Le Sphinx. Controls. 1 sur 5 17/04/ :59. Pocket cipher device

Similar documents
Breaking the Enigma. Dmitri Gabbasov. June 2, 2015

Lecture 8: Cracking the Codes based on Tony Sale s Codes & Ciphers Web Page. History of Computing. Today s Topics. History of Computing Cipher Systems

Eric Roberts and Jerry Cain Handout #36 CS 106J May 15, The Enigma Machine

CS408 Cryptography & Internet Security

Enigma. Developed and patented (in 1918) by Arthur Scherbius Many variations on basic design Eventually adopted by Germany

Sherlock Holmes and the adventures of the dancing men

PART FIVE. Transposition Systems TYPES OF TRANSPOSITION SYSTEMS

Cabinet War Rooms SIGSALY. The A-3 scrambler

Exploring the Enigma [The MATH Connection]

Code-makers & Codebreakers. Substitution ciphers and frequency analysis

PA Substitution Cipher

The Paper Enigma Machine

VIDEO intypedia001en LESSON 1: HISTORY OF CRYPTOGRAPHY AND ITS EARLY STAGES IN EUROPE. AUTHOR: Arturo Ribagorda Garnacho

Tens Carry only by Geometry Josef Funke's Adding Device. Stephan Weiss

The Swiss cipher machine NeMa

Update to 8 June 2011 Press Release

PART FOUR. Polyalphabetic Substitution Systems PERIODIC POLYALPHABETIC SUBSTITUTION SYSTEMS

An Introduction to Cryptography

LFSR stream cipher RC4. Stream cipher. Stream Cipher

Substitution cipher. Contents

OWNER S MANUAL. Model 861 Hand Held Bale Scanner # REVISED 4-10

Sequences and Cryptography

EECS 270 Group Homework 4 Due Friday. June half credit if turned in by June

FOR OFFICIAL USE ONLY

Key- The key k for my cipher is a single number from 1-26 which is shared between the sender and the reciever.

ivw-fd122 Video Wall Controller MODEL: ivw-fd122 Video Wall Controller Supports 2 x 2 Video Wall Array User Manual Page i Rev. 1.

69 th INTERNATIONAL ASTRONAUTICAL CONGRESS BREMEN, GERMANY 1-5 OCTOBER 2018 INSTRUCTIONS TO AUTHORS

Cryptography. The Codebreakers: The Story of Secret Writing. by David Kahn A Bit of History. Seminal Text on Cryptography

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver.

The Tentatve List of Enigma and Other Machine Usages, formatted by Tony Sale. (c) July March l945 page 1

Cover Sheet. Scanning Report of Flexible Riser Pipe Section EVI /7/2005. Inspection Report

A.M. Stephenson and His Adder (1873)

1 Introduction 2. 3 Zygalski Sheets Using Zygalski Sheets Programmatic Replication Weaknesses/Problems 7

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver.

The Web Cryptology Game CODEBREAKERS.EU edition 2015

User Manual. Multi-Screen Splicing Processor J6

Cryptography in Criminal Investigations

ivw-fd133 Video Wall Controller MODEL: ivw-fd133 Video Wall Controller Supports 3 x 3 and 2 x 2 Video Wall Array User Manual Page i Rev. 1.

A NUMERIC COMPRESSION ALGORITHM FOR THE HP PRIME CALCULATOR DR. JACKIE F. WOLDERING HHC SEPT , 2015 NASHVILLE, TN.

Tube feeding systems TZ , TZM TZS TZK.

What is TEMPEST Chapter 1

Institute of Southern Punjab, Multan

The Evolution of the Cryptologic Bombe. Chris Christensen Department of Mathematics Northern Kentucky University

(12) Patent Application Publication (10) Pub. No.: US 2003/ A1

Algorithmic Composition: The Music of Mathematics

INTERNATIONAL STANDARD

Physical Layer Built-in Security Enhancement of DS-CDMA Systems Using Secure Block Interleaving

A-ATF (1) PictureGear Pocket. Operating Instructions Version 2.0

Stream Cipher. Block cipher as stream cipher LFSR stream cipher RC4 General remarks. Stream cipher

V.Sorge/E.Ritter, Handout 5

SP02 Series Tape Feeder. Operator Guide. All rights reserved Revision 1 29 Feb D-E36

Linkage 3.6. User s Guide

Video System Characteristics of AVC in the ATSC Digital Television System

Force & Motion 4-5: ArithMachines

4 UNIFIED SIGNAGE MANUAL

Perfect Localized Security of the Fourtytwofish Cipher in the Delphic Oracle Model

velocity standard 07 velocity features and benefits: dimensions: additional information:

Reason Overview3. Reason Overview

The perforator machine below shows in the front, the three keys. The left is for dots, the centre is for space and the right is for dashes.

