The Evolution of the Cryptologic Bombe. Chris Christensen Department of Mathematics Northern Kentucky University

Similar documents
Breaking the Enigma. Dmitri Gabbasov. June 2, 2015

Facts and Myths of Enigma: Breaking Stereotypes

1 Introduction 2. 3 Zygalski Sheets Using Zygalski Sheets Programmatic Replication Weaknesses/Problems 7

CS408 Cryptography & Internet Security

Eric Roberts and Jerry Cain Handout #36 CS 106J May 15, The Enigma Machine

Enigma. Developed and patented (in 1918) by Arthur Scherbius Many variations on basic design Eventually adopted by Germany

The Swiss cipher machine NeMa

Exploring the Enigma [The MATH Connection]

Appendix B: Project Literature Review

cryptography, plaintext; ciphertext. key,

Relies on hiding a message by jumbling up individual letters of the message. Sending a whole message with the letters jumbled up using a cipher

1. Turing Joins the Government Code and Cypher School

Most people familiar with codes and cryptography have at least heard of the German

The Weakest Link: The Human Factor Lessons Learned from the German WWII Enigma Cryptosystem

Substitution cipher. Contents

An Introduction to Cryptography

The Weakest Link: The Human Factor Lessons Learned from the German WWII Enigma Cryptosystem

The Weakest Link: The Human Factor Lessons Learned from the German WWII Enigma Cryptosystem

Foundations of Computing and Communication Lecture 5. The Universal Machine

VIDEO intypedia001en LESSON 1: HISTORY OF CRYPTOGRAPHY AND ITS EARLY STAGES IN EUROPE. AUTHOR: Arturo Ribagorda Garnacho

Lecture 8: Cracking the Codes based on Tony Sale s Codes & Ciphers Web Page. History of Computing. Today s Topics. History of Computing Cipher Systems

PA Substitution Cipher

Cryptology Notes ~ 1. Frank Tapson 2003 [trolc0:2]

The Paper Enigma Machine

The Tentatve List of Enigma and Other Machine Usages, formatted by Tony Sale. (c) July March l945 page 1

Cabinet War Rooms SIGSALY. The A-3 scrambler

Stream Cipher. Block cipher as stream cipher LFSR stream cipher RC4 General remarks. Stream cipher

Cryptography CS 555. Topic 5: Pseudorandomness and Stream Ciphers. CS555 Spring 2012/Topic 5 1

Baudot code channels

Alan Turing The Enigma The Book That Inspired The Film The Imitation Game

LFSR stream cipher RC4. Stream cipher. Stream Cipher

Decrypted Secrets. Friedrich L. Bauer. Methods and Maxims of Cryptology. Fourth, Revised and Extended Edition

FOR OFFICIAL USE ONLY

Ciphers that Substitute Symbols

Alan Turing s Work on Voice Encryption. Craig Bauer

Cryptography. The Codebreakers: The Story of Secret Writing. by David Kahn A Bit of History. Seminal Text on Cryptography

Sherlock Holmes and the adventures of the dancing men

PART FOUR. Polyalphabetic Substitution Systems PERIODIC POLYALPHABETIC SUBSTITUTION SYSTEMS

Teaching and Promoting Cryptology at Faculty of Science University of Hradec Králové

New Address Shift Linear Feedback Shift Register Generator

Stream Ciphers. Debdeep Mukhopadhyay

1.0: Introduction: 1.1: "Banburismus":

The reduced Enigma. Keywords: Education, Enigma, Public Understanding of Cryptography, reduced Enigma

Appendix Cryptograms

Enigma. Enigma

How I Broke the Confederate Code (137 Years Too Late)

The Web Cryptology Game CODEBREAKERS.EU edition 2015

The reduced Enigma. Harold Thimbleby * Gresham Professor of Geometry. Gresham College Barnard s Inn Hall Holborn LONDON, EC1N 2HH

Dorabella Cipher. Cryptography peppers the world s history as an aid to military communication

ENIGMA RELOADED I N T E R N A T I O N A L E V E N T

PLEASE SCROLL DOWN FOR ARTICLE

Le Sphinx. Controls. 1 sur 5 17/04/ :59. Pocket cipher device

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver.

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver.

Communication & Technology. by Jane Bourke SAMPLE. Photographer: Richard Bartz, Wikimedia Commons.

