共查询到20条相似文献,搜索用时 15 毫秒
1.
John Lawrence 《Cryptologia》2013,37(2):149-152
We show that the recovery of the wiring of the second rotor of the Enigma does not depend on the rotors being reordered. 相似文献
2.
The Enigma machines were a series of electromechanical rotor cipher machines developed in Germany and used in the first half of the twentieth century to protect commercial, diplomatic, and military communications. Until 1938, the German Army used the so-called double-indicator procedure to transmit Enigma-encoded messages. It was replaced in September 1938 by a new procedure also involving double indicators. Both procedures enabled a team of mathematicians from the Polish Cipher Bureau to recover the wiring of the rotors and to develop cryptanalytic methods for the recovery of the daily keys. The double-indicator procedure was discontinued by the German Army in May 1940, and new methods were developed by the British at Bletchley Park, who were assisted by the knowledge transferred to them by the Polish cryptanalysts. In this article, the authors introduce two new algorithms that build on the historical cryptanalytic attacks on the two variants of the double-indicator procedures. Those attacks are based on hill climbing, divide-and-conquer, and specialized scoring functions, and they can recover the daily key using a number of indicators significantly smaller than the number of indicators required for the historical methods. Unlike the historical methods, the new algorithms produce unique and unambiguous results, including for scenarios with turnover of the middle rotor, and they also fully recover the plugboard settings. With these algorithms we won an international Enigma contest organized in 2015 by the City of Poznan, in memory of the Polish Cipher Bureau mathematicians. 相似文献
3.
Heidi Williams 《Cryptologia》2013,37(1):4-17
A 1995 article in this journal presented a study by James Gillogly entitled “Ciphertext-Only Cryptanalysis of Enigma” [7, p. 405]. In this paper I will make improvements on Gillogly's techniques by choosing a more effective statistical test and an improved algorithm which allow me to decipher a 500-letter message encrypted by an Enigma machine with 10 plugs. 相似文献
4.
John Wright 《Cryptologia》2018,42(3):222-226
In 1932, Marian Rejewski, who was a young mathematician working at the Polish Cipher Bureau, brilliantly recovered the internal wiring of the military Enigma. His initial efforts were unsuccessful because he assumed that the entry permutation was the same as in the commercial machine. Luckily he tried the identity permutation as an alternative and that proved to be correct. This note describes how Rejewski’s equations may be used to deduce the entry permutation without any guesswork, a technique that was later rediscovered by Alan Turing and by Lieutenant Andrew Gleason. 相似文献
5.
During the last few months of 1932, the Polish mathematician Marian Rejewski solved the problem of finding the internal connections of the rotors and reflector of the Enigma cipher machine used by the German army at that time. This allowed the Polish Cipher Bureau to construct an analogue of the machine, and subsequently to find effective methods for deciphering secret messages. Rejewski performed this feat virtually alone using cryptographic material provided by the Polish secret services. His knowledge of the theory of permutation groups was essential in solving this problem.
This article describes in detail how to find the complete wiring of the rotors and reflector of Enigma, as well as other specifics, using data that Rejewski had at his disposal, by systematically presenting the resolution of all cases that could have been encountered. Similarly, we complete those stages of the procedure that were only outlined by Rejewski. 相似文献
6.
David Kahn 《Cryptologia》2013,37(2):121-126
The city of Bydgoszcz, Poland, held a conference on Enigma in honor of Marian Rejewski, one of the 1932 solvers of that cipher machine who was born and brought up in that industrial city. I then visited several sites in Poland connected with cryptology. 相似文献
7.
ROLAND ANDERSON 《Cryptologia》2013,37(4):348-359
Abstract The Faculty of Mathematics and Computer Science of Adam Mickiewicz University established an annual series of lectures in computer science. The series is named after Marian Rejewski, Jerzy Ró?ycki, and Henryk Zygalski, alumni of the University who played a key role in the Enigma cipher machine breaking. The inaugural lectures were given by Marek Grajek, Adrew Odlyzko, and Józef Pieprzyk on Cryptology Day, January 25th, 2008. 相似文献
8.
James J. Gillogly 《Cryptologia》2013,37(4):405-413
Enigma messages can be solved by recovering the message key settings, the ring settings, and the plug settings individually. Recovery of the message key setting is sensitive enough to distinguish the correct rotor order. The method is demonstrated on a 647-letter message, and its performance is estimated for different message lengths and numbers of plugs used. 相似文献
9.
A list of important events in the making and breaking of the German Enigma cipher machine of World War II is given in the order of their occurrences. 相似文献
10.
