SlideShare uma empresa Scribd logo
1 de 52
The Math That Saved the World Brad Young brad@clearpoint.co.il A Mathematical and Historical Analysis of the Cryptographic Attacks on the Nazi Enigma Machine  Marian Rejewski Alan Turing
Agenda Development of Enigma Machine – Why/How/What The Rejewski Crack The Turing Crack Historical Impact
WWI Cryptology First major war with radio + telegraph  Very large volume of communications  Hand-ciphers Playfair, ADFGVX etc. Bigraph substitution + transformation Encryption/Decryption Inefficient …Became bottleneck Cryptanalysis Difficult, time-consuming… But successful (mainly)
Zimmermann Telegram
Invention of Enigma Machine Arthur Scherbius Efficient! (oh, and also Secure, by the way) Business, Military versions Early 1920’s – very poor sales German economy in trouble
Oops Publishes history book Reveals the impact of crypto on WWI Now, the Germans want Enigma!
A B C D E F G H Reflector 3rd Rotor 2nd Rotor 1st Rotor Lightbulbs Keyboard Enigma Schematic
A B C D E F G H Reflector Lightbulbs 3rd Rotor 2nd Rotor 1st Rotor Keyboard Electric Circuit
A B Pressing ‘A’ on the keyboard… C D E F … lights the ‘B’ lightbulb G H NOTE: Because it is a electric circuit, no letter can map to itself. Minor detail combinatorically speaking, but very important for the Turing crack. Reflector Lightbulbs 3rd Rotor 2nd Rotor 1st Rotor Keyboard Electric Circuit
A B C D E After each letter, the first rotor shifts one step. So now, pressing ‘A’ lights a different lightbulb….’F’ F G H Reflector Lightbulbs 3rd Rotor 2nd Rotor 1st Rotor Keyboard Rotor Shift
A B C D E F Sits between keyboard and rotors. Each plug cable swaps signal between two letters. 6 cables connect 12 letters. 14 other letters are not plugged at all. G H Reflector Lightbulbs Plugboard 3rd Rotor 2nd Rotor 1st Rotor Keyboard Plugboard
Plugboard
Keysize A B Rotor Order Rotor Setting Plugboard Wiring I – III - II VYJ A/G, D/Q, J/Z,L/S, M/V, N/T 3! = 6 263 =17,576 C(26,2) x C(24,2) x C(22,2) x C(20,2) x C(18,2) x C(16,2) x 1/6! (26!)3  x C(26,2)…C(2,2)x1/13! C ≈ 105 D E F ≈ 1011 ≈ 1092 G H Total Key Size ≈ 10108 Variable Key Size ≈ 1016
German Use of Enigma
German Use of Enigma Day Keys (RO, RS, PB) distributed monthly in key books ,[object Object],Encode Message Key using Day Key, twice Move rotor to Message Key setting  Encode actual message Set to Day Key(VYJ) Change to Message Key (CIL) CILCILATTACKFROMNORTHATNINETHIRTYBOKJRVSQIGPQTMNWJRAKOBYTKMTKGBBRQ
Agenda Development of Enigma Machine – Why/How/What The Rejewski Crack The Turing Crack Historical Impact
Biuro Szyfrów 1918 – Polish Independence 1919 – Creation (and success) of Cipher Bureau  1926 – Germany goes dark as Enigma is adopted 1930 – Bring in the mathematicians (?!?) Marian Rejewski Jerzy Różycki Henryk Zygalski
The Rejewski Crack Intuition,Espionage,Engineering  Understand how Enigma works Reverse-engineer the wiring Be able to crack the key each day Permutational Mathematics
The Math of Permutation Cycles  P =   P-1 =
Cycle Notation  P =   P  =  (AECH)(BFD)(G)    =    (BFD)(G) (AECH)   =     (FDB)(G)(CHAE)  P-1  =  (HCEA)(DFB)(G)   Benefits of cycle notation: Concise Easier to take inverse (These are benefits of efficiency)
Cycle Structure   =  (AECH)(BFD)(G)   P =       4          3      1   =  (AFC)(BG)(D)(EH)   Q =       3       2     1    2 Benefits of cycle notation: Concise Easier to take inverse Gives more info – Cycle Structure 	(This is a benefit of value-add information)
Composition  P =    =  (AECH)(BFD)(G)   Q =    =  (AFC)(BG)(D)(EH)   Q ◦ P =  Q(P()) =  (AHFDGBCE)  Q ◦ P ≠ P ◦ Q    - NOT Commutative  Q ◦ ( P ◦ R ) =  ( Q ◦ P ) ◦ R    - Associative
Identity   =  (A)(B)(C)(D)(E)(F)(G)(H) I =  P ◦ I  =  I ◦ P  =  P P ◦ P -1  = I I ◦ I  =  I     i.e. I = I -1 (ab) ≠ I ,   but    (ab) ◦ (ab)  = (a)(b) i.e.    (ab) = (ab)-1
Conjugation  Conjugation of Q by P is defined as  P ◦ Q ◦ P-1   P = (AECH)(BFD)(G)    P-1 = (HCEA)(DFB)(G)    Q =  (AFC)(BG)(D)(EH)  1-2-2-3 1-2-2-3 This is not a coincidence! This is not a coincidence! P ◦ Q ◦ P-1 =  (AC)(B)(DHE)(FG)
Theorem: Cycle structure is invariant under conjugation Proof: Suppose Q: ij, that is Q(i) = j. Consider P ◦ Q ◦ P-1 (P(i)). P ◦ Q ◦ P-1 (P(i))	= P ◦ Q ◦ (P-1 ◦ P)(i) 			= P ◦ Q(i) 			= P(j) i.e.   P ◦ Q ◦ P-1: P(i)P(j) Therefore… If Q has k-cycle (i1, i2 … ik)  then P ◦ Q ◦ P-1 has k-cycle (P(i1), P(i2)…P(ik)) 								QED
Using Permuation Cycles on Enigma A B Suppose we intercept a message: BOLJRVSQIGPQTMNWJRAKOBYTKMTTGBBRQUPWLHSOLNFEQTHJOVX Plaintext:  abcabcCiphertext: BOLJRV Define En as the permutation that occurs when Enigma machine is in state n. So, in the first state, aB. In the fourth state, aJ E1 = (aB …E4 = (aJ … Now…Recall the effect of the Reflector, which creates 2-letter circuits So, if aB, then Ba. So the cycle is closed. E1 = (aB) …E4 = (aJ) … So, we can now compute E4 ◦ E1 = (BJ  … C These are the variablesa,b,c, not the actual letters D E F G H
