no letter could ever be enciphered to itself. This was a very grave mistake in the design. Slide 27 5

The Ring Setting The enigma allowed each rotor to be set by the operator in any one of 26 possible settings. The ring-setting determined the relationship between the window letters and the actual scramblings The carry mechanism was also affected by the ring setting. The carry notch was arranged to be in a different position for each of the rotors I, II, III, IV, V. This turned out to be a bad cryptographic mistake; it helped analysts at Bletchley Park to identify the right hand rotor in use. Slide 28 The Message Key In order to begin, the message key, (the complete and exact configuration of the machine in its starting position), had to be conveyed to the intended recipient of the message. The Germans, following Scherbius's original suggestions, decided to specify exactly everything except the rotor start position for each 24-hour period. This was achieved by pre-printing setting sheets a month's settings on one sheet, which was distributed by courier. Slide 29 Sending a message 1. Set the Enigma machine into the base configuration for the day as given in the setting sheet for the month. 2. Select a three letter start position, (the indicator), from which to encipher the selected three letter message key. 3. Turn the rotors to the indicator position, key in the message key, twice, and note down the lamps that light. 4. Turn the rotors to the message key letters and key in the message to be sent, noting down the lamps as they light. 5. Give the enciphered message plus its preamble to the radio operator to transmit by Morse code. Slide 30 1

Receiving a message 1. Set the Enigma machine into the same base configuration for the day from the setting sheet. 2. Turn the rotors to the indicator letters received in the preamble to the message. 3. Key in the next six letters to reveal the repeated message key as the lamps light. 4. Turn the rotors to the message key letters. Key in and decrypt the cipher text. Slide 31 The Complexity of The Enigma The 3-rotor Enigma has 26x26x26 = 17,576 possible rotor states for each of 6 wheel orders giving 6x17,576 = 105,456 machine states. For each of these the plugboard (with ten pairs of letters connected) can be in 150,738,274,937,250 possible states. The total number of combinations is thus (even for the simplest military Enigma) of the order of 15,000,000,000,000,000,000 and then there is the ring-setting complication on top of this. Slide 32 2