Lab Determining the Screen Resolution of a Computer

Statement SmartLCT User s Manual Welcome to use the product from Xi an NovaStar Tech Co., Ltd. (hereinafter referred to as NovaStar ). It is our great

IMPORTANT NOTICE. Company name - STMicroelectronics NV is replaced with ST-NXP Wireless.

COLOUR CHANGING USB LAMP KIT

velocity standard 08 velocity features and benefits: dimensions:

Physical Layer Built-in Security Enhancement of DS-CDMA Systems Using Secure Block Interleaving

CrossLine Generator Operation Manual

Convention Paper 6930

Thank you for your continued support, and as always your feedback is welcome.

Rehoboth Christian College - Secondary

The National Cryptologic Museum Library

Setting up the app. Press the Setting button (gear symbol) on the upper screen to go setup app. Before you

DTS-12C Standalone Scrambler. User Manual

Relies on hiding a message by jumbling up individual letters of the message. Sending a whole message with the letters jumbled up using a cipher

J.M. Stewart Corporation 2201 Cantu Ct., Suite 218 Sarasota, FL Stewartsigns.com

Quick Start Guide. Soundcraft Si Series Quick Start Guide Issue 1010

Basic TV Technology: Digital and Analog

COMP2611: Computer Organization Building Sequential Logics with Logisim

Adapting PV*SOL for the UK Feed-In and Export Tariffs

X-Sign 2.0 User Manual

Cryptography CS 555. Topic 5: Pseudorandomness and Stream Ciphers. CS555 Spring 2012/Topic 5 1

Grade School Crypto. Part 1. Dr. Rick Smith, Cryptosmith October, 2013

Pre-processing of revolution speed data in ArtemiS SUITE 1

Appendix B: Project Literature Review

Curriculum Catalog

66 th INTERNATIONAL ASTRONAUTICAL CONGRESS JERUSALEM, OCTOBER 2015 INSTRUCTIONS TO AUTHORS

INTERVIEW WITH MANFRED MOHR: ART AS A CALCULATION

PSM-003. Micro Polarization Controller/Scrambler. User Guide

Operations. BCU Operator Display BMTW-SVU02C-EN

Re-Reading Harry Potter

The Cult Of Pythagoras: Math And Myths By Alberto A. Martinez

Rehoboth Christian College - Secondary

ANALOGUE AND DIGITAL ELECTRONICS STUDENT S WORKBOOK U1: INTRODUCTION

by Samantha Rabe HOUGHTON MIFFLIN

ART I: UNIT NINE CALLIGRAPHY

Classic Cats 2013 Calendar (Multilingual Edition)

ALGEBRAIC PURE TONE COMPOSITIONS CONSTRUCTED VIA SIMILARITY

Note: This document should only be used as a reference and should not replace assignment guidelines.

Word Tutorial 2: Editing and Formatting a Document

Contents Circuits... 1

Instruction for Locking Tuner s Carriage(s) before Shipping

Transcription:

1 sur 5 17/04/2016 18:59 Le Sphinx Pocket cipher device Homepage Crypto Index Glossary Enigma Hagelin Fialka Siemens Philips Nema Racal Motorola STK Transvertex Gretag OMI HELL Telsy Teltron TST Mils AT&T Tadiran USA USSR UK Yugoslavia Voice Hand OTP LE SPHINX 1 was a pocket cryptographic device, developed around 1930 by Société des Codes Télégraphiques Georges Lugagne in Paris (France). The device consists of 10 sliding bars with two scrambled alphabets each, and should therefore be classed as an alphabet transposition cipher. At the time, it was advertised as a method for secret writing when sending (radio) telegrams. The device consists of a metal frame with ten lanes, each of which holds two movable rods with scrambled alphabets. The 20 transposed alphabets are identified by a number, imprinted in red, and are always used in pairs, with the upper alphabet representing the clear text and the lower alphabet used for the cipher text. 2 The rods can be moved by treaded knobs at the right side which engage gears at the bottom. Two fixed ruler windows are present for setting and reading the plain text and cipher text. The source text is processed 10 characters at a time. The device is based on the 1912 invention of a mechanical pocket transposition cipher device by Georges Lugagne of Boches-du-Rhône (near Marseille, France), which was registered in 1913 as French Patent 461.217 [1]. Around the same time, the device was patented in the United Kingdom as British patent 23,204 [2]. The device was marketed in France by Lugagne's companies in Paris and Marseille, who had become known for their international telegraphic code books of 1914. The image on the right shows the original design of 1912, which is mechanically less complex, but works very similar. It also consists of 20 paired scrambled alphabets, but they are not linked mechanically. The sliding rods are made of ivory. In 1931, the design was improved by Lugagne's employee Paul Godillon, who added the gears and the 10 treaded knobs at the right hand side. He was also responsible for adding the S-shaped gaps at each end of the alphabet rods, allowing the scrambled alphabets to be coupled in pairs. His invention was patented in France on 4 Feb. 1931 [3]. The same patent was filed in the US on 1 December 1931 by Albert Gentet [4], who also added the movable index to each window [5]. It is currently unclear where Le Sphinx was manufactured and by whom, but it is possible that it was made by the famous slide rule manufacturer BARBOTHEU in Paris, who also manufactured the 1912 version [7]. The original Transpositeur is further described in an article by Daniel Tant [8]. 1. 'Le Sphinx' is French for 'The Sphinx'. Also see the discussion about the name. 2. This is just an assumption. There is no reason why it could not be used the other way around, as long as both parties do it in the same way. Mixers Phones FILL Codebooks Spy radio Burst encoders Intercept Covert Controls The diagram below gives an overview of the various features of Le Sphinx. The device measures just 162 x 87 x 20 mm and consist of a die-cast metal alloy frame with 10 cogwheel driven lanes, each of which accomodates two physically locked scrambled alphabets. This effectively results in 10 different transposition ciphers that allow the text to be enciphered in groups of 10 letters.

2 sur 5 17/04/2016 18:59 Radio PC Telex People Agencies Manufacturers Donate Kits Shop News Events Wanted Contact About Links On top of the device are two horizontal windows: one for the plaintext and one for the ciphertext. The position of the rods or rulers with the alphabets can be altered by means of 10 treaded knobs at the right side. Each knob drives a cogwheel that in turn engages the teeth at the bottom of a rod. Each position has a 'click' to ensure that the letters are properly shown in the windows. Name Le Sphinx The pocket cryptographic device featured on this page, was marketed by Société des Codes Télégraphiques Georges Lugagne, which had offices in Paris and Marseille (France). It is currently unclear under what name the device was sold, but since the bakelite storage case holds a raised image of a sphinx, it is commonly referred to as SPHINX. The metal label at the left side of the device shows the company name and the image of the sphinx, with the text 'LE SPHINX' (the sphinx). In order to distinguish it from the Sphinx Cipher Machine, we will call it 'Le Sphinx'. The name 'Sphinx' originates from the Greek language and represents a mythical creature that generally consists of the body of a lion with the head of a human. In Greek tradition it may also have the wings of a bird. Sphinx' also exist in Egyptian culture (e.g. Great Sphinx of Giza) [9]. Permutations When calculating the total number of combinations that can be made with the device, we will first look at the original design of 1912. It had 20 alphabet rulers, 10 of which were intended as the upper alphabets and the other 10 were the lower alphabets [1]. This gives us 10! (or 3,628,800) possible combinations of alphabets 1 for the upper half only. As the same is true for the lower half, the total number of combinations would be 3,628,800 x 3,628,800, which is no less than: 13,168,189,440,000 After the design had been improved by Paul Godillon in 1931, there was no longer a differece between the upper and the lower alphabets, allowing them to be mixed freely [3]. As a result the total number of combinations in which the 20 alphabets can be mixed, increased to 20! or: 2,432,902,008,176,640,000

3 sur 5 17/04/2016 18:59 1. 10! is the mathematical notation for 10 x 9 x 8 x 7 x 6 x 5 x 4 x 3 x 2 x 1 Operation Before exchanging a message by means of Le Sphinx, both parties first have to agree which alphabet is used in each position. This is done by quoting the red number that is printed on the top of each rod. This is known as the settings or the key and is usually pre-arranged between the parties. For the default position, which we have used on this page, the key would be: 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20 Both users should now install the alphabets in the order indicated on the key sheet. Each pair (e.g. 01-11) should be coupled by fitting the S-shaped gap at the top of the lower alphabet into the S-shaped gap at the bottom of the upper alphabet. For the above key, the setup would be: Le Sphinx is constructed in such a way that the user can move the rulers by means of treaded knobs at the right side. There are 5 sets of two knobs. The leftmost knobs (i.e. the larger ones) are used to control the rightmost 5 lanes, whilst the rightmost knobs control the leftmost 5 lanes. Furthermore, there are two windows through which we can read a row of letters. Now rotate the knobs so that the first 10 letters of the plaintext are visible in the upper window, for example: TOPSECRETS All you now have to do is read the ciphertext from the lower window, which in this case is: IRUVPYQHWB All the receiving party has to do, is rotate the rulers so that the ciphertext is visible in the lower window. The original plaintext can now be read from the upper window.

