Enigma Meghan Emilio Advisor: Professor Ralph Morelli April 2004.

Slides:



Advertisements
Similar presentations
Cryptography encryption authentication digital signatures
Advertisements

Classical Encryption Techniques Week 6-wend. One-Time Pad if a truly random key as long as the message is used, the cipher will be secure called a One-Time.
Kyle Johnson. Cryptology Comprised of both Cryptography and Cryptanalysis Cryptography - which is the practice and study of techniques for secure communication.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
A Presentation by: ~Ksenia Potapov ~Amariah Condon ~Janette Fong ~Janice Lau CRYPTOGRAPHY.
Security & Encryption Thomas Fenske & Joseph Minter.
Enigma Meghan Emilio Faculty Sponsor: Ralph Morelli (Computer Science)
Secure communication Informatics for economists II Jan Přichystal
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
Enigma Machine - Design Presentation Group M1 Adithya Attawar Shilpi Chakrabarti Zavo Gabriel Michael Sokolsky Digital World War II Enigma Cipher Wed.
Inner Workings of the German Enigma. History of the Enigma The concept was invented by a German named Albert Scherbius in 1918 Scherbius tried to take.
Classical Cryptography
The Enigma Encryption System Andrew Regan CSC 290.
Purple 1 Purple Purple 2 Purple  Used by Japanese government o Diplomatic communications o Named for color of binder cryptanalysts used o Other Japanese.
Index of Coincidence Meghan Emilio Professor Ralph Morelli February 18, 2004.
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
What is Cryptography? Definition: The science or study of the techniques of secret writing, esp. code and cipher systems, methods, and the like Google.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Enigma 1 Enigma Enigma 2 Enigma  Developed and patented (in 1918) by Arthur Scherbius  Many variations on basic design  Eventually adopted by Germany.
Chapter 2 – Classical Encryption Techniques
IntroConcAnalysisPreviousSystemsRotors
Cryptography Week-6.
Polyalphabetic Substitution Ciphers. First Steps Towards Complexity  If one alphabet is good, then two alphabets must be better!  By doubling the number.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Cryptography Programming Lab
CIS 5371 Cryptography Introduction.
CSCI 5857: Encoding and Encryption
Week 2 - Wednesday.  What did we talk about last time?  Encryption  Shift ciphers  Transposition ciphers.
Hill Cipher Developed by the mathematician Lester Hill in The encryption algorithm takes m successive plain text and substitute for them m cipher.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
Lec. 5 : History of Cryptologic Research II
Topic 21 Cryptography CS 555 Topic 2: Evolution of Classical Cryptography CS555.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Section 2.7: The Friedman and Kasiski Tests Practice HW (not to hand in) From Barr Text p. 1-4, 8.
Symmetric-Key Cryptography
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
CSCI 5857: Encoding and Encryption
Polyalphabetic CIPHERS Linguistics 484. Summary The idea How to recognize: index of coincidence How many alphabets: Kasiski.
Conventional crypto - Noack Conventional crypto Diffusion and confusion How Mary Queen of Scots lost her head Various hand operable ciphers Various Enigmas.
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
© A+ Computer Science - Codes and ciphers have existed for hundreds of years. People have always had the need to hide secrets.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Encryption of WWII Philip Gebhardt 10/24/2011. Interest.
CRYPTOLOGY IN WWII ByJOE&SEAN. SIGABA SIGABA was similar to the Enigma in basic theory A series of rotors enciphered every character of the plaintext.
The Storyboard stage. Mention what will be your animation medium: 2D or 3D Mention the software to be used for animation development: JAVA, Flash, Blender,
Introduction to Cryptography Lecture 8. Polyalphabetic Substitutions Definition: Let be different substitution ciphers. Then to encrypt the message apply.
CS 150 – Computing: From Ada to the Web Cryptography.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
The Enigma Machine Eric Roberts CS 106A February 3, 2016.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
Lecture 3 Page 1 CS 236 Online Basic Encryption Methods Substitutions –Monoalphabetic –Polyalphabetic Permutations.
Secure communication Informatics for economists II Jan Přichystal
Eric Roberts and Jerry Cain
Chapter 2 Basic Encryption and Decryption
Cryptography CS Principles January 19, 2017.
History and Background Part 3: Polyalphabetic Ciphers
Matt Salamone and Pete McIlwee
Enigma Machine.
Rotor Ciphers.
Simple Encryption- Lesson 5
slides courtesy of Eric Roberts
An electro-mechanical rotor cipher machine created by the German engineer Arthur Scherbius.
WORLD OF WONDERS : THE ENIGMA MACHINE
Modern Cryptography.
Meghan Emilio Professor Ralph Morelli February 18, 2004
Presentation transcript:

Enigma Meghan Emilio Advisor: Professor Ralph Morelli April 2004

Objective There are two main objectives of this project First, to create a working simulation of an Engima machine that is as faithful as possible. Second, to create a program which will “break” Engima. That is, decrypt messages even if little or no information about the original settings is known.

What is Enigma? Electrical enciphering machine widely used by the German Military during WWII. Three rotating rotors. Breaking Enigma a turning point of the war.

Rotors First rotor rotates each time a character is input. The second rotor rotates once each time the first rotor makes one full turn. The third rotor rotates once each time the second rotor has rotated completely.

Plug Board Swaps pairs of letters, automatically, both before and after each character passes through the rotors. Major difference between commercial and military Enigma.

Putting It All Together Swap InputOutput Swap

Accomplished Created an Enigma Simulation Input English/Encrypted text and output Encrypted text/English Java Applet Faithful to rotor wirings and reflectors used during WWII

Accomplished Created an Analyzer Input encrypted text and output original English text No other input information is needed Assumes possession of an Enigma machine Assumes text was encrypted without a plug board Searches through possible decryptions and choosing the best one Uses Index of Coincidence (IC) as a scoring function

What is Index of Coincidence? Index of Coincidence (IC) is defined to be the probability that two randomly selected letters will be identical. It was introduced by William Friedman in The Index of Coincidence and its Applications in Cryptography (1920). IC is a statistical measure which distinguishes text encrypted with a polyalphabetic substitution cipher from text encrypted with a monoalphabetic substitution cipher.

Calculating the IC The formula used to calculate IC: Σ (f i * (f i -1)) N(N-1) where 0 > i > 25, f i is the frequency in the sample of the i th letter of the alphabet, and N is the total number of letters in the sample Every language has such an IC, for example: English: German: Spanish: The IC for random text (even distribution of letters) is

Why IC? Text encrypted by Enigma is polyalphabetic, so IC can distinguish easily between encrypted text and English. Allows for a heuristic algorithm Instead of searching all possible decryptions, take the first one that comes close to Effective on larger sample sizes (comparable to exhaustive search) More efficient (comparable to rotor setting)

Problems with IC The effectiveness of IC depends on the size of the sample:

Results

Future Work Plug Board Simple Substitution Analyzer Improvements Distributed Computing Better Heuristic Algorithm

References History of the Enigma Machine.. Cryptography -- Enigma Cipher.. The German Enigma Cipher Machine – History of Solving.. Hodges, Andrew. Alan Turing the Enigma. New York: Simon & Schuster, Inc., Carlson, Andy. Simulating the Engima.. Pictures © 1995, Morton Swimming,.

Questions?