Using Permuation Cycles on Enigma If we have many intercepts from the same day, then they were produced with the same day settings.  So we can calculate the entire compositions… E4 ◦ E1 = (BJUMPWTCFE)(ARDNHSLYZK)(G)(I)(O)(Q)(X)(V)E5 ◦ E2 = (ORJCLVHGXKF)(AUYMPZQNDWB)(ES)(IT)E6 ◦ E3 = (BWOIKTZHXB)(EPQJYLVGN)(ARCU)(DSMF) Good news:  abc variables have been eliminated!   We’ve found a unique identifier! Bad news: It is one of 10,000,000,000,000,000 possibilities
Explore the nature of En A B En = P ◦  Rn ◦ P        where P is the plugboard permutation and Rn is rotor permutation when in state n E4 ◦ E1  = P ◦  R4 ◦ P ◦ P ◦  R1 ◦ P Now, recall the plugboard… P = (ab)(cd)(ef)(gh)(ij)(kl)(m)(n)(o)(p)(q)(r)(s)(t)(u)(v)(w)(x)(y)(z) All 2-cycles and 1-cycles, therefore  P = P-1   ! E4 ◦ E1  	= P ◦  R4 ◦ P ◦ P ◦  R1 ◦ P 	= P ◦  R4 ◦ P ◦ P-1  ◦  R1 ◦ P 	= P ◦  R4 ◦ (P ◦ P-1 ) ◦  R1 ◦ P 	 	= P ◦  R4  ◦  R1 ◦ P 	 	= P ◦  (R4  ◦  R1 ) ◦ P	 	= P ◦  (R4  ◦  R1 ) ◦ P-1 C P R D E F G H Conjugation:Cycle structure of E4 ◦ E1 is same as cycle structure of R4 ◦ R1 and is not affected at all by the plugboard! E4 ◦ E1 = (BJUMPWTCFE)(ARDNHSLYZK)(G)(I)(O)(Q)(X)(V)E5 ◦ E2 = (AUYMPZQNDWB)(CLVHGXKFORJ)(ES)(IT)E6 ◦ E3 = (BWOIKTZHXB)(EPQJYLVGN)(ARCU)(DSMF) 1-1-1-1-1-1-10-10    ;    2-2-11-11     ;    4-4-9-9 Remember: Keysize(R) ≈ 105 Keysize(P) ≈ 1011
Now, where are we? Figuring out En is problem of size 1016   Now, we have Rn, a smaller problem: 105 Just barely small enough to attack brute force
Building the Rejewski Dictionary  RO	RS	 E4 ◦ E1 	 E5 ◦ E2 	 E6 ◦ E3  1 2 3	AAA 	13-13	1-1-12-12	1-1-12-12  1 2 3	BAA 	1-1-12-12	1-1-12-12	2-2-11-11  1 2 3	CAA 	1-1-12-12;	2-2-11-11	1-1-12-12  1 2 3	DAA 	2-2-11-11	1-1-12-12	13-13  1 2 3	EAA 	1-1-12-12	13-13	13-13  1 2 3	FAA 	13-13	13-13	1-1-2-2-3-3-3-3-4-4  1 2 3	GAA 	13-13	1-1-2-2-3-3-3-3-4-4	2-2-5-5-6-6  1 2 3	HAA 	1-1-2-2-3-3-3-3-4-4	2-2-5-5-6-6	13-13  1 2 3	IAA 	2-2-5-5-6-6	13-13	4-4-9-9  1 2 3	JAA 	13-13	4-4-9-9	1-1-5-5-7-7  1 2 3	KAA 	4-4-9-9	1-1-5-5-7-7	13-13  1 2 3	LAA 	1-1-5-5-7-7	13-13	1-1-2-2-10-10  1 2 3	MAA 	13-13	1-1-2-2-10-10	1-1-1-1-11-11 .	.	.	.	. .	.	.	.	. .	.	.	.	. … 2-2-11-11; 1-1-1-1-1-1-1-1-4-4-5-5; 1-1-12-12	KFE 213 2-2-11-11; 1-1-1-1-1-1-1-1-4-4-5-5; 2-2-5-5-6-6	ZTF 132 2-2-11-11; 1-1-1-1-1-1-1-1-4-4-5-5; 5-5-8-8	GIC 312 2-2-11-11; 1-1-1-1-1-1-1-1-9-9; 1-1-12-12	AHH 132 2-2-11-11; 1-1-1-1-1-1-1-1-9-9; 1-1-12-12	WLA 312 2-2-11-11; 1-1-1-1-1-1-1-1-9-9; 1-1-5-5-7-7	YKG 132 2-2-11-11; 1-1-1-1-1-1-1-1-9-9; 13-13	DXI 213 2-2-11-11; 1-1-1-1-1-1-1-1-9-9; 13-13 	ESY 321 2-2-11-11; 1-1-1-1-1-1-1-1-9-9; 13-13	VHX 213 2-2-11-11; 1-1-1-1-1-1-1-1-9-9; 2-2-11-11  	UNV 231 … 1 setting every 4 minutes,  x 20 hours/day = 300 / day 105 / 300 ≈ 1 year to complete Good news; Solved the RO, RS! Bad news: 105 solved, 1011 not solved Cycle structure is not unique …even though 105 << (1012)3 ≈ 1012 But most have < 10
Recovering the Plugboard Plugboard is the biggest problem combinatorically But… It is trivial to solve E4 ◦ E1 = (BJUMPWTCFE)(ARDNHSLYZK)(G)(I)(O)(Q)(X)(V) R4 ◦ R1 = (MGWTREFBJU)(AKZCINLSHY)(P)(D)(O)(Q)(V)(X) (BJUMPWTCFE) (BJUMGWTREF) Plugboard settings:  P/G , C/R , E/F , etc.
Paradox of Decreasing Benefit Keysize # Cables
Agenda Development of Enigma Machine – Why/How/What The Rejewski Crack The Turing Crack Historical Impact
1939 – Brink of War Polish deliver Enigma replica and training to England and France  Biuro Szyfrów is dismantled
Bletchley Park HQ of British Government Code and Cypher School (GCCS)
New Challenges Combinatoric More rotors to choose from Increase # of plugs Ring settings Procedural Eliminate Message Key repetition Navy /  Air Force / Army mods Keysize now 1023
Turing’s Solution Known-Plaintext attack Heil Hitler Wetterbericht Seeding values Plaintext Crib:Ciphertext:  Try to place the crib without letter any letter mapping to itself WETTERBERICHT WETTERBERICHT WETTERBERICHT WETTERBERICHT WETTERBERICHT EXLMBTWZXBITWZCIQ P(false hit) = (25/26)length of crib
Finding Cycles WETTERBERICHT EXLMBTWZXBITW E1:  WE E5:  EB E7:  BW
J Q F b E E1 E1:  WE E5:  EB E7:  BW a W J Q J B b E E5 c J Q L B E7 c a W
J Q F b E1 a J Q J b E5 c J Q L E7 c a
M V C b E1 a M Z C b E5 c M B D E7 c a
M V C b a E1 M Z C b E5 c M B D E7 P(false hit) = (1/26)length of cycle-1 a c
Turing’s Bombe NOT a computer Multi-Enigma Wiring 120 rpm  max 6 hrs to solve ~70% of days cracked Accurate crib? Location of crib in message? Find cycle in message? Not too many false hits? Crib seeding Fake missions – Get spotted 18’26”N, 72’49”E = einachtzweisechsnordensiebenzweivierneunosten  Reimann zeta zeros
Agenda Development of Enigma Machine – Why/How/What The Rejewski Crack The Turing Crack Historical Impact
6 : 60,000,000     ::       8 : ?
Secrecy Bletchley Park is gutted Enigma machines captured (and distributed!) Top Secret status until 1973!
Marian Rejewski – During and After the War ,[object Object]
1939 – France
French cipher bureau
1940 – Algeria
1940 – Back to France
Rozycki dies in transit

