The History and Technology of the Enigma Cipher Machine The History and Technology of the Enigma Cipher Machine Ralph Simpson

Slides:



Advertisements
Similar presentations
Origin and Nature of the Allied Cryptographic Advantage During World War II By Grant Musick.
Advertisements

By Megan Goatley. history one of the last of a top World War Two codebreaking team at Bletchley Park codebreaker Jerry Roberts dies aged 93, Capt Roberts,
Cryptology Making & Breaking Codes & Ciphers. AJ 1152 Cryptology Cryptography –Science of creating codes or ciphers Cryptanalysis –Science of breaking.
The political and military leaders of the countries that went to war in 1939 believed that they had learned the lessons of WWI. Some, however, had learned.
Code Breaking during the Second World War An Introduction By Gary J Becea.
Oakland Raiders. Original Raiders Civil War Blockade: Anaconda Plan.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
 starter activity Churchill said that the Battle of the Atlantic was ‘the only thing that frightened me.’ What do you think he meant? Click picture to.
Solving the Enigma How the Western Allies Cracked the German Secret Codes During WW II.
Enigma? Several Images from Wikipedia (an online encyclopedia)
Enigma Meghan Emilio Faculty Sponsor: Ralph Morelli (Computer Science)
Secure communication Informatics for economists II Jan Přichystal
Modern Cryptography.
Introduction to Cryptography and Security Mechanisms: Unit 5 Theoretical v Practical Security Dr Keith Martin McCrea
Inner Workings of the German Enigma. History of the Enigma The concept was invented by a German named Albert Scherbius in 1918 Scherbius tried to take.
National Security and Cryptography Jude Vanover and Justin Gross.
A Glimpse of the History of Cryptography
Cryptography CS-103 Chapter 8. History Humans have been devising systems to encode information for at least 4000 years.Humans have been devising systems.
Enigma Meghan Emilio Advisor: Professor Ralph Morelli April 2004.
Enigma 1 Enigma Enigma 2 Enigma  Developed and patented (in 1918) by Arthur Scherbius  Many variations on basic design  Eventually adopted by Germany.
Battle of the Atlantic By: Jordyn, Ivana, Emily, Vanessa.
U-Boats were undersea boats that attacked allied ships. The U-Boat.
Cryptography Week-6.
Section 3.6: An Introduction to Cryptography
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Alan Turing and Code Breaking
Cryptology By Greg Buss Pat Shields Barry Burke. What is Cryptology? Cryptology is the study of “secret writing.” Modern cryptology combines the studies.
The Turing machine Olena Lastivka. Definition Turing machine is a theoretical device that manipulates symbols on a strip of tape according to a table.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
Encryption: A Brief History Author: Margery Waldron.
Cryptography By, Anthony Lonigro & Valentine Mbah.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Introduction to Cryptography
Produced in conjunction with Tom Briggs, Education and Outreach Officer at Bletchley Park.
CSCI 5857: Encoding and Encryption
Enigma Plymstock School History Department. The Battle of the Atlantic The Battle of the Atlantic Since the evacuation of the British Army from the beaches.
Unit 3 Day 4. Warm-Up 1.Write the Now/Next Function Rule for3, -9, 27, -81, … 2.Write the Input/Output Function Rule for the table to the right: 3.In.
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
David Evans CS551: Security and Privacy University of Virginia Computer Science Lecture 3: Striving for Confusion Structures.
By: Rachel Meecham and Sierra Sarraino.  The Battle of the Atlantic, which lasted from September 1939 until the defeat of Germany in 1945, was the war’s.
WWII - U-Boats A British convoy made it’s way from England to Nova Scotia because, it needed to protect supply ships from the ever present threat of German.
Encryption of WWII Philip Gebhardt 10/24/2011. Interest.
The Storyboard stage. Mention what will be your animation medium: 2D or 3D Mention the software to be used for animation development: JAVA, Flash, Blender,
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
“IT IS A RIDDLE, WRAPPED IN A MYSTERY, INSIDE AN ENIGMA” * By: Michaela Wontroba Mr Kuniega; PD 5,6,7.
1 WW 2 History Club 25-Mar-2015 Battle of the Atlantic.
CS 150 – Computing: From Ada to the Web Cryptography.
The Battle of the Atlantic The other attack on the United States.
Turing’s Bombes. Solve Enigma using known plaintext Depending on German patterns, e.g. weather reports Sometimes setup by seeding/farming Depended on.
The cracking of Enigma in World War II John Bibb Harry Caplan Abhishek Chhikara Vladimir Grantcharov Aditi Kulkarni Nigel Lawrence Andrew Muldowney Hou.
The Enigma Machine Eric Roberts CS 106A February 3, 2016.
A BRIEF HISTORY OF COMPUTERS, THE INTERNET AND THE UNIVERSE By L. Gillett Webmaster MMC.
Museum Entrance Enigma Code Breaking Enigma SIGABA Native American Code Talkers Welcome to the Museum of WW2 Codes Curator ’ s Offices Back Room Actions.
By, Amanda Rydzynski O’Brien Computer Skills
Chris Christensen Department of Mathematics and Statistics Northern Kentucky University.
The Mathematics Behind
CS 154 Formal Languages and Computability April 5 Class Meeting Department of Computer Science San Jose State University Spring 2016 Instructor: Ron Mak.
Cryptography.
In this lesson we will understand:
History of Cryptography
Enigma Machine.
Rotor Ciphers.
Substitution Codes By Sarah Bonnell.
The Race to Crack the Enigma Machine
An electro-mechanical rotor cipher machine created by the German engineer Arthur Scherbius.
Enigma Cipher Machine By: Amber Churchwell.
The History and Technology of the Enigma Cipher Machine
The German Enigma Machine The Secret Battlefield of WW2
WORLD OF WONDERS : THE ENIGMA MACHINE
Modern Cryptography.
Presentation transcript:

The History and Technology of the Enigma Cipher Machine The History and Technology of the Enigma Cipher Machine Ralph Simpson April 13, 2015

The Technology and History of the Enigma Cipher Machine2   Early history of rotor machines   Controversy of Enigma invention   Enigma technology   Key length of the Enigma   Shortcomings of the Enigma   Significance of Enigma in WW2   Breaking the code   Beginning of modern computing Agenda Agenda

The Technology and History of the Enigma Cipher Machine3 WW1 - Radio made most ciphers obsolete  Proliferation of radios in WW1 highlighted the need for a new cipher technology  Many ciphers had shortcomings when 100’s of messages are captured using the same key  Cipher technology was manual and error-prone Confederate Vigenère Wheel US Army M-94 Cipher Wheel

The Technology and History of the Enigma Cipher Machine4 Invention of Rotor-Based Cipher Machines   Enigma was one of four cipher machines with electro-mechanical rotors invented in 4 different countries between Edward Hebern USA 1917 Arthur Scherbius Germany 1918 Hugo Koch Holland 1919 Arvid Damm Sweden 1919

The Technology and History of the Enigma Cipher Machine5 Enigma Invention Arthur Scherbius Germany Hugo Koch Holland   German Navy bought Enigma in 1926, Army in 1928   In 1927, Enigma inventor Scherbius curiously bought the rights to Koch’s patent, paid 600 Dutch guilders (~$350)   Scherbius had the earlier and almost identical patent   Koch died in 1928   Scherbius died in 1929 in a horse carriage accident, not knowing the role his invention would have in history

The Technology and History of the Enigma Cipher Machine6 History Rewritten in 2003   The patent attorney for the 2 Dutch naval officers was the brother-in-law of Hugo Koch!   Koch collaborated with Scherbius, and their patent drawings were identical to the Dutch naval officer’s   Now it is recognized that van Hengel and Spengler were the true inventors of the Enigma machine Theo van HengelRPC Spengler   2003 discovery: electro-mechanical rotor cipher was invented in 1915 by 2 Dutch naval officers   Dutch Navy suppressed this patent until Nov. 1919, weeks after Koch’s patent was granted

The Technology and History of the Enigma Cipher Machine7 Enigma Technology   Typewriter style cipher machine was a major advance in ease of use and cryptologic strength   Innovation was the electro-mechanical rotors to encipher / decipher messages   Pressing a key causes the rotors to turn, giving a new cipher algorithm for each letter in a message   Electric pathway goes from keyboard plugboard rotors reflector rotors plugboard, then it lights up a bulb   There is no printing capability, so the message must be written down

