首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 0 毫秒
1.
John Wright 《Cryptologia》2016,40(4):327-347
Turing devised an electromechanical device, called a Bombe, to decipher German Enigma messages. His original design was considerably improved by the addition of Welchman’s diagonal board, allowing the use of much weaker menus and even menus without closures. Turing then made some extensive calculations to predict the performance of the improved Bombe. He provided a table, called the H-M factor, which allowed the expected number of stops to be predicted for menus containing a given number of letters and closures, but he gave no indication of how he constructed the table. This article is of technical interest and sheds some light on the H-M factor, including its variability with the tree-arrangement of the menu. It derives the H-M factor using a recursive technique for both the standard Bombe and the Jumbo Bombe, a later version incorporating the machine gun mechanism. These results may be of interest to those that code or run Bombe emulators.  相似文献   

2.
    
  相似文献   

3.
    
DANIEL WOLF 《Cryptologia》2013,37(4):359-370
Microprocessors are playing an increasingly important role in cryptographic systems. ROTERM is an implementation of a cipher terminal using an inexpensive microcomputer system. ROTERM behaves like a mechanical rotor system of eight rotors with 96 elements each. Control features have been implemented in ROTERM which permit keyboard and/or remote control of the encipherment and decipherment of ASCII character strings. Examples are given demonstrating the use of ROTERM in user-user communications as well as user-electronic mail system posting and reading of messages.  相似文献   

4.
John Wright 《Cryptologia》2018,42(3):222-226
In 1932, Marian Rejewski, who was a young mathematician working at the Polish Cipher Bureau, brilliantly recovered the internal wiring of the military Enigma. His initial efforts were unsuccessful because he assumed that the entry permutation was the same as in the commercial machine. Luckily he tried the identity permutation as an alternative and that proved to be correct. This note describes how Rejewski’s equations may be used to deduce the entry permutation without any guesswork, a technique that was later rediscovered by Alan Turing and by Lieutenant Andrew Gleason.  相似文献   

5.
    
Ralph Erskine 《Cryptologia》2013,37(2):111-118
This article lists the items brought by the Sinkov Mission to the Government Code and Cypher School, Bletchley Park, in early 1941.  相似文献   

6.
We describe the life and times of a servicing mechanic for cypher equipment for the Royal Air Force during World War II and an opportunity to serve again as a cypher machine restorer for Bletchley Park Museum.  相似文献   

7.
Louis Kruh 《Cryptologia》2013,37(1):81-85
The Ultra background is given to some operations by U. S. Navy escort carriers against U-boats in 1943 and 1944.  相似文献   

8.
    
A 1995 article in this journal presented a study by James Gillogly entitled “Ciphertext-Only Cryptanalysis of Enigma” [7, p. 405]. In this paper I will make improvements on Gillogly's techniques by choosing a more effective statistical test and an improved algorithm which allow me to decipher a 500-letter message encrypted by an Enigma machine with 10 plugs.  相似文献   

9.
    
Biography of Brigadier John Tiltman, who worked as a cryptologist for the British and American governments from 1920 to 1980.  相似文献   

10.
    
Louis Kruh 《Cryptologia》2013,37(4):311-317
Abstract

This paper analyses the organization of the Government Code and Cypher School (GC &; CS) at Bletchley Park during the Second World War. The complexities and peculiarities of the organization are overviewed and a periodization provided. The main focus is on the pivotal 1942 reorganization, which is explained in terms of the changing scale of GC &; CS following the successful attack on the Enigma machine cipher, and in terms of organizational politics. The more minor 1944 reorganization is also described.  相似文献   

11.
Ralph Erskine 《Cryptologia》2013,37(2):98-106
A Royal Navy document on U-boat radio procedures in WWI is reproduced, with annotations.  相似文献   

12.
The German hand cipher Rasterschlüssel 44, which replaced Double Playfair in August 1944, is described and an account is given of its use by the Wehrmacht and of its crypt analysis by the Allies.  相似文献   

13.
B. R. Inman 《Cryptologia》2013,37(3):129-135
This paper presents the travels of a cryptological Intelligence mission through Germany near the end of World War II to locate German Signal Intelligence information documents, and equipment.  相似文献   

14.
    
Recently declassified documents from the “Crane Collection” at the National Archives (USA) reveal much of the purpose of Alan Turing's visit to the United States during the Winter of 1942–1943. The “Bombe Correspondence” file contains Turing's “Visit To National Cash Register Corporation of Dayton, Ohio” and additional material which places this report and his earlier “Treatise on the Enigma” in the context of his role as consultant to the U. S. Navy Cryptanalytic Section (Op-20-G) on the design of the Navy Bombe and other related matters. The documents in this collection reveal a productive and decisive relationship between Turing and Op-20-G dating from the visit of the Sinkov mission to Bletchley Park in February 1941.  相似文献   

15.
This paper is the account of a computer-aided solution of the Hebern messages first solved by William F. Friedman in 1924.  相似文献   

16.
    
Abstract

This article describes the importance of the Knox contribution to the breaking of the plugboard German Enigma through his early work on the commercial machine; as well as his invention of “rodding” and exploitation of the Saga method of “boxing.” It also covers the multi-turnover Abwehr machine through observation of the phenomenon of ‘crabs and lobsters’ in message indicators.  相似文献   

17.
主要论述了哈萨克族人名汉字译写规范化软件的设计思路及实现方法。本软件是以“大用”维哈柯视窗forWin dows 98系统为操作平台 ,以VB和Access为软件开发工具设计的。它利用VB中的字符串处理函数和数据库连接技术及SQL语句数据查询技术 ,有效地处理了哈文词中每个字母因位置不同写法不同而引起的计算机编码也不同这一问题 ,从而实现了哈萨克族人名的计算机自动翻译功能。这套软件有助于哈萨克族人名汉字译写规范化 ,具有极高的应用价值  相似文献   

18.
    
Describes major weaknesses in a naval Enigma cipher codenamed Seahorse, and how it and similar naval Enigma ciphers were solved by US Navy codebreakers during WWII.  相似文献   

19.
    
Abstract

The problem of when the Russians started to read the German cipher machine ENIGMA still remains unsolved. A Russian document presented recently in a history of the GRU in the time of the Great patriotic War offers a new light on the problem. In November 1942 the Russians were able to begin reading ENIGMA on a daily basis and were thinking about automating the process. We do not know if incorporating the GRU cryptanalysts in the parallel section of the NKVD helped in the brilliant defeat of the Germans during the “Uran” and “Saturn” operations at Stalingrad, but we suppose so. The Russian solution of the ENIGMA ciphers could be linked with the traitors working at Station X (Bletchley Park) and in Military Intelligence.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号