Mais conteúdo relacionado

Mais procurados

Lab 4 Three-Bit Binary Adder
Lab 4 Three-Bit Binary AdderLab 4 Three-Bit Binary Adder
Lab 4 Three-Bit Binary AdderKatrina Little
 
VHdl lab report
VHdl lab reportVHdl lab report
VHdl lab reportJinesh Kb
 
Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewRamesh Nagappan
 
Quantum_Safe_Crypto_Overview_v3.pdf
Quantum_Safe_Crypto_Overview_v3.pdfQuantum_Safe_Crypto_Overview_v3.pdf
Quantum_Safe_Crypto_Overview_v3.pdfRonSteinfeld1
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptographynamanthakur
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
1 importance of light weight authentication in iot
1 importance of light weight authentication in iot1 importance of light weight authentication in iot
1 importance of light weight authentication in iotChintan Patel
 
Cryptography and network security
 Cryptography and network security Cryptography and network security
Cryptography and network securityMahipesh Satija
 
BlueHat v18 || Record now, decrypt later - future quantum computers are a pre...
BlueHat v18 || Record now, decrypt later - future quantum computers are a pre...BlueHat v18 || Record now, decrypt later - future quantum computers are a pre...
BlueHat v18 || Record now, decrypt later - future quantum computers are a pre...BlueHat Security Conference
 
Computer Security Lecture 3: Classical Encryption Techniques 2
Computer Security Lecture 3: Classical Encryption Techniques 2Computer Security Lecture 3: Classical Encryption Techniques 2
Computer Security Lecture 3: Classical Encryption Techniques 2Mohamed Loey
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptographySamy Shehata
 
Lab 9 D-Flip Flops: Shift Register and Sequence Counter
Lab 9 D-Flip Flops: Shift Register and Sequence CounterLab 9 D-Flip Flops: Shift Register and Sequence Counter
Lab 9 D-Flip Flops: Shift Register and Sequence CounterKatrina Little
 
Digital electronics lab
Digital electronics labDigital electronics lab
Digital electronics labswatymanoja
 
Computer arithmetics coa project pdf version
Computer arithmetics coa project pdf versionComputer arithmetics coa project pdf version
Computer arithmetics coa project pdf versionSuryaKumarSahani
 
vlsi projects using verilog code 2014-2015
vlsi projects using verilog code 2014-2015vlsi projects using verilog code 2014-2015
vlsi projects using verilog code 2014-2015E2MATRIX
 

Mais procurados (20)

ElGamal Encryption in Go
ElGamal Encryption in GoElGamal Encryption in Go
ElGamal Encryption in Go
 
Lab 4 Three-Bit Binary Adder
Lab 4 Three-Bit Binary AdderLab 4 Three-Bit Binary Adder
Lab 4 Three-Bit Binary Adder
 
VHdl lab report
VHdl lab reportVHdl lab report
VHdl lab report
 
Vigenere cipher
Vigenere cipherVigenere cipher
Vigenere cipher
 
Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical Overview
 
Cryptography
CryptographyCryptography
Cryptography
 
Quantum_Safe_Crypto_Overview_v3.pdf
Quantum_Safe_Crypto_Overview_v3.pdfQuantum_Safe_Crypto_Overview_v3.pdf
Quantum_Safe_Crypto_Overview_v3.pdf
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptography
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
1 importance of light weight authentication in iot
1 importance of light weight authentication in iot1 importance of light weight authentication in iot
1 importance of light weight authentication in iot
 
Cryptography and network security
 Cryptography and network security Cryptography and network security
Cryptography and network security
 
BlueHat v18 || Record now, decrypt later - future quantum computers are a pre...
BlueHat v18 || Record now, decrypt later - future quantum computers are a pre...BlueHat v18 || Record now, decrypt later - future quantum computers are a pre...
BlueHat v18 || Record now, decrypt later - future quantum computers are a pre...
 
