SlideShare a Scribd company logo
The Math That Saved the World Brad Young brad@clearpoint.co.il A Mathematical and Historical Analysis of the Cryptographic Attacks on the Nazi Enigma Machine  Marian Rejewski Alan Turing
Agenda Development of Enigma Machine – Why/How/What The Rejewski Crack The Turing Crack Historical Impact
WWI Cryptology First major war with radio + telegraph  Very large volume of communications  Hand-ciphers Playfair, ADFGVX etc. Bigraph substitution + transformation Encryption/Decryption Inefficient …Became bottleneck Cryptanalysis Difficult, time-consuming… But successful (mainly)
Zimmermann Telegram
Invention of Enigma Machine Arthur Scherbius Efficient! (oh, and also Secure, by the way) Business, Military versions Early 1920’s – very poor sales German economy in trouble
Oops Publishes history book Reveals the impact of crypto on WWI Now, the Germans want Enigma!
A B C D E F G H Reflector 3rd Rotor 2nd Rotor 1st Rotor Lightbulbs Keyboard Enigma Schematic
A B C D E F G H Reflector Lightbulbs 3rd Rotor 2nd Rotor 1st Rotor Keyboard Electric Circuit
A B Pressing ‘A’ on the keyboard… C D E F … lights the ‘B’ lightbulb G H NOTE: Because it is a electric circuit, no letter can map to itself. Minor detail combinatorically speaking, but very important for the Turing crack. Reflector Lightbulbs 3rd Rotor 2nd Rotor 1st Rotor Keyboard Electric Circuit
A B C D E After each letter, the first rotor shifts one step. So now, pressing ‘A’ lights a different lightbulb….’F’ F G H Reflector Lightbulbs 3rd Rotor 2nd Rotor 1st Rotor Keyboard Rotor Shift
A B C D E F Sits between keyboard and rotors. Each plug cable swaps signal between two letters. 6 cables connect 12 letters. 14 other letters are not plugged at all. G H Reflector Lightbulbs Plugboard 3rd Rotor 2nd Rotor 1st Rotor Keyboard Plugboard
Plugboard
Keysize A B Rotor Order Rotor Setting Plugboard Wiring I – III - II VYJ A/G, D/Q, J/Z,L/S, M/V, N/T 3! = 6 263 =17,576 C(26,2) x C(24,2) x C(22,2) x C(20,2) x C(18,2) x C(16,2) x 1/6! (26!)3  x C(26,2)…C(2,2)x1/13! C ≈ 105 D E F ≈ 1011 ≈ 1092 G H Total Key Size ≈ 10108 Variable Key Size ≈ 1016
German Use of Enigma
German Use of Enigma Day Keys (RO, RS, PB) distributed monthly in key books ,[object Object],Encode Message Key using Day Key, twice Move rotor to Message Key setting  Encode actual message Set to Day Key(VYJ) Change to Message Key (CIL) CILCILATTACKFROMNORTHATNINETHIRTYBOKJRVSQIGPQTMNWJRAKOBYTKMTKGBBRQ
Agenda Development of Enigma Machine – Why/How/What The Rejewski Crack The Turing Crack Historical Impact
Biuro Szyfrów 1918 – Polish Independence 1919 – Creation (and success) of Cipher Bureau  1926 – Germany goes dark as Enigma is adopted 1930 – Bring in the mathematicians (?!?) Marian Rejewski Jerzy Różycki Henryk Zygalski
The Rejewski Crack Intuition,Espionage,Engineering  Understand how Enigma works Reverse-engineer the wiring Be able to crack the key each day Permutational Mathematics
The Math of Permutation Cycles  P =   P-1 =
Cycle Notation  P =   P  =  (AECH)(BFD)(G)    =    (BFD)(G) (AECH)   =     (FDB)(G)(CHAE)  P-1  =  (HCEA)(DFB)(G)   Benefits of cycle notation: Concise Easier to take inverse (These are benefits of efficiency)
Cycle Structure   =  (AECH)(BFD)(G)   P =       4          3      1   =  (AFC)(BG)(D)(EH)   Q =       3       2     1    2 Benefits of cycle notation: Concise Easier to take inverse Gives more info – Cycle Structure 	(This is a benefit of value-add information)
Composition  P =    =  (AECH)(BFD)(G)   Q =    =  (AFC)(BG)(D)(EH)   Q ◦ P =  Q(P()) =  (AHFDGBCE)  Q ◦ P ≠ P ◦ Q    - NOT Commutative  Q ◦ ( P ◦ R ) =  ( Q ◦ P ) ◦ R    - Associative
Identity   =  (A)(B)(C)(D)(E)(F)(G)(H) I =  P ◦ I  =  I ◦ P  =  P P ◦ P -1  = I I ◦ I  =  I     i.e. I = I -1 (ab) ≠ I ,   but    (ab) ◦ (ab)  = (a)(b) i.e.    (ab) = (ab)-1
Conjugation  Conjugation of Q by P is defined as  P ◦ Q ◦ P-1   P = (AECH)(BFD)(G)    P-1 = (HCEA)(DFB)(G)    Q =  (AFC)(BG)(D)(EH)  1-2-2-3 1-2-2-3 This is not a coincidence! This is not a coincidence! P ◦ Q ◦ P-1 =  (AC)(B)(DHE)(FG)
Theorem: Cycle structure is invariant under conjugation Proof: Suppose Q: ij, that is Q(i) = j. Consider P ◦ Q ◦ P-1 (P(i)). P ◦ Q ◦ P-1 (P(i))	= P ◦ Q ◦ (P-1 ◦ P)(i) 			= P ◦ Q(i) 			= P(j) i.e.   P ◦ Q ◦ P-1: P(i)P(j) Therefore… If Q has k-cycle (i1, i2 … ik)  then P ◦ Q ◦ P-1 has k-cycle (P(i1), P(i2)…P(ik)) 								QED
Using Permuation Cycles on Enigma A B Suppose we intercept a message: BOLJRVSQIGPQTMNWJRAKOBYTKMTTGBBRQUPWLHSOLNFEQTHJOVX Plaintext:  abcabcCiphertext: BOLJRV Define En as the permutation that occurs when Enigma machine is in state n. So, in the first state, aB. In the fourth state, aJ E1 = (aB …E4 = (aJ … Now…Recall the effect of the Reflector, which creates 2-letter circuits So, if aB, then Ba. So the cycle is closed. E1 = (aB) …E4 = (aJ) … So, we can now compute E4 ◦ E1 = (BJ  … C These are the variablesa,b,c, not the actual letters D E F G H
