Historical cryptography 2. CSCI 470: Web Science Keith Vertanen

Similar documents
Background Data: Naval Warfare, Battle of the Atlantic, Cryptography, and the Code Game. Battle of the Atlantic Allied Convoys vs.

Codes and Nomenclators

Code Breakers: Uncovering German Messages. by Rena Korb. Scott Foresman Reading Street 4.4.4

Cryptography. Module in Autumn Term 2016 University of Birmingham. Lecturers: Mark D. Ryan and David Galindo

Alan Turing: Codebreaker

B. Substitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet.

La Storia dei Messaggi Segreti fino alle Macchine Crittografiche

Voting Systems, Mass Murder, and the Enigma Machine

Cipher Machines From Antiquity to the Enigma Machine

CPSC 467: Cryptography and Computer Security

Purple. Used by Japanese government. Not used for tactical military info. Used to send infamous 14-part message

Overview: The works of Alan Turing ( )

Cryptography Made Easy. Stuart Reges Principal Lecturer University of Washington

Airplane. Estimated Casualty Statistics for the Battle of Tannenberg Allied Powers: 267,000 Central Powers: 80,000

SECURITY OF CRYPTOGRAPHIC SYSTEMS. Requirements of Military Systems

AXIS AND ALLIES 1914 OPTIONAL RULE: RESEARCH AND DEVELOPMENT

Classical Cryptography

The number theory behind cryptography

Quick History: Electricity and Magnetism in the 19 th Century. Background Data: Military Communication and The Radio Game. E&M History.

Background Data: Military Communication and The Radio Game

Encryption Systems 4/14/18. We have seen earlier that Python supports the sorting of lists with the built- in.sort( ) method

MODERN MARVELS: CODES NETWORK: THE HISTORY CHANNEL Writer/Producer/Director: Adrian Maher Date: April 6, 2001 TEASE

Block Ciphers Security of block ciphers. Symmetric Ciphers

CANDOER News. Volume 8 Number 2 Inside this issue

A BIT OF. Machines that learn. Make me invisible! The robot painter. Spies like us. Computer Science for Fun Issue 1

EMINENT & ENIGMATIC. 10 aspects of Alan Turing

Reunion at Bletchley Park, 19 October 1991

Canadian History 1201 January, 2011 Exam

Chapter 4 The Data Encryption Standard

Download Submarines Of World War Two pdf

Airplane. Estimated Casualty Statistics for the Battle of Tannenberg Allied Powers: 267,000 Central Powers: 80,000. Artillery

Military Technology in the World Wars

LETTER OF PROMULGATION

Lecture 1: Introduction

Alan Turing and the Enigma of Computability

World History Unit 13 Lesson 1 The Start of WWI The Belle Epoque The late 1800s & early 1900s had been a time of great scientific discoveries &

Cryptanalysis on short messages encrypted with M-138 cipher machine

1) He was the American President during the duration of the First World War.

Cracking the Code, Part 2: Codes & Combinations

Grade 7 and 8 Math Circles March 19th/20th/21st. Cryptography

Unit 8: In the Clouds

RICHARD FLETCHER, Secretary, the Bill Tutte Memorial Fund

Bombs Away!! The Role of Strategic Bombing in Changing Warfare in World War II

Related Ideas: DHM Key Mechanics

Navy League Summer Camp Semaphore Manual

World War II Unit Day Four U.S. History. The key events, figures, and outcomes of the Atomic Bombing of Japan.

Larsson's A&A50 House Rules


RCN Communications Procedures 1950s 1960s. By Dennis Stapleton (RCN Ret d)

The Fall Of Japan (World War II) By Keith Wheeler

Course Business. Harry. Hagrid. Homework 2 Due Now. Midterm is on March 1. Final Exam is Monday, May 1 (7 PM) Location: Right here

Seizing The Enigma: The Race To Break The German U- Boat Codes, , Revised Edition By David Kahn READ ONLINE

Drill Time: Remainders from Long Division

DUBLIN CITY UNIVERSITY

Lecture 32. Handout or Document Camera or Class Exercise. Which of the following is equal to [53] [5] 1 in Z 7? (Do not use a calculator.

Successful Implementation of the Hill and Magic Square Ciphers: A New Direction

How to Win Axis and Allies Style Games

COS433/Math 473: Cryptography. Mark Zhandry Princeton University Spring 2017

Set-Up Perform these 4 steps to prepare for play:

CLASSICAL CRYPTOGRAPHY COURSE BY LANAKI. March 10, 1996 Revision 1 COPYRIGHT 1996 ALL RIGHTS RESERVED LECTURE 9

10/4/10. An overview using Alan Turing s Forgotten Ideas in Computer Science as well as sources listed on last slide.