Digital dice
Digital dice Digital dice
Digital dice
 
Computer Security Lecture 3: Classical Encryption Techniques 2
Computer Security Lecture 3: Classical Encryption Techniques 2Computer Security Lecture 3: Classical Encryption Techniques 2
Computer Security Lecture 3: Classical Encryption Techniques 2
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
 
Lab 9 D-Flip Flops: Shift Register and Sequence Counter
Lab 9 D-Flip Flops: Shift Register and Sequence CounterLab 9 D-Flip Flops: Shift Register and Sequence Counter
Lab 9 D-Flip Flops: Shift Register and Sequence Counter
 
Digital electronics lab
Digital electronics labDigital electronics lab
Digital electronics lab
 
Computer arithmetics coa project pdf version
Computer arithmetics coa project pdf versionComputer arithmetics coa project pdf version
Computer arithmetics coa project pdf version
 
vlsi projects using verilog code 2014-2015
vlsi projects using verilog code 2014-2015vlsi projects using verilog code 2014-2015
vlsi projects using verilog code 2014-2015
 

Destaque

Enigma History
Enigma HistoryEnigma History
Enigma HistoryMike Koss
 
Rotor Cipher and Enigma Machine
Rotor Cipher and Enigma MachineRotor Cipher and Enigma Machine
Rotor Cipher and Enigma MachineSaurabh Kaushik
 
Paper Enigma Machine
Paper Enigma MachinePaper Enigma Machine
Paper Enigma MachineMike Koss
 
The imatatation game
The imatatation gameThe imatatation game
The imatatation gamepheobewebb
 
The trans-Turing Machine
The trans-Turing MachineThe trans-Turing Machine
The trans-Turing MachineGabor Vattay
 
Alan turing's work before, during & after bletchley park
Alan turing's work before, during & after bletchley parkAlan turing's work before, during & after bletchley park
Alan turing's work before, during & after bletchley parkDavid Bew
 
Compensatory projects
Compensatory projectsCompensatory projects
Compensatory projectsalizisnana
 
The enigma machine lesson 2
The enigma machine lesson 2The enigma machine lesson 2
The enigma machine lesson 24011cassandra
 
Enigma matemàtiques
Enigma matemàtiquesEnigma matemàtiques
Enigma matemàtiquesescolamura
 
The Engima Cipher
The Engima CipherThe Engima Cipher
The Engima Cipherguestfaf89d
 
Fund Raising with an Android Enigma Machine Simulator
Fund Raising with an Android Enigma Machine SimulatorFund Raising with an Android Enigma Machine Simulator
Fund Raising with an Android Enigma Machine SimulatorCraig Heath
 
งานคอมพิวเตอร์
งานคอมพิวเตอร์งานคอมพิวเตอร์
งานคอมพิวเตอร์khwanjai
 
Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography SystemRaju Raj
 
Pin Ups with Funny Cats
Pin Ups with Funny CatsPin Ups with Funny Cats
Pin Ups with Funny Catsmaditabalnco
 
Charles de gaulle
Charles de gaulleCharles de gaulle
Charles de gaulleeftihia67
 
MatheMatics and Modern World
MatheMatics and Modern WorldMatheMatics and Modern World
MatheMatics and Modern WorldTanish Aggarwal
 

Destaque (20)

Enigma History
Enigma HistoryEnigma History
Enigma History
 
Enigma
EnigmaEnigma
Enigma
 
Rotor Cipher and Enigma Machine
Rotor Cipher and Enigma MachineRotor Cipher and Enigma Machine
Rotor Cipher and Enigma Machine
 
Paper Enigma Machine
Paper Enigma MachinePaper Enigma Machine
Paper Enigma Machine
 
The imatatation game
The imatatation gameThe imatatation game
The imatatation game
 
The trans-Turing Machine
The trans-Turing MachineThe trans-Turing Machine
The trans-Turing Machine
 
Alan turing's work before, during & after bletchley park
Alan turing's work before, during & after bletchley parkAlan turing's work before, during & after bletchley park
Alan turing's work before, during & after bletchley park
 
Compensatory projects
Compensatory projectsCompensatory projects
Compensatory projects
 
The enigma machine lesson 2
The enigma machine lesson 2The enigma machine lesson 2
The enigma machine lesson 2
 
Enigma matemàtiques
Enigma matemàtiquesEnigma matemàtiques
Enigma matemàtiques
 
The Engima Cipher
The Engima CipherThe Engima Cipher
The Engima Cipher
 
Fund Raising with an Android Enigma Machine Simulator
Fund Raising with an Android Enigma Machine SimulatorFund Raising with an Android Enigma Machine Simulator
Fund Raising with an Android Enigma Machine Simulator
 
Turing machine
Turing machineTuring machine
Turing machine
 
งานคอมพิวเตอร์
งานคอมพิวเตอร์งานคอมพิวเตอร์
งานคอมพิวเตอร์
 
Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography System
 
Funny Cats
Funny CatsFunny Cats
Funny Cats
 
Pin Ups with Funny Cats
Pin Ups with Funny CatsPin Ups with Funny Cats
Pin Ups with Funny Cats
 
Turing machines
Turing machinesTuring machines
Turing machines
 
Charles de gaulle
Charles de gaulleCharles de gaulle
Charles de gaulle
 
MatheMatics and Modern World
MatheMatics and Modern WorldMatheMatics and Modern World
MatheMatics and Modern World
 