Using Permuation Cycles on Enigma If we have many intercepts from the same day, then they were produced with the same day settings.  So we can calculate the entire compositions… E4 ◦ E1 = (BJUMPWTCFE)(ARDNHSLYZK)(G)(I)(O)(Q)(X)(V)E5 ◦ E2 = (ORJCLVHGXKF)(AUYMPZQNDWB)(ES)(IT)E6 ◦ E3 = (BWOIKTZHXB)(EPQJYLVGN)(ARCU)(DSMF) Good news:  abc variables have been eliminated!   We’ve found a unique identifier! Bad news: It is one of 10,000,000,000,000,000 possibilities
Explore the nature of En A B En = P ◦  Rn ◦ P        where P is the plugboard permutation and Rn is rotor permutation when in state n E4 ◦ E1  = P ◦  R4 ◦ P ◦ P ◦  R1 ◦ P Now, recall the plugboard… P = (ab)(cd)(ef)(gh)(ij)(kl)(m)(n)(o)(p)(q)(r)(s)(t)(u)(v)(w)(x)(y)(z) All 2-cycles and 1-cycles, therefore  P = P-1   ! E4 ◦ E1  	= P ◦  R4 ◦ P ◦ P ◦  R1 ◦ P 	= P ◦  R4 ◦ P ◦ P-1  ◦  R1 ◦ P 	= P ◦  R4 ◦ (P ◦ P-1 ) ◦  R1 ◦ P 	 	= P ◦  R4  ◦  R1 ◦ P 	 	= P ◦  (R4  ◦  R1 ) ◦ P	 	= P ◦  (R4  ◦  R1 ) ◦ P-1 C P R D E F G H Conjugation:Cycle structure of E4 ◦ E1 is same as cycle structure of R4 ◦ R1 and is not affected at all by the plugboard! E4 ◦ E1 = (BJUMPWTCFE)(ARDNHSLYZK)(G)(I)(O)(Q)(X)(V)E5 ◦ E2 = (AUYMPZQNDWB)(CLVHGXKFORJ)(ES)(IT)E6 ◦ E3 = (BWOIKTZHXB)(EPQJYLVGN)(ARCU)(DSMF) 1-1-1-1-1-1-10-10    ;    2-2-11-11     ;    4-4-9-9 Remember: Keysize(R) ≈ 105 Keysize(P) ≈ 1011
Now, where are we? Figuring out En is problem of size 1016   Now, we have Rn, a smaller problem: 105 Just barely small enough to attack brute force
Building the Rejewski Dictionary  RO	RS	 E4 ◦ E1 	 E5 ◦ E2 	 E6 ◦ E3  1 2 3	AAA 	13-13	1-1-12-12	1-1-12-12  1 2 3	BAA 	1-1-12-12	1-1-12-12	2-2-11-11  1 2 3	CAA 	1-1-12-12;	2-2-11-11	1-1-12-12  1 2 3	DAA 	2-2-11-11	1-1-12-12	13-13  1 2 3	EAA 	1-1-12-12	13-13	13-13  1 2 3	FAA 	13-13	13-13	1-1-2-2-3-3-3-3-4-4  1 2 3	GAA 	13-13	1-1-2-2-3-3-3-3-4-4	2-2-5-5-6-6  1 2 3	HAA 	1-1-2-2-3-3-3-3-4-4	2-2-5-5-6-6	13-13  1 2 3	IAA 	2-2-5-5-6-6	13-13	4-4-9-9  1 2 3	JAA 	13-13	4-4-9-9	1-1-5-5-7-7  1 2 3	KAA 	4-4-9-9	1-1-5-5-7-7	13-13  1 2 3	LAA 	1-1-5-5-7-7	13-13	1-1-2-2-10-10  1 2 3	MAA 	13-13	1-1-2-2-10-10	1-1-1-1-11-11 .	.	.	.	. .	.	.	.	. .	.	.	.	. … 2-2-11-11; 1-1-1-1-1-1-1-1-4-4-5-5; 1-1-12-12	KFE 213 2-2-11-11; 1-1-1-1-1-1-1-1-4-4-5-5; 2-2-5-5-6-6	ZTF 132 2-2-11-11; 1-1-1-1-1-1-1-1-4-4-5-5; 5-5-8-8	GIC 312 2-2-11-11; 1-1-1-1-1-1-1-1-9-9; 1-1-12-12	AHH 132 2-2-11-11; 1-1-1-1-1-1-1-1-9-9; 1-1-12-12	WLA 312 2-2-11-11; 1-1-1-1-1-1-1-1-9-9; 1-1-5-5-7-7	YKG 132 2-2-11-11; 1-1-1-1-1-1-1-1-9-9; 13-13	DXI 213 2-2-11-11; 1-1-1-1-1-1-1-1-9-9; 13-13 	ESY 321 2-2-11-11; 1-1-1-1-1-1-1-1-9-9; 13-13	VHX 213 2-2-11-11; 1-1-1-1-1-1-1-1-9-9; 2-2-11-11  	UNV 231 … 1 setting every 4 minutes,  x 20 hours/day = 300 / day 105 / 300 ≈ 1 year to complete Good news; Solved the RO, RS! Bad news: 105 solved, 1011 not solved Cycle structure is not unique …even though 105 << (1012)3 ≈ 1012 But most have < 10
Recovering the Plugboard Plugboard is the biggest problem combinatorically But… It is trivial to solve E4 ◦ E1 = (BJUMPWTCFE)(ARDNHSLYZK)(G)(I)(O)(Q)(X)(V) R4 ◦ R1 = (MGWTREFBJU)(AKZCINLSHY)(P)(D)(O)(Q)(V)(X) (BJUMPWTCFE) (BJUMGWTREF) Plugboard settings:  P/G , C/R , E/F , etc.
Paradox of Decreasing Benefit Keysize # Cables
Agenda Development of Enigma Machine – Why/How/What The Rejewski Crack The Turing Crack Historical Impact
1939 – Brink of War Polish deliver Enigma replica and training to England and France  Biuro Szyfrów is dismantled
Bletchley Park HQ of British Government Code and Cypher School (GCCS)
New Challenges Combinatoric More rotors to choose from Increase # of plugs Ring settings Procedural Eliminate Message Key repetition Navy /  Air Force / Army mods Keysize now 1023
Turing’s Solution Known-Plaintext attack Heil Hitler Wetterbericht Seeding values Plaintext Crib:Ciphertext:  Try to place the crib without letter any letter mapping to itself WETTERBERICHT WETTERBERICHT WETTERBERICHT WETTERBERICHT WETTERBERICHT EXLMBTWZXBITWZCIQ P(false hit) = (25/26)length of crib
Finding Cycles WETTERBERICHT EXLMBTWZXBITW E1:  WE E5:  EB E7:  BW
J Q F b E E1 E1:  WE E5:  EB E7:  BW a W J Q J B b E E5 c J Q L B E7 c a W
J Q F b E1 a J Q J b E5 c J Q L E7 c a
M V C b E1 a M Z C b E5 c M B D E7 c a
M V C b a E1 M Z C b E5 c M B D E7 P(false hit) = (1/26)length of cycle-1 a c
Turing’s Bombe NOT a computer Multi-Enigma Wiring 120 rpm  max 6 hrs to solve ~70% of days cracked Accurate crib? Location of crib in message? Find cycle in message? Not too many false hits? Crib seeding Fake missions – Get spotted 18’26”N, 72’49”E = einachtzweisechsnordensiebenzweivierneunosten  Reimann zeta zeros
Agenda Development of Enigma Machine – Why/How/What The Rejewski Crack The Turing Crack Historical Impact
6 : 60,000,000     ::       8 : ?
Secrecy Bletchley Park is gutted Enigma machines captured (and distributed!) Top Secret status until 1973!
Marian Rejewski – During and After the War ,[object Object]
1939 – France
French cipher bureau
1940 – Algeria
1940 – Back to France
Rozycki dies in transit