4 sur 5 17/04/2016 18:59 Cipher security Despite the large number of possible arrangements of the alphabets, Le Sphinx provides only low-grade cipher security. This is mainly caused by the fact that the arrangment of the alphabets does not change during the course of a message. If a message is long enough, it can be solved by frequency analysis. For very short messages, the cipher would be relatively secure though. Another weakness of the system is that there is no provision to send the key at the start of a message. Instead, it has to be pre-arranged. This was also the case with the German Enigma cipher machine, although in that case, procedures were in place to add a random message key. Alphabets The table below shows each of the 20 scrambled alphabets of our device. Note that the alphabets are printed in the regular order, but that they are shifted by a few positions on each ruler. Also note that the alphabets on the first 10 rulers (1-10) are in ascending order, whilst the alphabets on the last 10 rulers (11-20) are in descending order. 1 ABCDEFGHIJKLMNOPQRSTUVWXYZ 2 CDEFGHIJKLMNOPQRSTUVWXYZAB 3 EFGHIJKLMNOPQRSTUVWXYZABCD 4 GHIJKLMNOPQRSTUVWXYZABCDEF 5 IJKLMNOPQRSTUVWXYZABCDEFGH 6 MNOPQRSTUVWXYZABCDEFGHIJKL 7 PQRSTUVWXYZABCDEFGHIJKLMNO 8 RSTUVWXYZABCDEFGHIJKLMNOPQ 9 TUVWXYZABCDEFGHIJKLMNOPQRS 10 VWXYZABCDEFGHIJKLMNOPQRSTU 11 BAZYXWVUTSRQPONMLKJIHGFEDC 12 DCBAZYXWVUTSRQPONMLKJIHGFE 13 FEDCBAZYXWVUTSRQPONMLKJIHG 14 HGFEDCBAZYXWVUTSRQPONMLKJI 15 LKJIHGFEDCBAZYXWVUTSRQPONM 16 ONMLKJIHGFEDCBAZYXWVUTSRQP 17 SRQPONMLKJIHGFEDCBAZYXWVUT 18 UTSRQPONMLKJIHGFEDCBAZYXWV 19 WVUTSRQPONMLKJIHGFEDCBAZYX 20 YXWVUTSRQPONMLKJIHGFEDCBAZ References 1. Georges Lugagne, French Patent 461.217 Filed 24 October 1913, granted 23 December 1913. Priority date 23 October 1912. 2. George Lugagne, British Patent 23,204 Filed 14 October 1913, granted 9 April 1914. 3. Paul Godillon, French Patent 710,604 Filed 4 February 1931, granted 27 August 1931.] 4. Albert Gentet, US Patent 1,956,384 Filed 1 December 1931, granted 24 April 1934. 5. Albert Gentet, French patent 812.481 Filed 1 February 1937, granted 11 May 1937. 6. Pendergrass to Friedman, Classified files of US Patent Office US Government Internal Memorandum, 8 October 1953. pp. 4. 7. Linialis, Règles Rares ou Originales Website Linealis.org. Retrieved April 2016. 8. Daniel Tant, Le transpositeur à permutations secrètes Date unknown. Retrieved April 2016 (French). 2 9. Wikipedia, Sphinx 1

5 sur 5 17/04/2016 18:59 Retrieved April 2016. 1. Approved for release by NSA on 16 July 2014, E.O. 13526. 2. Reproduced here by kind permission of the president of the Association des Réservistes du Chiffre et de la Sécurité de l'information. Further information Le Sphinx on Jerry Proc's crypto pages Other Lugagne cipher systems Other manual cipher methods Other cipher systems Any links shown in red are currently unavailable. If you like the information on this website, why not make a donation? Crypto Museum. Created: Friday 15 April 2016. Last changed: Friday, 15 April 2016-14:04 CET.