Semelhante a Cracking the Enigma Machine - Rejewski, Turing and the Math that saved the world

RF Module Design - [Chapter 1] From Basics to RF Transceivers
RF Module Design - [Chapter 1] From Basics to RF TransceiversRF Module Design - [Chapter 1] From Basics to RF Transceivers
RF Module Design - [Chapter 1] From Basics to RF TransceiversSimen Li
 
Multiband Transceivers - [Chapter 1]
Multiband Transceivers - [Chapter 1] Multiband Transceivers - [Chapter 1]
Multiband Transceivers - [Chapter 1] Simen Li
 
Graph Modification: Beyond the known Boundaries
Graph Modification: Beyond the known BoundariesGraph Modification: Beyond the known Boundaries
Graph Modification: Beyond the known BoundariesAkankshaAgrawal55
 
Phase diagram at finite T & Mu in strong coupling limit of lattice QCD
Phase diagram at finite T & Mu in strong coupling limit of lattice QCDPhase diagram at finite T & Mu in strong coupling limit of lattice QCD
Phase diagram at finite T & Mu in strong coupling limit of lattice QCDBenjamin Jaedon Choi
 
A verifiable random function with short proofs and keys
A verifiable random function with short proofs and keysA verifiable random function with short proofs and keys
A verifiable random function with short proofs and keysAleksandr Yampolskiy
 
[Question Paper] Fundamentals of Digital Computing (Revised Course) [April / ...
[Question Paper] Fundamentals of Digital Computing (Revised Course) [April / ...[Question Paper] Fundamentals of Digital Computing (Revised Course) [April / ...
[Question Paper] Fundamentals of Digital Computing (Revised Course) [April / ...Mumbai B.Sc.IT Study
 
Hermite integrators and Riordan arrays
Hermite integrators and Riordan arraysHermite integrators and Riordan arrays
Hermite integrators and Riordan arraysKeigo Nitadori
 
Declarative Datalog Debugging for Mere Mortals
Declarative Datalog Debugging for Mere MortalsDeclarative Datalog Debugging for Mere Mortals
Declarative Datalog Debugging for Mere MortalsBertram Ludäscher
 
Digital Signals and System (October – 2016) [Revised Syllabus | Question Paper]
Digital Signals and System (October  – 2016) [Revised Syllabus | Question Paper]Digital Signals and System (October  – 2016) [Revised Syllabus | Question Paper]
Digital Signals and System (October – 2016) [Revised Syllabus | Question Paper]Mumbai B.Sc.IT Study
 
Metodo Monte Carlo -Wang Landau
Metodo Monte Carlo -Wang LandauMetodo Monte Carlo -Wang Landau
Metodo Monte Carlo -Wang Landauangely alcendra
 
[Question Paper] Fundamentals of Digital Computing (Revised Course) [January ...
[Question Paper] Fundamentals of Digital Computing (Revised Course) [January ...[Question Paper] Fundamentals of Digital Computing (Revised Course) [January ...
[Question Paper] Fundamentals of Digital Computing (Revised Course) [January ...Mumbai B.Sc.IT Study
 
RF Circuit Design - [Ch1-1] Sinusoidal Steady-state Analysis
RF Circuit Design - [Ch1-1] Sinusoidal Steady-state AnalysisRF Circuit Design - [Ch1-1] Sinusoidal Steady-state Analysis
RF Circuit Design - [Ch1-1] Sinusoidal Steady-state AnalysisSimen Li
 
Circuit Network Analysis - [Chapter2] Sinusoidal Steady-state Analysis
Circuit Network Analysis - [Chapter2] Sinusoidal Steady-state AnalysisCircuit Network Analysis - [Chapter2] Sinusoidal Steady-state Analysis
Circuit Network Analysis - [Chapter2] Sinusoidal Steady-state AnalysisSimen Li
 
What we got from the Predicting Red Hat Business Value competition
What we got from the Predicting Red Hat Business Value competitionWhat we got from the Predicting Red Hat Business Value competition
What we got from the Predicting Red Hat Business Value competitionUmaporn Kerdsaeng
 

Semelhante a Cracking the Enigma Machine - Rejewski, Turing and the Math that saved the world (20)

RF Module Design - [Chapter 1] From Basics to RF Transceivers
RF Module Design - [Chapter 1] From Basics to RF TransceiversRF Module Design - [Chapter 1] From Basics to RF Transceivers
RF Module Design - [Chapter 1] From Basics to RF Transceivers
 
Multiband Transceivers - [Chapter 1]
Multiband Transceivers - [Chapter 1] Multiband Transceivers - [Chapter 1]
Multiband Transceivers - [Chapter 1]
 
Graph Modification: Beyond the known Boundaries
Graph Modification: Beyond the known BoundariesGraph Modification: Beyond the known Boundaries
Graph Modification: Beyond the known Boundaries
 
Phase diagram at finite T & Mu in strong coupling limit of lattice QCD
Phase diagram at finite T & Mu in strong coupling limit of lattice QCDPhase diagram at finite T & Mu in strong coupling limit of lattice QCD
Phase diagram at finite T & Mu in strong coupling limit of lattice QCD
 
A verifiable random function with short proofs and keys
A verifiable random function with short proofs and keysA verifiable random function with short proofs and keys
A verifiable random function with short proofs and keys
 
[Question Paper] Fundamentals of Digital Computing (Revised Course) [April / ...
[Question Paper] Fundamentals of Digital Computing (Revised Course) [April / ...[Question Paper] Fundamentals of Digital Computing (Revised Course) [April / ...
[Question Paper] Fundamentals of Digital Computing (Revised Course) [April / ...
 
diss_present
diss_presentdiss_present
diss_present
 
Cs262 2006 lecture6
Cs262 2006 lecture6Cs262 2006 lecture6
Cs262 2006 lecture6
 
Hermite integrators and Riordan arrays
Hermite integrators and Riordan arraysHermite integrators and Riordan arrays
Hermite integrators and Riordan arrays
 