More Related Content

What's hot

decoder and encoder
 decoder and encoder decoder and encoder
decoder and encoder
Unsa Shakir
 
Cs6503 theory of computation lesson plan
Cs6503 theory of computation  lesson planCs6503 theory of computation  lesson plan
Cs6503 theory of computation lesson plan
appasami
 
Extracting Hierarchies with Recursive Tree Traversal Using FME
Extracting Hierarchies with Recursive Tree Traversal Using FMEExtracting Hierarchies with Recursive Tree Traversal Using FME
Extracting Hierarchies with Recursive Tree Traversal Using FME
Safe Software
 
Registers siso, sipo
Registers siso, sipoRegisters siso, sipo
Registers siso, sipo
DEPARTMENT OF PHYSICS
 
Intermediate code generation1
Intermediate code generation1Intermediate code generation1
Intermediate code generation1Shashwat Shriparv
 
Attribute grammer
Attribute grammerAttribute grammer
Attribute grammer
ahmed51236
 
Theory of Computation Lecture Notes
Theory of Computation Lecture NotesTheory of Computation Lecture Notes
Theory of Computation Lecture Notes
FellowBuddy.com
 
Decoders-Digital Electronics
Decoders-Digital ElectronicsDecoders-Digital Electronics
Decoders-Digital Electronics
Paurav Shah
 
Quine Mc Cluskey Method
Quine Mc Cluskey MethodQuine Mc Cluskey Method
Quine Mc Cluskey Method
Shahneel Siddiqui
 
Bellman ford algorithm
Bellman ford algorithmBellman ford algorithm
Bellman ford algorithm
MdSajjadulislamBappi
 
4.7. chomskian hierarchy of languages
4.7. chomskian hierarchy of languages4.7. chomskian hierarchy of languages
4.7. chomskian hierarchy of languages
Sampath Kumar S
 
Deterministic Finite Automata
Deterministic Finite AutomataDeterministic Finite Automata
Deterministic Finite Automata
Shiraz316
 
Undirected graphs
Undirected graphsUndirected graphs
Undirected graphs
Nick Lee
 
Code Optimization using Code Re-ordering
Code Optimization using Code Re-orderingCode Optimization using Code Re-ordering
Code Optimization using Code Re-orderingArangs Manickam
 
Introduction to NP Completeness
Introduction to NP CompletenessIntroduction to NP Completeness
Introduction to NP Completeness
Gene Moo Lee
 
Definition of automation,finite automata,transition system
Definition of automation,finite automata,transition systemDefinition of automation,finite automata,transition system
Definition of automation,finite automata,transition system
Dr. ABHISHEK K PANDEY
 
Combinational Circuits & Sequential Circuits
Combinational Circuits & Sequential CircuitsCombinational Circuits & Sequential Circuits
Combinational Circuits & Sequential Circuits
gourav kottawar
 
Asymptotic Notation and Data Structures
Asymptotic Notation and Data StructuresAsymptotic Notation and Data Structures
Asymptotic Notation and Data Structures
Amrinder Arora
 
Boolean algebra simplification and combination circuits
Boolean algebra simplification and combination circuitsBoolean algebra simplification and combination circuits
Boolean algebra simplification and combination circuits
Jaipal Dhobale
 

What's hot (20)

decoder and encoder
 decoder and encoder decoder and encoder
decoder and encoder
 
Cs6503 theory of computation lesson plan
Cs6503 theory of computation  lesson planCs6503 theory of computation  lesson plan
Cs6503 theory of computation lesson plan
 
Extracting Hierarchies with Recursive Tree Traversal Using FME
Extracting Hierarchies with Recursive Tree Traversal Using FMEExtracting Hierarchies with Recursive Tree Traversal Using FME
Extracting Hierarchies with Recursive Tree Traversal Using FME
 
Registers siso, sipo
Registers siso, sipoRegisters siso, sipo
Registers siso, sipo
 
Intermediate code generation1
Intermediate code generation1Intermediate code generation1
Intermediate code generation1
 