Cryptography s Application in Numbers Station

IV. TROOPS FAQ SPECIALIZED UNITS 2

Alliances Leading to (Simulation Prep)

CHAPTER 11 RADIO OPERATING PROCEDURES CHAPTER

National HRO Receivers. Presented to the Ozaukee Radio Club May 10, 2017 Patrick Volkmann W9JI

SENDING MESSAGES. In the battle that followed, the British navy sank four German ships. Steady chaps!

UNIT 19 Lesson Plan 1

MA 111, Topic 2: Cryptography

Chapter 4 MASK Encryption: Results with Image Analysis

Example Enemy agents are trying to invent a new type of cipher. They decide on the following encryption scheme: Plaintext converts to Ciphertext

HISTORY of TELEGRAPHY. Ken Beauchamp. The Institution of Electrical Engineers

Budiansky, Stephen, Her Majesty s Spymaster: Elizabeth I, Sir Francis Walsingham and the Birth of Modern Espionage, Viking, 2005.

Axis & Allies Pacific FAQ

Project VI Testing Naval Artillery and other Things That Blow Up

Revolutionary Activity Guide Discover Revolutionary New Jersey

o Broken by using frequency analysis o XOR is a polyalphabetic cipher in binary

Software Security. Encryption. Encryption. Encryption. Encryption. Encryption. Week 5 Part 1. Masking Data from Unwelcome eyes

Grade 7/8 Math Circles Winter March 24/25 Cryptography

THE WRITERS VOICE. Carl Tighe

Stream Ciphers And Pseudorandomness Revisited. Table of contents

1 Introduction to Cryptology

Math 1111 Math Exam Study Guide

TACTICAL DATA LINK FROM LINK 1 TO LINK 22

An Introduction to Traditional Cryptography and Cryptanalysis for Amateurs. Chris Spackman

Lord Kitchener s Legacy

German Raider Strategies By Elihu Feustel

Georgia Department of Education Georgia Standards of Excellence Framework GSE Grade 8 Mathematics Unit 4

Network Security: Secret Key Cryptography

Key People Causes Battles Terms. Grab Bag

SOLUTION OF POLYGRAPHIC SUBSTITUTION SYSTEMS. Analysis of Four-Square and Two-Square Ciphers

DIY Pencil-and-Paper Encryption

CRYPTANALYSIS OF THE PERMUTATION CIPHER OVER COMPOSITION MAPPINGS OF BLOCK CIPHER

7 th Grade Social Studies Common Final Exam (CFE) Jeopardy Review Game

World War I and Revolutions Study Guide ( )

Example Enemy agents are trying to invent a new type of cipher. They decide on the following encryption scheme: Plaintext converts to Ciphertext

We are going to begin a study of beadwork. You will be able to create beadwork on the computer using the culturally situated design tools.

ECE 583 Lectures 15 RADAR History and Basics

Seizing The Enigma: The Race To Break The German U-Boat Codes, , Revised Edition By David Kahn READ ONLINE

Differential Cryptanalysis of REDOC III

Transcription:

Historical cryptography 2 CSCI 470: Web Science Keith Vertanen

Overview Historical cryptography WWI Zimmerman telegram WWII Rise of the cipher machines Engima Allied encryption 2

WWI: Zimmermann Telegram 1915, U-boat sinks Lusitania 1,198 drown including 128 US Germany agrees to surface 1st 1916, new Foreign Minister Arthur Zimmermann 1917, unrestricted submarine warfare Zimmermann hatches plan Keep American busy at home Persuade Mexico to: invade US and invite Japan to attack US as well Arthur Zimmermann 3

4

Mechanization of secret writing Pencil and paper Security limited by what humans can do quickly and accurately in the heat of battle Enter the machine Thomas Jefferson's wheel cipher Captain Midnight's Code-o-Graph 5

Enigma machine Enigma cipher machine 1918, patented by German engineer Arthur Scherbius Arthur Scherbius A electrical/mechanical implementation of a polyalphabetic substitution cipher 6

7

Rotor (wheel, drum) Enigma rotors Monoalphabetic substitution cipher implemented via complex wiring pattern One of 26 initial positions Geared: rotates after each letter Rotor set 3 rotors in 3!=6 possible orders Eventually increased to 3 out of 5 Navy used even more Possible keys: 3! * 26 3 = 6 * 17,576 = 105,456 8

Plugboard Enigma plugboard Operator inserts cables to swap letters Initially 6 cables Swaps 6 pairs of letters Leaves 14 letters unswapped Possible configurations: 100,391,791,500 Total keys: 17,576 * 6 * 100,391,791,500 10,000,000,000,000,000 9

Enigma machine Sales initially slow Enigma 1923, Germans find out about failures of communication security in WWI 1925, Scherbius starts mass production German military eventually buys 30,000 Enigma machines 1929, Scherbius dies in carriage accident Arthur Scherbius 10