Declarative Datalog Debugging for Mere Mortals
Declarative Datalog Debugging for Mere MortalsDeclarative Datalog Debugging for Mere Mortals
Declarative Datalog Debugging for Mere Mortals
 
Digital Signals and System (October – 2016) [Revised Syllabus | Question Paper]
Digital Signals and System (October  – 2016) [Revised Syllabus | Question Paper]Digital Signals and System (October  – 2016) [Revised Syllabus | Question Paper]
Digital Signals and System (October – 2016) [Revised Syllabus | Question Paper]
 
DES Block Cipher Hao Qi
DES Block Cipher Hao QiDES Block Cipher Hao Qi
DES Block Cipher Hao Qi
 
Metodo Monte Carlo -Wang Landau
Metodo Monte Carlo -Wang LandauMetodo Monte Carlo -Wang Landau
Metodo Monte Carlo -Wang Landau
 
07_Digital timing_&_Pipelining.ppt
07_Digital timing_&_Pipelining.ppt07_Digital timing_&_Pipelining.ppt
07_Digital timing_&_Pipelining.ppt
 
[Question Paper] Fundamentals of Digital Computing (Revised Course) [January ...
[Question Paper] Fundamentals of Digital Computing (Revised Course) [January ...[Question Paper] Fundamentals of Digital Computing (Revised Course) [January ...
[Question Paper] Fundamentals of Digital Computing (Revised Course) [January ...
 
cwit-poster_logo
cwit-poster_logocwit-poster_logo
cwit-poster_logo
 
RF Circuit Design - [Ch1-1] Sinusoidal Steady-state Analysis
RF Circuit Design - [Ch1-1] Sinusoidal Steady-state AnalysisRF Circuit Design - [Ch1-1] Sinusoidal Steady-state Analysis
RF Circuit Design - [Ch1-1] Sinusoidal Steady-state Analysis
 
m.tech final
m.tech finalm.tech final
m.tech final
 
Circuit Network Analysis - [Chapter2] Sinusoidal Steady-state Analysis
Circuit Network Analysis - [Chapter2] Sinusoidal Steady-state AnalysisCircuit Network Analysis - [Chapter2] Sinusoidal Steady-state Analysis
Circuit Network Analysis - [Chapter2] Sinusoidal Steady-state Analysis
 
What we got from the Predicting Red Hat Business Value competition
What we got from the Predicting Red Hat Business Value competitionWhat we got from the Predicting Red Hat Business Value competition
What we got from the Predicting Red Hat Business Value competition
 

Último

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 

Último (20)