Attribute grammer
Attribute grammerAttribute grammer
Attribute grammer
 
Theory of Computation Lecture Notes
Theory of Computation Lecture NotesTheory of Computation Lecture Notes
Theory of Computation Lecture Notes
 
Decoders-Digital Electronics
Decoders-Digital ElectronicsDecoders-Digital Electronics
Decoders-Digital Electronics
 
Quine Mc Cluskey Method
Quine Mc Cluskey MethodQuine Mc Cluskey Method
Quine Mc Cluskey Method
 
Bellman ford algorithm
Bellman ford algorithmBellman ford algorithm
Bellman ford algorithm
 
4.7. chomskian hierarchy of languages
4.7. chomskian hierarchy of languages4.7. chomskian hierarchy of languages
4.7. chomskian hierarchy of languages
 
Deterministic Finite Automata
Deterministic Finite AutomataDeterministic Finite Automata
Deterministic Finite Automata
 
Undirected graphs
Undirected graphsUndirected graphs
Undirected graphs
 
Code Optimization using Code Re-ordering
Code Optimization using Code Re-orderingCode Optimization using Code Re-ordering
Code Optimization using Code Re-ordering
 
Introduction to NP Completeness
Introduction to NP CompletenessIntroduction to NP Completeness
Introduction to NP Completeness
 
Definition of automation,finite automata,transition system
Definition of automation,finite automata,transition systemDefinition of automation,finite automata,transition system
Definition of automation,finite automata,transition system
 
Combinational Circuits & Sequential Circuits
Combinational Circuits & Sequential CircuitsCombinational Circuits & Sequential Circuits
Combinational Circuits & Sequential Circuits
 
Asymptotic Notation and Data Structures
Asymptotic Notation and Data StructuresAsymptotic Notation and Data Structures
Asymptotic Notation and Data Structures
 
Natural language processing
Natural language processingNatural language processing
Natural language processing
 
Boolean algebra simplification and combination circuits
Boolean algebra simplification and combination circuitsBoolean algebra simplification and combination circuits
Boolean algebra simplification and combination circuits
 

Viewers also liked

Enigma History
Enigma HistoryEnigma History
Enigma History
Mike Koss
 
Enigma
EnigmaEnigma
Enigma
maruanbenali
 
Rotor Cipher and Enigma Machine
Rotor Cipher and Enigma MachineRotor Cipher and Enigma Machine
Rotor Cipher and Enigma Machine
Saurabh Kaushik
 
Paper Enigma Machine
Paper Enigma MachinePaper Enigma Machine
Paper Enigma Machine
Mike Koss
 
The imatatation game
The imatatation gameThe imatatation game
The imatatation gamepheobewebb
 
The trans-Turing Machine
The trans-Turing MachineThe trans-Turing Machine
The trans-Turing Machine
Gabor Vattay
 
Alan turing's work before, during & after bletchley park
Alan turing's work before, during & after bletchley parkAlan turing's work before, during & after bletchley park
Alan turing's work before, during & after bletchley park
David Bew
 
Compensatory projects
Compensatory projectsCompensatory projects
Compensatory projects
alizisnana
 
The enigma machine lesson 2
The enigma machine lesson 2The enigma machine lesson 2
The enigma machine lesson 24011cassandra
 
Enigma matemàtiques
Enigma matemàtiquesEnigma matemàtiques
Enigma matemàtiquesescolamura
 
The Engima Cipher
The Engima CipherThe Engima Cipher
The Engima Cipher
guestfaf89d
 
Fund Raising with an Android Enigma Machine Simulator
Fund Raising with an Android Enigma Machine SimulatorFund Raising with an Android Enigma Machine Simulator
Fund Raising with an Android Enigma Machine Simulator
Craig Heath
 
Turing machine
Turing machineTuring machine
Turing machine
Umar Alharaky
 
งานคอมพิวเตอร์
งานคอมพิวเตอร์งานคอมพิวเตอร์
งานคอมพิวเตอร์khwanjai
 
Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography System
Raju Raj
 
Funny Cats
Funny CatsFunny Cats
Funny Cats
RAISSA RO
 
Pin Ups with Funny Cats
Pin Ups with Funny CatsPin Ups with Funny Cats
Pin Ups with Funny Catsmaditabalnco
 
Charles de gaulle
Charles de gaulleCharles de gaulle
Charles de gaulle
eftihia67
 
MatheMatics and Modern World
MatheMatics and Modern WorldMatheMatics and Modern World
MatheMatics and Modern WorldTanish Aggarwal
 

Viewers also liked (20)

Enigma History
Enigma HistoryEnigma History
Enigma History
 
Enigma
EnigmaEnigma
Enigma
 
Rotor Cipher and Enigma Machine
Rotor Cipher and Enigma MachineRotor Cipher and Enigma Machine
Rotor Cipher and Enigma Machine
 
Paper Enigma Machine
Paper Enigma MachinePaper Enigma Machine
Paper Enigma Machine
 
The imatatation game
The imatatation gameThe imatatation game
The imatatation game
 
The trans-Turing Machine
The trans-Turing MachineThe trans-Turing Machine
The trans-Turing Machine
 
Alan turing's work before, during & after bletchley park
Alan turing's work before, during & after bletchley parkAlan turing's work before, during & after bletchley park
Alan turing's work before, during & after bletchley park
 
Compensatory projects
Compensatory projectsCompensatory projects
Compensatory projects
 
The enigma machine lesson 2
The enigma machine lesson 2The enigma machine lesson 2
The enigma machine lesson 2
 
Enigma matemàtiques
Enigma matemàtiquesEnigma matemàtiques
Enigma matemàtiques
 
The Engima Cipher
The Engima CipherThe Engima Cipher
The Engima Cipher
 
Fund Raising with an Android Enigma Machine Simulator
Fund Raising with an Android Enigma Machine SimulatorFund Raising with an Android Enigma Machine Simulator
Fund Raising with an Android Enigma Machine Simulator
 