The Technology and History of the Enigma Cipher Machine8Keyboard   QWERTZ keyboard with only 26 letters - no numbers, space bar, etc.   Pressing key first rotates 1 to 3 rotors then lights up a bulb   Each letter is encrypted 7 to 9 times, the key changes for each letter   Note the serial # plate below the “V”

The Technology and History of the Enigma Cipher Machine9Plugboard   German military added the plugboard to commercial Enigma in 1930, greatly increasing cryptologic strength   In WW2, Germans always used 10 cables, switching 20 of 26 letters instead of varying # of cables from 0-13   Reduced key length by a factor of 4, but simplified operations

The Technology and History of the Enigma Cipher Machine10Rotors   3 rotors out of 5 available are changed daily, giving 5 X 4 X 3 = 60 possible positions for the 3 rotors   Each rotor is set to a beginning alphabetic character, giving 26 3 = 17,576 possible settings   Notch on each rotor sets turnover point for the rotor to its left, giving 26 2 = 676 possibilities (notch on leftmost rotor has no effect)   Later in WW2, the German Navy developed a 4 rotor Enigma and added 3 new rotors to the 5 available Notch by “04” causes the rotor to its left to turn

The Technology and History of the Enigma Cipher Machine11Reflector   Reflector design meant no plaintext letter could encrypt to itself   This was a major design flaw and was exploited by the Allies   Finding cribs (expected words in an enciphered message) was aided by German military precision and the reflector design Reflector is to the left of the rotors (with red “B”)   Reflector swaps pairs of letters   If “A” was enciphered to a “G”, then “G” was enciphered as “A”   The electrical signal goes through the 3 rotors, then the reflector and back again through the 3 rotors   Reflector enables Enigma to encrypt / decrypt with the same key settings

The Technology and History of the Enigma Cipher Machine12 Light Bulb Panel   Keyboard, plugboard and light panel all follow QWERTZ format   Only method of output - no printing capability   Small light bulbs light up a letter, which must be written down   Latches hold plastic filter for use in sunlight   Operated by 4.5 volt battery or transformer from 220V plug

The Technology and History of the Enigma Cipher Machine13 Wiring Diagram Light Panel Keyboard Plugboard Reflector Left Rotor Middle Rotor Right Rotor Entry Drum Q WERTZIOU YXCVBM L N SDFGHKJ Q WERTZIOU Q WERTZIO U ASDFGKJ ASDFGJ P YXCVBML PYXCVBMLN P N 1 K # = # times enciphered 9 A H Reflector & Rotors H

The Technology and History of the Enigma Cipher Machine14 Key Length of the Enigma   Enigma has theoretical maximum number of settings (or keys) of 3 X , far more than the number of atoms in the universe (10 80 )   Germans accepted operational tradeoffs which reduced the key length to the still astronomical number of   A key length of is equivalent to a 77 bit key, better than the 56 bit DES standard of   A key length of means 100,000 operators, each checking one key setting every second would take twice the age of the universe to break the code

The Technology and History of the Enigma Cipher Machine15 Nazi Procedures for the Enigma   Daily keys (settings for rotors and plugboard cables) were sent in a code book each month (longer for U-boats)   Using the daily key, operators first sent a new key, then the text of the message in this new key – nullifying letter frequency analysis   The new key specified the 3 rotor positions, and was sent TWICE Using Enigma in the field  Some operators used the same keys for each message, such as girlfriends initials, giving clues to solve the code  Polish code-breakers exploited this shortcoming until 1939, when the Nazis sent the key only once

The Technology and History of the Enigma Cipher Machine16 Shortcomings of the Enigma  The reflector design allowed encryption and decryption with the same setting, but also ensured no letter encoded to itself  Rotors had regular “odometer” movement  Multiple notches used to make odometer stepping more complex was used on naval Enigma only  Greatest shortcomings were lax operator procedures  Strength of Enigma design gave Germans complete confidence in its security, even when faced with evidence of compromise “Panzer General” Heinz Güderian on communications truck with Enigma machine

The Technology and History of the Enigma Cipher Machine17 German Secrets of the Enigma Enlargement of Enigma from previous slide  Notice anything unusual about this Enigma? Another Nazi propaganda picture of Enigma  White cover over the plugboard  Germans wanted to keep secret the military addition of a plugboard  Even German allies, Italy and Japan, received Enigma machines without the plugboard