Nomenclators. Nomenclator Example. Alberti s Cipher Disk. Early code/cipher combination, popular form 1400s-1800s. Philip of Spain (1589, see Kahn):

Sequences and Cryptography

HCCA: A Cryptogram Analysis Algorithm Based on Hill Climbing

The National Cryptologic Museum Library

The Universal Machine

Bremont Watch Company

Code-makers & Codebreakers. Substitution ciphers and frequency analysis

Playfair Cipher. From the earliest forms of stenography to the most advanced forms of encryption, the

Alan Turing, Enigma (Computerkultur) (German Edition) By Andrew Hodges

CRYPTOGRAPHY. Sharafat Ibn Mollah Mosharraf TOUCH-N-PASS EXAM CRAM GUIDE SERIES. Special Edition for CSEDU. Students CSE, DU )

Institute of Southern Punjab, Multan

LECTURE NOTES ON Classical Cryptographic Techniques ( Substitution Ciphers System)

Edward Simpson: Bayes at Bletchley Park

bombs in Nagasaki and Hiroshima these actions are considered by some to be pivotal

The Life, Death and Miracles of Alan Mathison Turing

Attacking of Stream Cipher Systems Using a Genetic Algorithm

V.Sorge/E.Ritter, Handout 5

Update to 8 June 2011 Press Release

Perfect Localized Security of the Fourtytwofish Cipher in the Delphic Oracle Model

Many books on cryptography were published prior to the 1609

Randomness analysis of A5/1 Stream Cipher for secure mobile communication

The Geheimschreiber Secret

CSc 466/566. Computer Security. 4 : Cryptography Introduction

Permutation-based cryptography for the Internet of Things

Keywords- Cryptography, Frame, Least Significant Bit, Pseudo Random Equations, Text, Video Image, Video Steganography.

STA4000 Report Decrypting Classical Cipher Text Using Markov Chain Monte Carlo

PART FIVE. Transposition Systems TYPES OF TRANSPOSITION SYSTEMS

Cardano Girolamo Cardano invented: Fleissner, after Austrian cryptologist (Eduard). Described by Jules Verne in the story Mathias Sandorf.

, etc.,nor ,etc.

Pseudorandom bit Generators for Secure Broadcasting Systems

Hidden Codes and Grand Designs

~ A Ron and Bob Story ~ Book 2. Stink Bombs. R. Fulleman. LorRonCo

Enigma: Aspects of Multimodal Inter-Semiotic Translation

Modified Version of Playfair Cipher Using Linear Feedback Shift Register and Transpose Matrix Concept

A reprint from American Scientist

CRYPTOGRAPHY IN CREATIVE MEDIA. Olivia Grace Vanarthos. Honors Thesis. Appalachian State University

WG Stream Cipher based Encryption Algorithm

Cryptanalysis of the Bluetooth E 0 Cipher using OBDD s

Implementation of a new DES chip 1

Colossus, codebreaking, and the digital age. Stephen Budiansky Stephen Budiansky

The Code Book: The Science Of Secrecy From Ancient Egypt To Quantum Cryptography Download Free (EPUB, PDF)

(12) Patent Application Publication (10) Pub. No.: US 2003/ A1

Syntonizer. Editor and Publisher John Nightingale Box 4695, Vancouver, B.C. Canada, V6B 4A1.

UNIVERSITY OF NEWCASTLE UPON TYNE, COMPUTING LABORATORY

AWord-Based Genetic Algorithm for Cryptanalysis of Short Cryptograms

Transcription:

The Evolution of the Cryptologic Bombe Chris Christensen Department of Mathematics Northern Kentucky University

Electronic Communications 1844 Samuel F. B. Morse: What hath God Wrought? Telegraph. 1876 Alexander Graham Bell: Telephone. 1895 Guglielmo Marconi: Wireless Telegraphy. 1915 Bell Telephone: Radio telephone.

The Admiralty During World War I, cryptology became a powerful weapon of war. Germany suffered many cryptologic defeats.

World War I Cryptology

Churchill told the secret

Blitzkrieg

U-Boat Attacks

Cryptography Code Cipher

Ciphertext

Frequencies for English

Cryptanalysis Ciphertext Frequency Analysis

Cryptanalysis Ciphertext Frequency Analysis

Cryptanalysis Ciphertext N corresponds to plaintext e? Ciphertext O corresponds to plaintext t? Most frequent trigraph is OIN.

Cipher Disk

Germany Adopted Machine Encryption Germany selected a commercial encryption machine called Enigma. After modification it became a primary encryption method for Germany s military.

Each Enigma cipher is a permutation of the letters of the alphabet abcdefghijklmnopqrstuvwxyz OHELCPYBSURDZTAFXKINJWVQGM (ao)(bh)(ce)(dl)(fp)(gy)(is)(ju)(kr)(mz)(nt)(qx)(vw)

Enigma

Enigma has a period of about 17576. Enigma

Cipher Machines TYPEX SIGABA

Enigma Rotor

The Key At first there were 3 rotors. 6 ways to order the rotors.

Setting the Rotors

The Key 6 ways to order the rotors. 17576 ways to select the rotor setting.

The Plugboard

The Key 6 ways to order the rotors. 17576 ways to select the rotor setting. 100,391,791,500 ways to set the plugboard.

The positions of the turnover notches was part of the key.