Turing machine
Turing machineTuring machine
Turing machine
 
งานคอมพิวเตอร์
งานคอมพิวเตอร์งานคอมพิวเตอร์
งานคอมพิวเตอร์
 
Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography System
 
Funny Cats
Funny CatsFunny Cats
Funny Cats
 
Pin Ups with Funny Cats
Pin Ups with Funny CatsPin Ups with Funny Cats
Pin Ups with Funny Cats
 
Turing machines
Turing machinesTuring machines
Turing machines
 
Charles de gaulle
Charles de gaulleCharles de gaulle
Charles de gaulle
 
MatheMatics and Modern World
MatheMatics and Modern WorldMatheMatics and Modern World
MatheMatics and Modern World
 

Similar to Cracking the Enigma Machine - Rejewski, Turing and the Math that saved the world

RF Module Design - [Chapter 1] From Basics to RF Transceivers
RF Module Design - [Chapter 1] From Basics to RF TransceiversRF Module Design - [Chapter 1] From Basics to RF Transceivers
RF Module Design - [Chapter 1] From Basics to RF Transceivers
Simen Li
 
Multiband Transceivers - [Chapter 1]
Multiband Transceivers - [Chapter 1] Multiband Transceivers - [Chapter 1]
Multiband Transceivers - [Chapter 1]
Simen Li
 
Graph Modification: Beyond the known Boundaries
Graph Modification: Beyond the known BoundariesGraph Modification: Beyond the known Boundaries
Graph Modification: Beyond the known Boundaries
AkankshaAgrawal55
 
Phase diagram at finite T & Mu in strong coupling limit of lattice QCD
Phase diagram at finite T & Mu in strong coupling limit of lattice QCDPhase diagram at finite T & Mu in strong coupling limit of lattice QCD
Phase diagram at finite T & Mu in strong coupling limit of lattice QCD
Benjamin Jaedon Choi
 
A verifiable random function with short proofs and keys
A verifiable random function with short proofs and keysA verifiable random function with short proofs and keys
A verifiable random function with short proofs and keysAleksandr Yampolskiy
 
[Question Paper] Fundamentals of Digital Computing (Revised Course) [April / ...
[Question Paper] Fundamentals of Digital Computing (Revised Course) [April / ...[Question Paper] Fundamentals of Digital Computing (Revised Course) [April / ...
[Question Paper] Fundamentals of Digital Computing (Revised Course) [April / ...
Mumbai B.Sc.IT Study
 
Hermite integrators and Riordan arrays
Hermite integrators and Riordan arraysHermite integrators and Riordan arrays
Hermite integrators and Riordan arrays
Keigo Nitadori
 
Declarative Datalog Debugging for Mere Mortals
Declarative Datalog Debugging for Mere MortalsDeclarative Datalog Debugging for Mere Mortals
Declarative Datalog Debugging for Mere Mortals
Bertram Ludäscher
 
Digital Signals and System (October – 2016) [Revised Syllabus | Question Paper]
Digital Signals and System (October  – 2016) [Revised Syllabus | Question Paper]Digital Signals and System (October  – 2016) [Revised Syllabus | Question Paper]
Digital Signals and System (October – 2016) [Revised Syllabus | Question Paper]
Mumbai B.Sc.IT Study
 
DES Block Cipher Hao Qi
DES Block Cipher Hao QiDES Block Cipher Hao Qi
DES Block Cipher Hao Qi
Information Security Awareness Group
 
Metodo Monte Carlo -Wang Landau
Metodo Monte Carlo -Wang LandauMetodo Monte Carlo -Wang Landau
Metodo Monte Carlo -Wang Landau
angely alcendra
 
07_Digital timing_&_Pipelining.ppt
07_Digital timing_&_Pipelining.ppt07_Digital timing_&_Pipelining.ppt
07_Digital timing_&_Pipelining.ppt
BUCHUPALLIVIMALAREDD2
 
[Question Paper] Fundamentals of Digital Computing (Revised Course) [January ...
[Question Paper] Fundamentals of Digital Computing (Revised Course) [January ...[Question Paper] Fundamentals of Digital Computing (Revised Course) [January ...
[Question Paper] Fundamentals of Digital Computing (Revised Course) [January ...
Mumbai B.Sc.IT Study
 
RF Circuit Design - [Ch1-1] Sinusoidal Steady-state Analysis
RF Circuit Design - [Ch1-1] Sinusoidal Steady-state AnalysisRF Circuit Design - [Ch1-1] Sinusoidal Steady-state Analysis
RF Circuit Design - [Ch1-1] Sinusoidal Steady-state Analysis
Simen Li
 
Circuit Network Analysis - [Chapter2] Sinusoidal Steady-state Analysis
Circuit Network Analysis - [Chapter2] Sinusoidal Steady-state AnalysisCircuit Network Analysis - [Chapter2] Sinusoidal Steady-state Analysis
Circuit Network Analysis - [Chapter2] Sinusoidal Steady-state Analysis
Simen Li
 
What we got from the Predicting Red Hat Business Value competition
What we got from the Predicting Red Hat Business Value competitionWhat we got from the Predicting Red Hat Business Value competition
What we got from the Predicting Red Hat Business Value competition
Umaporn Kerdsaeng
 

Similar to Cracking the Enigma Machine - Rejewski, Turing and the Math that saved the world (20)

RF Module Design - [Chapter 1] From Basics to RF Transceivers
RF Module Design - [Chapter 1] From Basics to RF TransceiversRF Module Design - [Chapter 1] From Basics to RF Transceivers
RF Module Design - [Chapter 1] From Basics to RF Transceivers
 
Multiband Transceivers - [Chapter 1]
Multiband Transceivers - [Chapter 1] Multiband Transceivers - [Chapter 1]
Multiband Transceivers - [Chapter 1]
 
Graph Modification: Beyond the known Boundaries
Graph Modification: Beyond the known BoundariesGraph Modification: Beyond the known Boundaries
Graph Modification: Beyond the known Boundaries
 
Phase diagram at finite T & Mu in strong coupling limit of lattice QCD
Phase diagram at finite T & Mu in strong coupling limit of lattice QCDPhase diagram at finite T & Mu in strong coupling limit of lattice QCD
Phase diagram at finite T & Mu in strong coupling limit of lattice QCD
 