The Technology and History of the Enigma Cipher Machine18 Polish Success in Decoding Enigma   Poles made the Bomba – 6 Enigma machines in series to speed the checking of codes for the 6 combinations of 3 rotors   Poles successfully decoded Enigma messages until 1939, when the Germans quit sending the key twice and added 2 new rotors   Poles finally disclosed their code-breaking success to Britain and France just before Germany invaded Poland on Sept. 1, 1939  In 1932, Polish cryptologists reverse engineered the Enigma  Enigma code was still not broken until the French bribed a German official to get keys  German official, Hans-Thilo Schmidt, was later caught and executed  Polish code-breakers could now exploit the double sending of the key – breaking the code in March 1933 Marian Rejewski Polish cryptographer

The Technology and History of the Enigma Cipher Machine19 British Effort in Breaking the Code   In 1939, UK began a major decoding effort in Bletchley Park, employing 11,000 people   Effort led by Alan Turing, who built the Bombe - 36 Enigmas in series to check settings  Many settings were manually eliminated and only the remaining settings checked by the Bombe – brute force wouldn’t work  Army and Luftwaffe messages were routinely decoded, the Naval Enigma was the greatest challenge  British only acted on intelligence that could be uncovered from traditional sources (spies, direction finding, radar, traffic analysis) Bletchley Park Mansion

The Technology and History of the Enigma Cipher Machine20 U-Boat Peril   Before the US entered the war, U-boats decimated Allied shipping, sinking about 60 ships per month   U-boats roamed freely throughout Atlantic, forming “wolfpacks” to efficiently destroy convoys of supply ships for the UK   Nazi strategy was to blockade the UK, expecting a quick surrender   Naval Enigma was initially the same as the Army, but later more complex versions were used with more rigorous procedures U-Boat “The only thing that ever really frightened me during the war was the U-boat peril” - Winston Churchill  Naval Enigma messages were completely secure until May, 1941

The Technology and History of the Enigma Cipher Machine21 U-110 HMS Bulldog – British destroyer captured U-110  The first U-boat boarded and code books recovered was from U-110 in May 1941  Captain died scuttling U-boat  U-110 was sunk by British so Germans didn’t realize their codes were compromised  This single act was the turning point in the Battle of the Atlantic Enigma operator in U-110 Captain of U-110 Fritz Julius Lemp Sinking of U-110

The Technology and History of the Enigma Cipher Machine22 Bombe – the Beginning of Computing   Polish cryptoanalysts named their electro-mechanical codebreaker the Bomba for an ice cream treat, British called it a Bombe   210 Bombes were built in the UK, all were destroyed after WW2   US employed NCR to build a faster version of the Bombe to decode the 4 rotor naval Enigma – 121 were built   By the end of the war, the naval code was deciphered within 12 hours and the rest of the day’s messages were read in real time Alan Turing: Father of Computing US Bombe

The Technology and History of the Enigma Cipher Machine23Colossus   Colossus was used to break Nazi Lorenz teletype cipher, not the Enigma machine   Total of 11 Colossi were built, all destroyed after the war   CHM has tape pulley from an original Colossus Colossus – note paper tape reels on right   Colossus – world’s first programmable digital computer   Named because of its overwhelming size, including 1600 vacuum tubes   Designed by Tommy Flowers with help from Alan Turing in 1943

The Technology and History of the Enigma Cipher Machine24 Battle of the Atlantic   In 1942, a 4th rotor was added to the Naval Enigma and 8 rotors were issued instead of 5 - making it more difficult to decipher   An operator mistakenly sent the same message using old and new Enigmas, giving valuable clues to the new rotors and reflector   It was discovered that unarmed weather trawlers carried the Enigma and codes, an easy target for additional code books   Early U-boat success turned to failure, 725 of 1155 U-boats and 82% of 35,000 sailors never returned from sea   Some estimate breaking the Enigma shortened WW2 by 2 years  After breaking the Naval Enigma code, British selectively protected some ships  British knew when U-boats would surface for supplies, so they pretended to “accidentally” find and destroy them US bombing of U-117 – Aug. 1943

