Cryptanalysis of the Enigma
whoami• Bob Weiss - @pwcrack - President and Founder, Password Crackers, Inc. (pwcrack.com) & Defcon Goon• Benjamin Gatti ...
Alan TuringWere Alan Turing alive today, he would be unconstrained by either the mechanical computing devices of the 1940s...
Demo TimeYeah were starting the demo now!
Why do we care about The Enigma?• Inflection Point in the  history of cryptography• Fascinating WWII narrative
There is no Enigma• There are multiple versions• Army and Navy• 3 & 4 Wheel• Variable Reflector
How the Enigma works.• Wheel Order (3 of 5 wheels for 60 options)
How the Enigma works.• Ring settings (676 orr 262 options)
How the Enigma works.• Message Settings (17,576 or 263 options)
How the Enigma works.•   Plugboard (150,738,274,937,250 or 150 trillion)
How the Enigma works.• Expected complexity of    Enigma 277•   DES 256•   AES 2128
Historic Cryptanalysis•   Polish Cipher Bureau - 1932, Marian Rejewski,    Machine Characteristics•   Polish Bombe - 1938•...
Programming Challenges GPU – OpenCL Memory Database Throughput
Sorted Chi
Stecker IsolationLetters for each Stecker Binned separately.       26!! - 6!! (150T) to 26^3 (17K) (pwned)EDGYEMHENYFYEJOE...
Diagonal Conflation
Back to the Demo
Q&Aenigmacrack.com
Upcoming SlideShare
Loading in...5
×

Cryptanalysis of the Engima - 44CON 2012

503

Published on

Bob Weiss and Benjamin Gatti present their work on Cryptanalysis of the Engima from 44CON 2012 in London, September 2012.

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
503
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
13
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Cryptanalysis of the Engima - 44CON 2012

  1. 1. Cryptanalysis of the Enigma
  2. 2. whoami• Bob Weiss - @pwcrack - President and Founder, Password Crackers, Inc. (pwcrack.com) & Defcon Goon• Benjamin Gatti - @BenjaminoG - Developer, OpenVPN
  3. 3. Alan TuringWere Alan Turing alive today, he would be unconstrained by either the mechanical computing devices of the 1940s; or its pharisaical provincialism.We are pleased to present a digital Enigma attack in London at #44Con during this centennial of his birth.
  4. 4. Demo TimeYeah were starting the demo now!
  5. 5. Why do we care about The Enigma?• Inflection Point in the history of cryptography• Fascinating WWII narrative
  6. 6. There is no Enigma• There are multiple versions• Army and Navy• 3 & 4 Wheel• Variable Reflector
  7. 7. How the Enigma works.• Wheel Order (3 of 5 wheels for 60 options)
  8. 8. How the Enigma works.• Ring settings (676 orr 262 options)
  9. 9. How the Enigma works.• Message Settings (17,576 or 263 options)
  10. 10. How the Enigma works.• Plugboard (150,738,274,937,250 or 150 trillion)
  11. 11. How the Enigma works.• Expected complexity of Enigma 277• DES 256• AES 2128
  12. 12. Historic Cryptanalysis• Polish Cipher Bureau - 1932, Marian Rejewski, Machine Characteristics• Polish Bombe - 1938• Polish Setback - Dec. 1938 Germans add two rotors• Polish Disclosure - 1939 Poles tell the French• Crib-Based Decryption - Turing• British Bombe - 1930• American Bombe - 1941
  13. 13. Programming Challenges GPU – OpenCL Memory Database Throughput
  14. 14. Sorted Chi
  15. 15. Stecker IsolationLetters for each Stecker Binned separately. 26!! - 6!! (150T) to 26^3 (17K) (pwned)EDGYEMHENYFYEJOEIYKUFMKEUATHEFOXJUMPEDOVERTHELAZYDOGTOUORD Chi(E Stecker)
  16. 16. Diagonal Conflation
  17. 17. Back to the Demo
  18. 18. Q&Aenigmacrack.com
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×