A verifiable random function with short proofs and keys
A verifiable random function with short proofs and keysA verifiable random function with short proofs and keys
A verifiable random function with short proofs and keys
 
[Question Paper] Fundamentals of Digital Computing (Revised Course) [April / ...
[Question Paper] Fundamentals of Digital Computing (Revised Course) [April / ...[Question Paper] Fundamentals of Digital Computing (Revised Course) [April / ...
[Question Paper] Fundamentals of Digital Computing (Revised Course) [April / ...
 
diss_present
diss_presentdiss_present
diss_present
 
Cs262 2006 lecture6
Cs262 2006 lecture6Cs262 2006 lecture6
Cs262 2006 lecture6
 
Hermite integrators and Riordan arrays
Hermite integrators and Riordan arraysHermite integrators and Riordan arrays
Hermite integrators and Riordan arrays
 
Declarative Datalog Debugging for Mere Mortals
Declarative Datalog Debugging for Mere MortalsDeclarative Datalog Debugging for Mere Mortals
Declarative Datalog Debugging for Mere Mortals
 
Digital Signals and System (October – 2016) [Revised Syllabus | Question Paper]
Digital Signals and System (October  – 2016) [Revised Syllabus | Question Paper]Digital Signals and System (October  – 2016) [Revised Syllabus | Question Paper]
Digital Signals and System (October – 2016) [Revised Syllabus | Question Paper]
 
DES Block Cipher Hao Qi
DES Block Cipher Hao QiDES Block Cipher Hao Qi
DES Block Cipher Hao Qi
 
Metodo Monte Carlo -Wang Landau
Metodo Monte Carlo -Wang LandauMetodo Monte Carlo -Wang Landau
Metodo Monte Carlo -Wang Landau
 
07_Digital timing_&_Pipelining.ppt
07_Digital timing_&_Pipelining.ppt07_Digital timing_&_Pipelining.ppt
07_Digital timing_&_Pipelining.ppt
 
[Question Paper] Fundamentals of Digital Computing (Revised Course) [January ...
[Question Paper] Fundamentals of Digital Computing (Revised Course) [January ...[Question Paper] Fundamentals of Digital Computing (Revised Course) [January ...
[Question Paper] Fundamentals of Digital Computing (Revised Course) [January ...
 
cwit-poster_logo
cwit-poster_logocwit-poster_logo
cwit-poster_logo
 
RF Circuit Design - [Ch1-1] Sinusoidal Steady-state Analysis
RF Circuit Design - [Ch1-1] Sinusoidal Steady-state AnalysisRF Circuit Design - [Ch1-1] Sinusoidal Steady-state Analysis
RF Circuit Design - [Ch1-1] Sinusoidal Steady-state Analysis
 
m.tech final
m.tech finalm.tech final
m.tech final
 
Circuit Network Analysis - [Chapter2] Sinusoidal Steady-state Analysis
Circuit Network Analysis - [Chapter2] Sinusoidal Steady-state AnalysisCircuit Network Analysis - [Chapter2] Sinusoidal Steady-state Analysis
Circuit Network Analysis - [Chapter2] Sinusoidal Steady-state Analysis
 
What we got from the Predicting Red Hat Business Value competition
What we got from the Predicting Red Hat Business Value competitionWhat we got from the Predicting Red Hat Business Value competition
What we got from the Predicting Red Hat Business Value competition
 

Recently uploaded

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 

Recently uploaded (20)