The Technology and History of the Enigma Cipher Machine25 Enigma After WW2   Code-breaking success was not revealed until 1974, despite 11,000 people working on the effort in Bletchley Park, plus thousands more in the US   US and UK encouraged use of Enigmas by other countries, including allies, reading their secrets for 3 decades   Some Bombes were not destroyed, to decipher messages from countries still using Enigmas   Up to 30,000 Enigmas were manufactured, most destroyed during or just after the war   Today, fewer than 350 Enigmas are known to exist, about half in private collections   Record prices at auction: $269K for a 3-rotor Enigma at Bonhams on 4/13/15 $365K for a 4-rotor Enigma at Christies on 12/3/14

The Technology and History of the Enigma Cipher Machine26 Download this Presentation CipherMachines.com/enigma.ppt

The Technology and History of the Enigma Cipher Machine27 Addendum Calculations showing the maximum number of settings both theoretically and as practiced by the Nazis

The Technology and History of the Enigma Cipher Machine28 Plugboard Settings The # of possible plugboard settings is a function of 3 variables: 1. # plugboard cables, p, can be from 0 to # of groupings of possible letters (2p letters out of 26) 3. # interconnections of p cables within the group of letters chosen 1. # plugboard2. # groupings of letters3. # interconnectionsTotal # possible settings cables26! / ((2p!) X (26-2p)!)(2p-1) X (2p-3) X (2p-5) X …X 1(Column 2) X (Column 3) ,950344, ,230153,453,450 41,562, ,038,875 55,311, ,019,589,575 69,657,70010,395100,391,791,500 79,657,700135,1351,305,093,289,500 85,311,7352,027,02510,767,019,638,375 91,562,27534,459,42553,835,098,191, ,230654,729,075150,738,274,937, ,95013,749,310,575205,552,193,096, ,234,143,225102,776,096,548, ,905,853,580,625 Total 532,985,208,200,576

The Technology and History of the Enigma Cipher Machine29 Rotor Settings  The internal wiring of each rotor could be constructed in 26! different combinations. Since 3 rotors are used, the number of combinations when selecting 3 rotors out of 26! are: 26! X (26!-1) X (26!-2) = 65,592,937,459,144, 468,297,405,473,480,371,753,615,896,841,298, 988,710,328,553,805,190,043,271,168,000,000  Each of the 3 rotors could initially be set to any letter: 26 X 26 X 26 = 17,576  The right-most rotor advances one letter after each key is pressed, the second and third rotors advance one letter after a full revolution of the rotor to its right. The setting for the notch to enable this was also changeable to any letter of the alphabet: 26 X 26 = 676 (Note: notch on left-most rotor has no effect)

The Technology and History of the Enigma Cipher Machine30 Reflector Settings  The reflector scrambled the letters in pairs so it could encrypt and decrypt  The letter “A” could be switched to any of the 25 remaining letters, the next letter could be switched to any of the 23 remaining letters, and so on.  Notice this result is the same as using 13 plugboard cables, since all letters are paired (see chart on page 22) 25 X 23 X 21 X … X 1 = 7,905,853,580,625

The Technology and History of the Enigma Cipher Machine31 Total Theoretical Number of Settings   The total theoretical number of Enigma settings is thus the product of the 5 items on the previous 3 slides, or… 3,283,883,513,796,974,198,700,882,069,882,752,878, 379,955,261,095,623,685,444,055,315,226,006,433,615, 627,409,666,933,182,371,154,802,769,920,000,000,000 Or 3.28 X   This number is far greater than the total number of atoms in the observable universe (10 80 )

The Technology and History of the Enigma Cipher Machine32 Theory vs. Practice   The theoretical number of Enigma settings was not achieved in practice by the Germans, the number of settings the Allied Forces encountered for the standard 3 rotor enigma: 10 plugboard cables were always used, reducing errors and the possible combinations to 150,738,274,937,250 Only 5 of 26! possible rotors were issued and known by Allies, so selecting 3 out of 5 is 5 X 4 X 3 = 60 The initial settings of the rotors and the positions of the notches remain the same at 17,576 and 676 Reflector setting was known and remained unchanged = 1 The product of the above numbers is: 107,458,687,327,250,619,360,000 or 1.07 X   To test key settings, 100,000 operators each checking one setting every second would take twice the age of the universe to break the code