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 

Cracking the Enigma Machine - Rejewski, Turing and the Math that saved the world

  • 1. The Math That Saved the World Brad Young brad@clearpoint.co.il A Mathematical and Historical Analysis of the Cryptographic Attacks on the Nazi Enigma Machine Marian Rejewski Alan Turing
  • 2. Agenda Development of Enigma Machine – Why/How/What The Rejewski Crack The Turing Crack Historical Impact
  • 3. WWI Cryptology First major war with radio + telegraph Very large volume of communications Hand-ciphers Playfair, ADFGVX etc. Bigraph substitution + transformation Encryption/Decryption Inefficient …Became bottleneck Cryptanalysis Difficult, time-consuming… But successful (mainly)
  • 5. Invention of Enigma Machine Arthur Scherbius Efficient! (oh, and also Secure, by the way) Business, Military versions Early 1920’s – very poor sales German economy in trouble
  • 6. Oops Publishes history book Reveals the impact of crypto on WWI Now, the Germans want Enigma!
  • 7. A B C D E F G H Reflector 3rd Rotor 2nd Rotor 1st Rotor Lightbulbs Keyboard Enigma Schematic
  • 8. A B C D E F G H Reflector Lightbulbs 3rd Rotor 2nd Rotor 1st Rotor Keyboard Electric Circuit
  • 9. A B Pressing ‘A’ on the keyboard… C D E F … lights the ‘B’ lightbulb G H NOTE: Because it is a electric circuit, no letter can map to itself. Minor detail combinatorically speaking, but very important for the Turing crack. Reflector Lightbulbs 3rd Rotor 2nd Rotor 1st Rotor Keyboard Electric Circuit
  • 10. A B C D E After each letter, the first rotor shifts one step. So now, pressing ‘A’ lights a different lightbulb….’F’ F G H Reflector Lightbulbs 3rd Rotor 2nd Rotor 1st Rotor Keyboard Rotor Shift
  • 11. A B C D E F Sits between keyboard and rotors. Each plug cable swaps signal between two letters. 6 cables connect 12 letters. 14 other letters are not plugged at all. G H Reflector Lightbulbs Plugboard 3rd Rotor 2nd Rotor 1st Rotor Keyboard Plugboard
  • 13. Keysize A B Rotor Order Rotor Setting Plugboard Wiring I – III - II VYJ A/G, D/Q, J/Z,L/S, M/V, N/T 3! = 6 263 =17,576 C(26,2) x C(24,2) x C(22,2) x C(20,2) x C(18,2) x C(16,2) x 1/6! (26!)3 x C(26,2)…C(2,2)x1/13! C ≈ 105 D E F ≈ 1011 ≈ 1092 G H Total Key Size ≈ 10108 Variable Key Size ≈ 1016
  • 14. German Use of Enigma
  • 15.
  • 16. Agenda Development of Enigma Machine – Why/How/What The Rejewski Crack The Turing Crack Historical Impact
  • 17. Biuro Szyfrów 1918 – Polish Independence 1919 – Creation (and success) of Cipher Bureau 1926 – Germany goes dark as Enigma is adopted 1930 – Bring in the mathematicians (?!?) Marian Rejewski Jerzy Różycki Henryk Zygalski
  • 18. The Rejewski Crack Intuition,Espionage,Engineering Understand how Enigma works Reverse-engineer the wiring Be able to crack the key each day Permutational Mathematics
  • 19. The Math of Permutation Cycles P = P-1 =
  • 20. Cycle Notation P = P = (AECH)(BFD)(G) = (BFD)(G) (AECH) = (FDB)(G)(CHAE) P-1 = (HCEA)(DFB)(G) Benefits of cycle notation: Concise Easier to take inverse (These are benefits of efficiency)
  • 21. Cycle Structure = (AECH)(BFD)(G) P = 4 3 1 = (AFC)(BG)(D)(EH) Q = 3 2 1 2 Benefits of cycle notation: Concise Easier to take inverse Gives more info – Cycle Structure (This is a benefit of value-add information)
  • 22. Composition P = = (AECH)(BFD)(G) Q = = (AFC)(BG)(D)(EH) Q ◦ P = Q(P()) = (AHFDGBCE) Q ◦ P ≠ P ◦ Q - NOT Commutative Q ◦ ( P ◦ R ) = ( Q ◦ P ) ◦ R - Associative
  • 23. Identity = (A)(B)(C)(D)(E)(F)(G)(H) I = P ◦ I = I ◦ P = P P ◦ P -1 = I I ◦ I = I i.e. I = I -1 (ab) ≠ I , but (ab) ◦ (ab) = (a)(b) i.e. (ab) = (ab)-1
  • 24. Conjugation Conjugation of Q by P is defined as P ◦ Q ◦ P-1 P = (AECH)(BFD)(G) P-1 = (HCEA)(DFB)(G) Q = (AFC)(BG)(D)(EH) 1-2-2-3 1-2-2-3 This is not a coincidence! This is not a coincidence! P ◦ Q ◦ P-1 = (AC)(B)(DHE)(FG)
  • 25. Theorem: Cycle structure is invariant under conjugation Proof: Suppose Q: ij, that is Q(i) = j. Consider P ◦ Q ◦ P-1 (P(i)). P ◦ Q ◦ P-1 (P(i)) = P ◦ Q ◦ (P-1 ◦ P)(i) = P ◦ Q(i) = P(j) i.e. P ◦ Q ◦ P-1: P(i)P(j) Therefore… If Q has k-cycle (i1, i2 … ik) then P ◦ Q ◦ P-1 has k-cycle (P(i1), P(i2)…P(ik)) QED
  • 26. Using Permuation Cycles on Enigma A B Suppose we intercept a message: BOLJRVSQIGPQTMNWJRAKOBYTKMTTGBBRQUPWLHSOLNFEQTHJOVX Plaintext: abcabcCiphertext: BOLJRV Define En as the permutation that occurs when Enigma machine is in state n. So, in the first state, aB. In the fourth state, aJ E1 = (aB …E4 = (aJ … Now…Recall the effect of the Reflector, which creates 2-letter circuits So, if aB, then Ba. So the cycle is closed. E1 = (aB) …E4 = (aJ) … So, we can now compute E4 ◦ E1 = (BJ … C These are the variablesa,b,c, not the actual letters D E F G H
  • 27. Using Permuation Cycles on Enigma If we have many intercepts from the same day, then they were produced with the same day settings. So we can calculate the entire compositions… E4 ◦ E1 = (BJUMPWTCFE)(ARDNHSLYZK)(G)(I)(O)(Q)(X)(V)E5 ◦ E2 = (ORJCLVHGXKF)(AUYMPZQNDWB)(ES)(IT)E6 ◦ E3 = (BWOIKTZHXB)(EPQJYLVGN)(ARCU)(DSMF) Good news: abc variables have been eliminated! We’ve found a unique identifier! Bad news: It is one of 10,000,000,000,000,000 possibilities