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 

Cracking the Enigma Machine - Rejewski, Turing and the Math that saved the world

  • 1. The Math That Saved the World Brad Young brad@clearpoint.co.il A Mathematical and Historical Analysis of the Cryptographic Attacks on the Nazi Enigma Machine Marian Rejewski Alan Turing
  • 2. Agenda Development of Enigma Machine – Why/How/What The Rejewski Crack The Turing Crack Historical Impact
  • 3. WWI Cryptology First major war with radio + telegraph Very large volume of communications Hand-ciphers Playfair, ADFGVX etc. Bigraph substitution + transformation Encryption/Decryption Inefficient …Became bottleneck Cryptanalysis Difficult, time-consuming… But successful (mainly)
  • 5. Invention of Enigma Machine Arthur Scherbius Efficient! (oh, and also Secure, by the way) Business, Military versions Early 1920’s – very poor sales German economy in trouble
  • 6. Oops Publishes history book Reveals the impact of crypto on WWI Now, the Germans want Enigma!
  • 7. A B C D E F G H Reflector 3rd Rotor 2nd Rotor 1st Rotor Lightbulbs Keyboard Enigma Schematic
  • 8. A B C D E F G H Reflector Lightbulbs 3rd Rotor 2nd Rotor 1st Rotor Keyboard Electric Circuit
  • 9. A B Pressing ‘A’ on the keyboard… C D E F … lights the ‘B’ lightbulb G H NOTE: Because it is a electric circuit, no letter can map to itself. Minor detail combinatorically speaking, but very important for the Turing crack. Reflector Lightbulbs 3rd Rotor 2nd Rotor 1st Rotor Keyboard Electric Circuit
  • 10. A B C D E After each letter, the first rotor shifts one step. So now, pressing ‘A’ lights a different lightbulb….’F’ F G H Reflector Lightbulbs 3rd Rotor 2nd Rotor 1st Rotor Keyboard Rotor Shift
  • 11. A B C D E F Sits between keyboard and rotors. Each plug cable swaps signal between two letters. 6 cables connect 12 letters. 14 other letters are not plugged at all. G H Reflector Lightbulbs Plugboard 3rd Rotor 2nd Rotor 1st Rotor Keyboard Plugboard
  • 13. Keysize A B Rotor Order Rotor Setting Plugboard Wiring I – III - II VYJ A/G, D/Q, J/Z,L/S, M/V, N/T 3! = 6 263 =17,576 C(26,2) x C(24,2) x C(22,2) x C(20,2) x C(18,2) x C(16,2) x 1/6! (26!)3 x C(26,2)…C(2,2)x1/13! C ≈ 105 D E F ≈ 1011 ≈ 1092 G H Total Key Size ≈ 10108 Variable Key Size ≈ 1016
  • 14. German Use of Enigma
  • 15.
  • 16. Agenda Development of Enigma Machine – Why/How/What The Rejewski Crack The Turing Crack Historical Impact
  • 17. Biuro Szyfrów 1918 – Polish Independence 1919 – Creation (and success) of Cipher Bureau 1926 – Germany goes dark as Enigma is adopted 1930 – Bring in the mathematicians (?!?) Marian Rejewski Jerzy Różycki Henryk Zygalski
  • 18. The Rejewski Crack Intuition,Espionage,Engineering Understand how Enigma works Reverse-engineer the wiring Be able to crack the key each day Permutational Mathematics
  • 19. The Math of Permutation Cycles P = P-1 =
  • 20. Cycle Notation P = P = (AECH)(BFD)(G) = (BFD)(G) (AECH) = (FDB)(G)(CHAE) P-1 = (HCEA)(DFB)(G) Benefits of cycle notation: Concise Easier to take inverse (These are benefits of efficiency)
  • 21. Cycle Structure = (AECH)(BFD)(G) P = 4 3 1 = (AFC)(BG)(D)(EH) Q = 3 2 1 2 Benefits of cycle notation: Concise Easier to take inverse Gives more info – Cycle Structure (This is a benefit of value-add information)
  • 22. Composition P = = (AECH)(BFD)(G) Q = = (AFC)(BG)(D)(EH) Q ◦ P = Q(P()) = (AHFDGBCE) Q ◦ P ≠ P ◦ Q - NOT Commutative Q ◦ ( P ◦ R ) = ( Q ◦ P ) ◦ R - Associative
  • 23. Identity = (A)(B)(C)(D)(E)(F)(G)(H) I = P ◦ I = I ◦ P = P P ◦ P -1 = I I ◦ I = I i.e. I = I -1 (ab) ≠ I , but (ab) ◦ (ab) = (a)(b) i.e. (ab) = (ab)-1
  • 24. Conjugation Conjugation of Q by P is defined as P ◦ Q ◦ P-1 P = (AECH)(BFD)(G) P-1 = (HCEA)(DFB)(G) Q = (AFC)(BG)(D)(EH) 1-2-2-3 1-2-2-3 This is not a coincidence! This is not a coincidence! P ◦ Q ◦ P-1 = (AC)(B)(DHE)(FG)
  • 25. Theorem: Cycle structure is invariant under conjugation Proof: Suppose Q: ij, that is Q(i) = j. Consider P ◦ Q ◦ P-1 (P(i)). P ◦ Q ◦ P-1 (P(i)) = P ◦ Q ◦ (P-1 ◦ P)(i) = P ◦ Q(i) = P(j) i.e. P ◦ Q ◦ P-1: P(i)P(j) Therefore… If Q has k-cycle (i1, i2 … ik) then P ◦ Q ◦ P-1 has k-cycle (P(i1), P(i2)…P(ik)) QED
  • 26. Using Permuation Cycles on Enigma A B Suppose we intercept a message: BOLJRVSQIGPQTMNWJRAKOBYTKMTTGBBRQUPWLHSOLNFEQTHJOVX Plaintext: abcabcCiphertext: BOLJRV Define En as the permutation that occurs when Enigma machine is in state n. So, in the first state, aB. In the fourth state, aJ E1 = (aB …E4 = (aJ … Now…Recall the effect of the Reflector, which creates 2-letter circuits So, if aB, then Ba. So the cycle is closed. E1 = (aB) …E4 = (aJ) … So, we can now compute E4 ◦ E1 = (BJ … C These are the variablesa,b,c, not the actual letters D E F G H
  • 27. Using Permuation Cycles on Enigma If we have many intercepts from the same day, then they were produced with the same day settings. So we can calculate the entire compositions… E4 ◦ E1 = (BJUMPWTCFE)(ARDNHSLYZK)(G)(I)(O)(Q)(X)(V)E5 ◦ E2 = (ORJCLVHGXKF)(AUYMPZQNDWB)(ES)(IT)E6 ◦ E3 = (BWOIKTZHXB)(EPQJYLVGN)(ARCU)(DSMF) Good news: abc variables have been eliminated! We’ve found a unique identifier! Bad news: It is one of 10,000,000,000,000,000 possibilities