The Key 6 ways to order the rotors. 17576 ways to select the rotor setting. 100,391,791,500 ways to set the plugboard. 676 ways to set the turnover notches. 7,156,755,732,750,624,000 ways to set the key.

The sender and receiver must set their machines in exactly the same way.

Checking one setting per second Would take 22,693,900,000 years. A better plan was needed. Need a machine to attack a machine.

In 1929, the Polish government selected three mathematicians from Poznan University to attack Enigma Jerzy Rozycki [1909 1942] Henryk Zygalski [1908 1978] Marian Rejewski [1905 1980]

Marian Rejewski The most famous of the Polish mathematicians was Marian Rejewski Rejewski used mathematical results and ideas to attack Enigma.

Message Indicators Each message was sent using a message setting selected by the operator. How did the operator transmit the message setting to the authorized receiver? Sent it twice encrypted with Enigma using the ground setting.

Example Ground setting nku. Transmitted in the clear. Message setting wku. Sent twice; encrypted with the ground setting. Say, wku wku is encrypted as XFC DXS Send NKU XFC DXS

Rejewski s Example Given sufficiently ample cipher material, it may happen that, on a given day, there will be three messages with keys such as RTJ DQY HPB WAH WIK DWJ MWR RAW KTW Marian Rejewski

The Polish Bomba 6 sets of Enigma rotors driven by a motor. 6 bomby one for each possible rotor order.

Fast Rotor Offsets RTJ WAH WIK First Enigma pair. n and n + 3

Fast Rotor Offsets RTJ DQY WAH WIK DWJ MWR First Enigma pair. n and n + 3. Second Enigma pair. (n + 15)+1 and (n + 15)+3+1

Fast Rotor Offsets RTJ DQY HPB WAH WIK DWJ MWR RAW KTW First Enigma pair. n and n + 3. Second Enigma pair. (n + 15)+1 and (n + 15)+3+1 Third Enigma pair. (n + 18)+2 and (n + 18)+3+2.

Other Rotor Offsets RTJ DQY HPB WAH WIK DWJ MWR RAW KTW Middle rotor offsets: m, m + 23, and (m + 23) + 25. Left (slow) rotor offsets: l, l + 12, and (l + 12)+4

Look for Simultaneities Input W. Look for simultaneities; e.g., USA USA. Results in 12 hours if rotor order needed to be changed; results in 2 hours if all 6 bombe attacked the indicators.

But Why was it called a bomba?

The name bomba was given by Rozycki. [A]t [that] time there was in Warsaw [a very popular] ice-cream [dessert] called [a] bomba which looked like a[n] oldfashioned, round, with chocolate [on the] outside. [T]he idea [for] the machine came while they were eating it. Colonel Tadeusz Lisicki

Then Germany added two more rotors.

Jerzy Rozycki [1909 1942] Henryk Zygalski [1908 1978] Marian Rejewski [1905 1980] Enigma by Wladyslaw Kozaczuk

Bletchley

Bletchley Park

The Huts

Alan Turing [1912 1954] Entscheidungsproblem 1936. Hut 8 in 1939.

Hut 8

The Turing Bombe

Cribs CIPHERTEXT VWHCD IUGHL UVFAO BNEWN AGZWY ZUXNN PYZWN LKMUO FRIIL OJPAE Plaintext markworthxattawckedxbyxtwoxpurs uitxplanes

Crib Placement VWHCDIUGHLUVFAOBNEWNAGZWYZUXNN markworthxattackedxbyxtwoxpurs VWHCDIUGHLUVFAOBNEWNAGZWYZUXNN markworthxattackedxbyxtwoxpurs VWHCDIUGHLUVFAOBNEWNAGZWYZUXNN markworthxattackedxbyxtwoxpurs

Crib Placement VWHCDIUGHLUVFAOBNEWNAGZWYZUXNN markworthxattackedxbyxtwoxpur VWHCDIUGHLUVFAOBNEWNAGZWYZUXNN markworthxattackedxbyxtwoxpu VWHCDIUGHLUVFAOBNEWNAGZWYZUXNN markworthxattackedxbyxtwoxp

Crib Placement

Diagram

Loop

Offsets

Position 1: U (20) and A (0). Position 5: U (20) and O (14). Position 9: O (14) and X (23). Position 18: W (22) and X (23). Position13: W (22) and A (0).

Plugging Up

Alan Turing: The Enigma by Andrew Hodges http://www.turing.org.u k/turing/

The Turing Welchman Bombe The diagonal board Gordon Welchman (1906 1985)

February 1942 December 1942 September 1943

The Four-rotor Naval Enigma

Cobra

Joseph Desch [1907 1987] NCR engineer in Dayton, OH.

The Secret in Building 26 by Jim DeBrosse and Colin Burke. http://www.daytoncodebreakers.org/

Evolution of the Cryptologic Bombe

IVXHS G