  • 28. Explore the nature of En A B En = P ◦ Rn ◦ P where P is the plugboard permutation and Rn is rotor permutation when in state n E4 ◦ E1 = P ◦ R4 ◦ P ◦ P ◦ R1 ◦ P Now, recall the plugboard… P = (ab)(cd)(ef)(gh)(ij)(kl)(m)(n)(o)(p)(q)(r)(s)(t)(u)(v)(w)(x)(y)(z) All 2-cycles and 1-cycles, therefore P = P-1 ! E4 ◦ E1 = P ◦ R4 ◦ P ◦ P ◦ R1 ◦ P = P ◦ R4 ◦ P ◦ P-1 ◦ R1 ◦ P = P ◦ R4 ◦ (P ◦ P-1 ) ◦ R1 ◦ P = P ◦ R4 ◦ R1 ◦ P = P ◦ (R4 ◦ R1 ) ◦ P = P ◦ (R4 ◦ R1 ) ◦ P-1 C P R D E F G H Conjugation:Cycle structure of E4 ◦ E1 is same as cycle structure of R4 ◦ R1 and is not affected at all by the plugboard! E4 ◦ E1 = (BJUMPWTCFE)(ARDNHSLYZK)(G)(I)(O)(Q)(X)(V)E5 ◦ E2 = (AUYMPZQNDWB)(CLVHGXKFORJ)(ES)(IT)E6 ◦ E3 = (BWOIKTZHXB)(EPQJYLVGN)(ARCU)(DSMF) 1-1-1-1-1-1-10-10 ; 2-2-11-11 ; 4-4-9-9 Remember: Keysize(R) ≈ 105 Keysize(P) ≈ 1011
  • 29. Now, where are we? Figuring out En is problem of size 1016 Now, we have Rn, a smaller problem: 105 Just barely small enough to attack brute force
  • 30. Building the Rejewski Dictionary RO RS E4 ◦ E1 E5 ◦ E2 E6 ◦ E3 1 2 3 AAA 13-13 1-1-12-12 1-1-12-12 1 2 3 BAA 1-1-12-12 1-1-12-12 2-2-11-11 1 2 3 CAA 1-1-12-12; 2-2-11-11 1-1-12-12 1 2 3 DAA 2-2-11-11 1-1-12-12 13-13 1 2 3 EAA 1-1-12-12 13-13 13-13 1 2 3 FAA 13-13 13-13 1-1-2-2-3-3-3-3-4-4 1 2 3 GAA 13-13 1-1-2-2-3-3-3-3-4-4 2-2-5-5-6-6 1 2 3 HAA 1-1-2-2-3-3-3-3-4-4 2-2-5-5-6-6 13-13 1 2 3 IAA 2-2-5-5-6-6 13-13 4-4-9-9 1 2 3 JAA 13-13 4-4-9-9 1-1-5-5-7-7 1 2 3 KAA 4-4-9-9 1-1-5-5-7-7 13-13 1 2 3 LAA 1-1-5-5-7-7 13-13 1-1-2-2-10-10 1 2 3 MAA 13-13 1-1-2-2-10-10 1-1-1-1-11-11 . . . . . . . . . . . . . . . … 2-2-11-11; 1-1-1-1-1-1-1-1-4-4-5-5; 1-1-12-12 KFE 213 2-2-11-11; 1-1-1-1-1-1-1-1-4-4-5-5; 2-2-5-5-6-6 ZTF 132 2-2-11-11; 1-1-1-1-1-1-1-1-4-4-5-5; 5-5-8-8 GIC 312 2-2-11-11; 1-1-1-1-1-1-1-1-9-9; 1-1-12-12 AHH 132 2-2-11-11; 1-1-1-1-1-1-1-1-9-9; 1-1-12-12 WLA 312 2-2-11-11; 1-1-1-1-1-1-1-1-9-9; 1-1-5-5-7-7 YKG 132 2-2-11-11; 1-1-1-1-1-1-1-1-9-9; 13-13 DXI 213 2-2-11-11; 1-1-1-1-1-1-1-1-9-9; 13-13 ESY 321 2-2-11-11; 1-1-1-1-1-1-1-1-9-9; 13-13 VHX 213 2-2-11-11; 1-1-1-1-1-1-1-1-9-9; 2-2-11-11 UNV 231 … 1 setting every 4 minutes, x 20 hours/day = 300 / day 105 / 300 ≈ 1 year to complete Good news; Solved the RO, RS! Bad news: 105 solved, 1011 not solved Cycle structure is not unique …even though 105 << (1012)3 ≈ 1012 But most have < 10
  • 31. Recovering the Plugboard Plugboard is the biggest problem combinatorically But… It is trivial to solve E4 ◦ E1 = (BJUMPWTCFE)(ARDNHSLYZK)(G)(I)(O)(Q)(X)(V) R4 ◦ R1 = (MGWTREFBJU)(AKZCINLSHY)(P)(D)(O)(Q)(V)(X) (BJUMPWTCFE) (BJUMGWTREF) Plugboard settings: P/G , C/R , E/F , etc.
  • 32. Paradox of Decreasing Benefit Keysize # Cables
  • 33. Agenda Development of Enigma Machine – Why/How/What The Rejewski Crack The Turing Crack Historical Impact
  • 34. 1939 – Brink of War Polish deliver Enigma replica and training to England and France Biuro Szyfrów is dismantled
  • 35. Bletchley Park HQ of British Government Code and Cypher School (GCCS)
  • 36. New Challenges Combinatoric More rotors to choose from Increase # of plugs Ring settings Procedural Eliminate Message Key repetition Navy / Air Force / Army mods Keysize now 1023
  • 37. Turing’s Solution Known-Plaintext attack Heil Hitler Wetterbericht Seeding values Plaintext Crib:Ciphertext: Try to place the crib without letter any letter mapping to itself WETTERBERICHT WETTERBERICHT WETTERBERICHT WETTERBERICHT WETTERBERICHT EXLMBTWZXBITWZCIQ P(false hit) = (25/26)length of crib
  • 38. Finding Cycles WETTERBERICHT EXLMBTWZXBITW E1: WE E5: EB E7: BW
  • 39. J Q F b E E1 E1: WE E5: EB E7: BW a W J Q J B b E E5 c J Q L B E7 c a W
  • 40. J Q F b E1 a J Q J b E5 c J Q L E7 c a
  • 41. M V C b E1 a M Z C b E5 c M B D E7 c a
  • 42. M V C b a E1 M Z C b E5 c M B D E7 P(false hit) = (1/26)length of cycle-1 a c
  • 43. Turing’s Bombe NOT a computer Multi-Enigma Wiring 120 rpm  max 6 hrs to solve ~70% of days cracked Accurate crib? Location of crib in message? Find cycle in message? Not too many false hits? Crib seeding Fake missions – Get spotted 18’26”N, 72’49”E = einachtzweisechsnordensiebenzweivierneunosten Reimann zeta zeros
  • 44. Agenda Development of Enigma Machine – Why/How/What The Rejewski Crack The Turing Crack Historical Impact
  • 45. 6 : 60,000,000 :: 8 : ?
  • 46. Secrecy Bletchley Park is gutted Enigma machines captured (and distributed!) Top Secret status until 1973!
  • 47.
  • 51. 1940 – Back to France
  • 52. Rozycki dies in transit
  • 57. 1942 – Portugal, Gibraltar
  • 59. No security clearance (Vichy France)
  • 60. Polish Army – hand ciphers
  • 62. 1950 – Cable salesman
  • 66. 1973 – Finally learns about ULTRA
  • 67.
  • 68. Colossus Computer Cracks Lorenz cipher High-level German communications History of Computers Z3 Colossus ENIAC Mark I
  • 69. NSA
  • 70. Addenda, Errata, Anecdotes Wiring analysis Hans Thilo-Schmidt TTTTTTTTTTTT Entry wheel order Why E1-E6, instead of E0-E5 ? Ring Settings and Rotor Stepping “Turing. Alan Turing.” Other WWII Cryptanalysis Disguising ULTRA intelligence Suggested Reading David Kahn – The Codebreakers Simon Singh – The Code Book