共查询到20条相似文献,搜索用时 15 毫秒
1.
Robert Morris 《Cryptologia》2013,37(3):267-289
It is an Interesting and useful cryptanalytic problem to try to reconstruct the internal settings of the M-209 cipher machine, given the text of a message which has been obtained both in clear and enciphered form. Then it is considerably easier to decipher any further messages encrypted with the same internal settings. It turns out to be possible to do this reconstruction for rather short messages, of the order of 75 characters or so. Partial or incomplete solutions are generally possible with as few as 50 characters. 相似文献
2.
The wiring of rotors in the naval version of Enigma is given (including that of beta and gamma) and events leading to the introduction of Triton, a cipher for Atlantic U-boats, are described. It is shown that an alpha rotor did not enter service, and that Triton became operational in October 1941. 相似文献
3.
David H. Hamer 《Cryptologia》2013,37(1):41-54
G-312, an Abwehr Enigma in the collection of The Bletchley Park Trust is presented together with details of its internal mechanism and wheel wiring. 相似文献
4.
James J. Gillogly 《Cryptologia》2013,37(4):405-413
Enigma messages can be solved by recovering the message key settings, the ring settings, and the plug settings individually. Recovery of the message key setting is sensitive enough to distinguish the correct rotor order. The method is demonstrated on a 647-letter message, and its performance is estimated for different message lengths and numbers of plugs used. 相似文献
5.
A list of important events in the making and breaking of the German Enigma cipher machine of World War II is given in the order of their occurrences. 相似文献
6.
John Lawrence 《Cryptologia》2013,37(4):343-366
We prove a generalization of a theorem of Rejewski. This theorem shows how one can solve an equation of the form XY=α in a symmetric group, where α is a given permutation and X and Y are each of order two with a specified number of disjoint transpositions. The number of solutions is also part of the theorem. Using this theorem we outline what we believe was the Polish solution (or very close to it) to the Enigma assuming that one had no data from daily keys. With some assumptions on independence of events, we show that the Polish Cipher Bureau would probably have broken the Enigma in just over four years. 相似文献
7.
David Kahn 《Cryptologia》2013,37(4):331-333
The effectiveness of Alan Turing's original bombe design is discussed in this article along with organizational methods of implementing it via a microcomputer. To illustrate the material presented, a three part German Werhmacht message is solved. 相似文献
8.
John Lawrence 《Cryptologia》2013,37(2):149-152
We show that the recovery of the wiring of the second rotor of the Enigma does not depend on the rotors being reordered. 相似文献
9.
David Link 《Cryptologia》2013,37(2):166-182
Abstract The procedure executed on the Polish Bomba Kryptologiczna is reconstructed on the basis of Marian Rejewski's accounts and simulative experiment. An original Wehrmacht message from the period in question is broken to illustrate the effectiveness of the hardware and the routines employed. The authenticity of the indicators given in Rejewski's first and later reports is investigated and the circuitry of a simplified version of the bomba presented. 相似文献
10.
Abstract Dr. Donald H. Menzel is well known for his work in astronomy, but his cryptologic work has never received a thorough review. The present article describes how his interest in this area was first sparked and provides the details of the secret class he led in “Naval Communications” (really cryptanalysis) at Radcliffe College during World War II. This class served as a prototype and was copied elsewhere. A sketch of some of the classified work he carried out during the war, and after, as a consultant, is also included, along with a brief overview of Menzel's personality and other interests. 相似文献
11.
José Ramón Soler Fuensanta Francisco Javier López-Brea Espiau Frode Weierud 《Cryptologia》2013,37(4):301-328
Abstract The presentation of a brief study of the use of Enigma Machines in Spain, during the Spanish Civil War (1936–1939) and later, until their final replacement. 相似文献
12.
During the last few months of 1932, the Polish mathematician Marian Rejewski solved the problem of finding the internal connections of the rotors and reflector of the Enigma cipher machine used by the German army at that time. This allowed the Polish Cipher Bureau to construct an analogue of the machine, and subsequently to find effective methods for deciphering secret messages. Rejewski performed this feat virtually alone using cryptographic material provided by the Polish secret services. His knowledge of the theory of permutation groups was essential in solving this problem.
This article describes in detail how to find the complete wiring of the rotors and reflector of Enigma, as well as other specifics, using data that Rejewski had at his disposal, by systematically presenting the resolution of all cases that could have been encountered. Similarly, we complete those stages of the procedure that were only outlined by Rejewski. 相似文献
13.
Louis Kruh 《Cryptologia》2013,37(2):78-82
The third Britisher who, in addition to Alastair Denniston and Dillwyn Knox, met the Poles near Pyry in 1939 to to receive a copy of the Enigma machine has been wrongly identified as Stewart Menzies, head of the British foreign Intelligence service. In fact he was Humphrey Sandwith, head of the Admiralty's interception and direction-finding service. 相似文献
14.
Umkehrwalze A was the original reflector used in the version of the Enigma machine employed by the German armed services. Its wiring was originally deduced by the Polish cryptanalyst Marian Rejewski in December 1932 or January 1933, but details of the wiring have not previously been published. Sufficient information to recover the wiring analytically is provided in a wartime document by Alan Turing, and other sources have been found to confirm the solution. This paper presents the wiring, along with alternative methods of recovering it from Turing's data. 相似文献
15.
LOUIS KRUH 《Cryptologia》2013,37(2):126-127
AbstractFialka M-125 (sometimes called the “Russian Enigma”) is an electro-mechanical rotor cipher machine used during the Cold War. The designers of this cipher eliminated the known weaknesses of Enigma. In this article, the authors summarize the main principle of the Fialka algorithm from public sources. Moreover, they introduce a mathematical model of the Fialka cipher, and they analyse the effect of blocking pin settings on the cipher's period. 相似文献
16.
Abstract Simplified AES was developed in 2003, as a teaching tool to help students understand AES. It was designed so that the two primary attacks on symmetric-key block ciphers of that time, differential cryptanalysis and linear cryptanalysis, are not trivial on simplified AES. Algebraic cryptanalysis is a technique that uses modern equation solvers to attack cryptographic algorithms. We will use algebraic cryptanalysis to attack simplified AES. 相似文献
17.
WILLIAM P. BUNDY 《Cryptologia》2013,37(1):65-74
The Enigma cipher machine had the confidence of German forces who depended upon its security. This misplaced confidence was due in part to the large key space the machine provided. This paper derives for the first time the exact number of theoretical cryptographic key settings and machine configurations for the Enigma cipher machine. It also calculates the number of practical key settings Allied cryptanalysts were faced with on a daily basis throughout World War II. Finally, it shows the relative contribution each component of the Enigma added to the overall strength of the machine. 相似文献
18.
Ralph Erskine 《Cryptologia》2013,37(4):330-340
Indicators used by the Kriegsmarine in its signals traffic in World War II are explained. 相似文献
19.
Arturo Quirantes 《Cryptologia》2013,37(2):153-156
A review of pre-WWII documents in the Spanish Foreign Affairs Ministry has discovered a hitherto unknown Enigma modification, called “Model Z”, capable of encrypting numbers only. This model seems to be unknown to the Enigma community. The few known details concerning Enigma Z are here outlined. 相似文献
20.