Step 1: Espionage Cracking the Enigma Disgruntled Schmidt meets with French agent Sells Enigma user manuals Allows replica to be constructed Also codebook and daily key scheme French give intelligence to Poles "It is assumed in judging the security of the cryptosystem that the enemy has at his disposition the machine." -German memorandum Hans-Thilo Schmidt 11

Cracking the Enigma Step 2: Poles identify weakness: German's had day code specifying: Configuration of rotors (3! orders) Settings of rotors (26 3 settings) Settings of plugboard (6 letter swaps) Unique key per message: Send 3 letters, encrypted with day key Letters specify new setting of rotors New rotor setting then used for remainder of message Repeat the 3 initial letters Repetition is the enemy of security! Marian Rejewski 12

Cracking the Enigma Find patterns in first 6 letters 1 st & 4 th, 2 rd & 5 th, 3 rd & 6 th ciphers of same letter Message 1st 2nd 3rd 4th 5th 6th 1 L O K R G M 2 M V T X Z E 3 J K T M P E 4 D V Y P Z X 1 st A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 4 th P M R X 13

Cracking the Enigma Given enough messages: Fill in full table of relations between 3 pairs Message 1st 2nd 3rd 4th 5th 6th 1 L O K R G M 2 M V T X Z E 3 J K T M P E 4 D V Y P Z X 1 st A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 4 th F Q H P L W O G B M V R X U Y C Z I T N J E A S D K 14

Find chains Fingerprinting a day key Chains change each day depending on day key 1 st A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 4 th F Q H P L W O G B M V R X U Y C Z I T N J E A S D K A F W A B Q Z K V E L R I B C H G O Y D P C J M X S T N U J 3 links 9 links 7 links 7 links Also for 2 nd & 5 th and 3 rd & 6 th letter pairs # of chains and length, independent of plugboard Catalog 105,456 rotors settings using replica 15

WWII 1938, Germany increases Enigma security Add two additional rotors, C(5, 3) = 60 10 plugboard cables instead of 6 Poles couldn't build big enough bombes Poles give research + replicas to Britain & France US Navy bombe Bletchley Park bombe 16

Bletchley Park Government Code and Cypher School Height of WWII, 9000 people Battled against improvements to Enigma May 1, 1940 Germans stop repeating day key Turing had already developed technique + machine to crack using a crib instead of repetition of key Alan Turing 17

Cribs Cribs Some plaintext you suspect is in ciphertext Ideally also its location e.g. Germans usually broadcast weather at 6 am "wetter" somewhere at start of message German Navy had strongest crypto: 3 rotors out of 8, reflector with 26 orientations Avoided stereotypical messages Allies: Mine area to generate traffic Grid reference as crib Also, stole code books 18

Typex Allied encryption British army and air force 5 rotors ECM Mark II (SIGABA) United States 15 rotors No known cryptanalysis M-209 But big, expensive, fragile Portable mechanical device For tactical use 19

Navy Department, Office of Chief of Naval Operations, Washington, D.C. CLASSIFICATION: CONFIDENTIAL Date: 27 Dec 1943 CARELESS COMMUNICATIONS COST LIVES The following is a list of some of common violations of security principles: DRAFTING: Unnecessary word repetition Unnecessary or improper punctuation Plain language reply to encrypted dispatch Classification too high Precedence too high Cancellation in plain language of an encrypted dispatch ENCRYPTION: "XYX" or "X"'s for nulls "XX" & "KK" to separate padding from text Same letters at both ends to separate padding from text Continuity of padding Seasonal and stereotyped padding Repetition of generatrices (Ed. Note: CSP-845) Systematic selection of generatrices (Ed. Note: CSP-845) Using plain text column for encryption (Ed. Note: CSP-845) Proper strips not eliminated as prescribed by internal indicator (Ed. Note: CSP- 845) Improper set-up according to date Using system not held by all addressees Failing to use system of narrowest distribution CALLS: Enciphering indefinite call sign Enciphering call signs of shore activities CODRESS might have been used Operation of the cipher machine is as important as the cipher itself! 20

Code talkers Machine based encryption Heavy equipment Slow to perform Code talking Use Native American languages Started in WWI with Choctaw Improvise phrases for out-of-vocabulary words "big gun" = artillery "little gun shoot fast" = machine gun 21

Navajo code talkers Code talkers WW II Few outsiders knew the unwritten language 3 line message: 20 seconds vs. machine: 30 min Lexicon of 274 words + phonetic alphabet http://library.thinkquest.org/28005/flashed/timemachine/courseofhistory/navajo-dic.shtml 22

Summary History of cryptography WW I Zimmerman telegraph WW II Enigma Allied encryption Code talkers 23