  • 28. Explore the nature of En A B En = P ◦ Rn ◦ P where P is the plugboard permutation and Rn is rotor permutation when in state n E4 ◦ E1 = P ◦ R4 ◦ P ◦ P ◦ R1 ◦ P Now, recall the plugboard… P = (ab)(cd)(ef)(gh)(ij)(kl)(m)(n)(o)(p)(q)(r)(s)(t)(u)(v)(w)(x)(y)(z) All 2-cycles and 1-cycles, therefore P = P-1 ! E4 ◦ E1 = P ◦ R4 ◦ P ◦ P ◦ R1 ◦ P = P ◦ R4 ◦ P ◦ P-1 ◦ R1 ◦ P = P ◦ R4 ◦ (P ◦ P-1 ) ◦ R1 ◦ P = P ◦ R4 ◦ R1 ◦ P = P ◦ (R4 ◦ R1 ) ◦ P = P ◦ (R4 ◦ R1 ) ◦ P-1 C P R D E F G H Conjugation:Cycle structure of E4 ◦ E1 is same as cycle structure of R4 ◦ R1 and is not affected at all by the plugboard! E4 ◦ E1 = (BJUMPWTCFE)(ARDNHSLYZK)(G)(I)(O)(Q)(X)(V)E5 ◦ E2 = (AUYMPZQNDWB)(CLVHGXKFORJ)(ES)(IT)E6 ◦ E3 = (BWOIKTZHXB)(EPQJYLVGN)(ARCU)(DSMF) 1-1-1-1-1-1-10-10 ; 2-2-11-11 ; 4-4-9-9 Remember: Keysize(R) ≈ 105 Keysize(P) ≈ 1011
  • 29. Now, where are we? Figuring out En is problem of size 1016 Now, we have Rn, a smaller problem: 105 Just barely small enough to attack brute force
  • 30. Building the Rejewski Dictionary RO RS E4 ◦ E1 E5 ◦ E2 E6 ◦ E3 1 2 3 AAA 13-13 1-1-12-12 1-1-12-12 1 2 3 BAA 1-1-12-12 1-1-12-12 2-2-11-11 1 2 3 CAA 1-1-12-12; 2-2-11-11 1-1-12-12 1 2 3 DAA 2-2-11-11 1-1-12-12 13-13 1 2 3 EAA 1-1-12-12 13-13 13-13 1 2 3 FAA 13-13 13-13 1-1-2-2-3-3-3-3-4-4 1 2 3 GAA 13-13 1-1-2-2-3-3-3-3-4-4 2-2-5-5-6-6 1 2 3 HAA 1-1-2-2-3-3-3-3-4-4 2-2-5-5-6-6 13-13 1 2 3 IAA 2-2-5-5-6-6 13-13 4-4-9-9 1 2 3 JAA 13-13 4-4-9-9 1-1-5-5-7-7 1 2 3 KAA 4-4-9-9 1-1-5-5-7-7 13-13 1 2 3 LAA 1-1-5-5-7-7 13-13 1-1-2-2-10-10 1 2 3 MAA 13-13 1-1-2-2-10-10 1-1-1-1-11-11 . . . . . . . . . . . . . . . … 2-2-11-11; 1-1-1-1-1-1-1-1-4-4-5-5; 1-1-12-12 KFE 213 2-2-11-11; 1-1-1-1-1-1-1-1-4-4-5-5; 2-2-5-5-6-6 ZTF 132 2-2-11-11; 1-1-1-1-1-1-1-1-4-4-5-5; 5-5-8-8 GIC 312 2-2-11-11; 1-1-1-1-1-1-1-1-9-9; 1-1-12-12 AHH 132 2-2-11-11; 1-1-1-1-1-1-1-1-9-9; 1-1-12-12 WLA 312 2-2-11-11; 1-1-1-1-1-1-1-1-9-9; 1-1-5-5-7-7 YKG 132 2-2-11-11; 1-1-1-1-1-1-1-1-9-9; 13-13 DXI 213 2-2-11-11; 1-1-1-1-1-1-1-1-9-9; 13-13 ESY 321 2-2-11-11; 1-1-1-1-1-1-1-1-9-9; 13-13 VHX 213 2-2-11-11; 1-1-1-1-1-1-1-1-9-9; 2-2-11-11 UNV 231 … 1 setting every 4 minutes, x 20 hours/day = 300 / day 105 / 300 ≈ 1 year to complete Good news; Solved the RO, RS! Bad news: 105 solved, 1011 not solved Cycle structure is not unique …even though 105 << (1012)3 ≈ 1012 But most have < 10
  • 31. Recovering the Plugboard Plugboard is the biggest problem combinatorically But… It is trivial to solve E4 ◦ E1 = (BJUMPWTCFE)(ARDNHSLYZK)(G)(I)(O)(Q)(X)(V) R4 ◦ R1 = (MGWTREFBJU)(AKZCINLSHY)(P)(D)(O)(Q)(V)(X) (BJUMPWTCFE) (BJUMGWTREF) Plugboard settings: P/G , C/R , E/F , etc.
  • 32. Paradox of Decreasing Benefit Keysize # Cables
  • 33. Agenda Development of Enigma Machine – Why/How/What The Rejewski Crack The Turing Crack Historical Impact
  • 34. 1939 – Brink of War Polish deliver Enigma replica and training to England and France Biuro Szyfrów is dismantled
  • 35. Bletchley Park HQ of British Government Code and Cypher School (GCCS)
  • 36. New Challenges Combinatoric More rotors to choose from Increase # of plugs Ring settings Procedural Eliminate Message Key repetition Navy / Air Force / Army mods Keysize now 1023
  • 37. Turing’s Solution Known-Plaintext attack Heil Hitler Wetterbericht Seeding values Plaintext Crib:Ciphertext: Try to place the crib without letter any letter mapping to itself WETTERBERICHT WETTERBERICHT WETTERBERICHT WETTERBERICHT WETTERBERICHT EXLMBTWZXBITWZCIQ P(false hit) = (25/26)length of crib
  • 38. Finding Cycles WETTERBERICHT EXLMBTWZXBITW E1: WE E5: EB E7: BW
  • 39. J Q F b E E1 E1: WE E5: EB E7: BW a W J Q J B b E E5 c J Q L B E7 c a W
  • 40. J Q F b E1 a J Q J b E5 c J Q L E7 c a
  • 41. M V C b E1 a M Z C b E5 c M B D E7 c a
  • 42. M V C b a E1 M Z C b E5 c M B D E7 P(false hit) = (1/26)length of cycle-1 a c
  • 43. Turing’s Bombe NOT a computer Multi-Enigma Wiring 120 rpm  max 6 hrs to solve ~70% of days cracked Accurate crib? Location of crib in message? Find cycle in message? Not too many false hits? Crib seeding Fake missions – Get spotted 18’26”N, 72’49”E = einachtzweisechsnordensiebenzweivierneunosten Reimann zeta zeros
  • 44. Agenda Development of Enigma Machine – Why/How/What The Rejewski Crack The Turing Crack Historical Impact
  • 45. 6 : 60,000,000 :: 8 : ?
  • 46. Secrecy Bletchley Park is gutted Enigma machines captured (and distributed!) Top Secret status until 1973!
  • 47.
  • 51. 1940 – Back to France
  • 52. Rozycki dies in transit
  • 57. 1942 – Portugal, Gibraltar
  • 59. No security clearance (Vichy France)
  • 60. Polish Army – hand ciphers
  • 62. 1950 – Cable salesman
  • 66. 1973 – Finally learns about ULTRA
  • 67.
  • 68. Colossus Computer Cracks Lorenz cipher High-level German communications History of Computers Z3 Colossus ENIAC Mark I
  • 69. NSA
  • 70. Addenda, Errata, Anecdotes Wiring analysis Hans Thilo-Schmidt TTTTTTTTTTTT Entry wheel order Why E1-E6, instead of E0-E5 ? Ring Settings and Rotor Stepping “Turing. Alan Turing.” Other WWII Cryptanalysis Disguising ULTRA intelligence Suggested Reading David Kahn – The Codebreakers Simon Singh – The Code Book