David H. Hamer 《Cryptologia》2013,37(1):41-54
G-312, an Abwehr Enigma in the collection of The Bletchley Park Trust is presented together with details of its internal mechanism and wheel wiring. 相似文献
11.
Umkehrwalze A was the original reflector used in the version of the Enigma machine employed by the German armed services. Its wiring was originally deduced by the Polish cryptanalyst Marian Rejewski in December 1932 or January 1933, but details of the wiring have not previously been published. Sufficient information to recover the wiring analytically is provided in a wartime document by Alan Turing, and other sources have been found to confirm the solution. This paper presents the wiring, along with alternative methods of recovering it from Turing's data. 相似文献
12.
Olaf Ostwald 《Cryptologia》2017,41(5):395-421
“Breaking German Army Ciphers” is the title of a Cryptologia article from 2005, describing the lucky survival of several hundred authentic Enigma messages of World War II, and an account of a ciphertext-only cryptanalysis of a large number of these messages, leaving only a few (mostly short messages) unbroken. After reviewing the work done, and investigating the reasons for both lucky breaks and close misses, the modern ciphertext-only attack on Enigma messages is improved, especially on genuine ones with short lengths and/or many garbles. The difficulties of a proper measure for the candidate’s closeness to a plaintext are clarified. The influence on the decryption process of an empty plugboard and one with only a few correct plugs is examined. The method is extended by a partial exhaustion of the plugboard combined with an optimized hillclimbing strategy. The newly designed software succeeds in breaking formerly unbroken messages. 相似文献
13.
WILLIAM P. BUNDY 《Cryptologia》2013,37(1):65-74
The Enigma cipher machine had the confidence of German forces who depended upon its security. This misplaced confidence was due in part to the large key space the machine provided. This paper derives for the first time the exact number of theoretical cryptographic key settings and machine configurations for the Enigma cipher machine. It also calculates the number of practical key settings Allied cryptanalysts were faced with on a daily basis throughout World War II. Finally, it shows the relative contribution each component of the Enigma added to the overall strength of the machine. 相似文献
14.
Ralph Erskine 《Cryptologia》2013,37(4):330-340
Indicators used by the Kriegsmarine in its signals traffic in World War II are explained. 相似文献
15.
Arturo Quirantes 《Cryptologia》2013,37(2):153-156
A review of pre-WWII documents in the Spanish Foreign Affairs Ministry has discovered a hitherto unknown Enigma modification, called “Model Z”, capable of encrypting numbers only. This model seems to be unknown to the Enigma community. The few known details concerning Enigma Z are here outlined. 相似文献
16.
Mike Koss 《Cryptologia》2013,37(3):204-210
The Enigma Machine is a complex electromechanical device used by the Germans in World War II to achieve what they thought was complete communications security. While the original machine weighed over 20?lbs, the central mechanics of the machine can be simulated manually by manipulating strips of paper. A Paper Enigma is presented that can be cut out of a single sheet of paper. The resulting simulator is compatible with the electromechanical original in that messages can be encoded on one, and decoded on the other. Copies of The Paper Enigma can be downloaded from http://mckoss.com/crypto/enigma.htm. 相似文献
17.
A. Ross Eckler 《Cryptologia》2013,37(4):326-333
Abstract When attacking the German Enigma cipher machine during the 1930s, the Polish mathematician Marian Rejewski developed a catalog of disjoint cycles of permutations generated by Enigma indicators. By comparing patterns that resulted from message indicators with his catalog, Rejewski was able to determine the ground settings. Well, not quite—the mapping from the disjoint cycles to the ground settings is not one-to-one. Rejewski's catalog no longer exists. This article reports on the output of a program that “recreates” the catalog and answers the question “How far from being one-to-one is the mapping?” 相似文献
18.
Abstract Sets out, with comments, an account by A. G. Denniston (the operational head of the British Government Code and Cypher School in 1939) of the meeting near Pyry, Poland, in July 1939, when Polish cryptanalysts revealed how they broke Enigma, and a letter by Dillwyn Knox on the meeting's outcome. 相似文献
19.
20.
The Enigma is probably the most well known wired wheel cipher machine. The NEMA is a cipher machine developed during World War II by the Swiss Army. It is designed on the same principle as the Enigma but with particular emphasis on overcoming some of its weak features. It was declassified by the Swiss Authorities in 1992. This paper describes its mechanism and the way in which it operates, so that it may be more widely known to cryptology researchers. 相似文献