Cipher Machines: From Antiquity to the Enigma Machine

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Cryptography Made Easy Stuart Reges Principal Lecturer University of Washington.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
A Presentation by: ~Ksenia Potapov ~Amariah Condon ~Janette Fong ~Janice Lau CRYPTOGRAPHY.
Solving the Enigma How the Western Allies Cracked the German Secret Codes During WW II.
Enigma? Several Images from Wikipedia (an online encyclopedia)
Secure communication Informatics for economists II Jan Přichystal
A Glimpse of the History of Cryptography
Enigma Meghan Emilio Advisor: Professor Ralph Morelli April 2004.
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
Cipher Machines: From Antiquity to the Enigma Machine
Fubswrorjb Teri Schmidt Matt Rose K-12 Outreach Center for Education and Research in Information Assurance and Security, Purdue University.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Cis 4930 Introduction to cryptography
Computer Science 101 Cryptography Part I. Notes based on S. Singh, The Code Book: The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
a connection between language and mathematics
Famous Firsts in Computation MSE 2400 Evolution & Learning
Cryptology By Greg Buss Pat Shields Barry Burke. What is Cryptology? Cryptology is the study of “secret writing.” Modern cryptology combines the studies.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b

Lec. 5 : History of Cryptologic Research II
Topic 21 Cryptography CS 555 Topic 2: Evolution of Classical Cryptography CS555.
Encryption: A Brief History Author: Margery Waldron.
CRYPTOGRAPHY v/s CRYPTANALYSIS By Raghuveer Mohan Hardik Barot Neethi Varun Neethi Sekar.
Introduction to Cryptography
Produced in conjunction with Tom Briggs, Education and Outreach Officer at Bletchley Park.
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Terminology and classical Cryptology
CSCI 5857: Encoding and Encryption
Classic Cryptography History. Some Basic Terminology plaintext - original message ciphertext - coded message cipher - algorithm for transforming plaintext.
Conventional crypto - Noack Conventional crypto Diffusion and confusion How Mary Queen of Scots lost her head Various hand operable ciphers Various Enigmas.
1. Securing your computer GADGET GURUS Dr. Wayne Summers TSYS Department of Computer Science Columbus State University
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Encryption of WWII Philip Gebhardt 10/24/2011. Interest.
Welcome to Cryptology 1 st Semester – Room B310. Syllabus.
The Storyboard stage. Mention what will be your animation medium: 2D or 3D Mention the software to be used for animation development: JAVA, Flash, Blender,
Cryptography : from substitution cipher to RSA Alex Karassev.
“IT IS A RIDDLE, WRAPPED IN A MYSTERY, INSIDE AN ENIGMA” * By: Michaela Wontroba Mr Kuniega; PD 5,6,7.
AssessmentAssessmentAssessmentAssessment Class participation—15% Project on classical ciphers—20% Group work on cryptanalysis—10% Written test—25% RSA—10%
CS 150 – Computing: From Ada to the Web Cryptography.
The Enigma Machine Eric Roberts CS 106A February 3, 2016.
The Mathematics Behind
Cryptography Introduction. Definition Origin Objectives Terminologies References Agenda.
Brief Incursion into Cryptography 1 20 th May 2008 Brief Incursion into Cryptography 20 th May 2008.
Secure communication Informatics for economists II Jan Přichystal
Secret Key Cryptography
Cryptography – Test Review
CIT 380: Securing Computer Systems
Eric Roberts and Jerry Cain
Forensic Science Questioned Documents: Part 3
Cryptology in the U.S.—Then and Now
Cryptography CS Principles January 19, 2017.
Cryptography.
In this lesson we will understand:
Cis 4930 Introduction to cryptography
History of Cryptography
Rotor Ciphers.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Chapter 3:Cryptography (16M)
Simple Encryption- Lesson 5
slides courtesy of Eric Roberts
An electro-mechanical rotor cipher machine created by the German engineer Arthur Scherbius.
Enigma Cipher Machine By: Amber Churchwell.
WORLD OF WONDERS : THE ENIGMA MACHINE
Computer Security Chapter Two
Modern Cryptography.
Basics Of Symmetric Encryption
Cryptography: from substitution cipher to RSA
Presentation transcript:

Cipher Machines: From Antiquity to the Enigma Machine Dr. Wayne Summers TSYS School of Computer Science Columbus State University wsummers@ColumbusState.edu http://csc.ColumbusState.edu/summers

The Scientific Imagination: Art and Science from Antiquity to Quantum Physics with Dr. WILLEM D. HACKMANN Merton College Oxford University, England

Introduction to Cryptography and Encryption cryptography Greek words kryptos meaning hidden and grafi meaning writing and is the study of hiding written information through encoding or enciphering code is the replacing of a word or phrase with a word, number or symbol cipher involves making letter-for-letter substitutions. Information can be hidden by either substituting other letters, words or symbols for the letters or words in the message or transposing the letters or words in the message. Cryptology is the overall study of codes and ciphers cryptoanalysis is the science of the decryption of codes and ciphers

Early Encryption began in Egypt around 1900 BCE. The scribe for the Pharaoh Amenemhet II “used hieroglyphic substitutions to impart dignity and authority” to the inscriptions in the pyramids 500-1500 BCE, Assyrian and other cultures began hiding information tattooing the message on the heads of the messengers, “carving” the message in the stomach of animals, hiding the message under new wax 600 BCE, Hebrew scribes used a simple substitution cipher known as ATBASH using a reverse alphabet. (used in book of Jeremiah)

SCYTALE The first appearance of a cipher device is the scytale used by the Greeks around 475 BCE the message “the scytale is a transposition cipher” becomes THESN EIPCS SOICA SPYTI HTRTE AAIRL NO

Caesar cipher a b c d e f g h i j k l m n o p q r s t u v w x y Z D E The message “the caesar cipher is a substitution cipher” becomes WKHFD HVDUF LSKHU LVDVX EVWLW XWLRQ FLSKH U

Early Encryption Arab Cryptanalysis developed around the 8th century A.D. by Abu 'Abd al-Rahman al-Khalil ibn Ahmad ibn 'Amr ibn Tammam al Farahidi al-Zadi al Yahmadi who solved a cryptogram in Greek for the Byzantine emperor; first to discover and write down the methods of cryptanalysis. Another Arab of the 9th century, Abu Yusuf Ya'qub ibn Is-haq ibn as-Sabbah ibn 'omran ibn Ismail al-Kindi wrote "A Manuscript on Deciphering Cryptographic Messages“ 1412, Arabic knowledge of cryptology fully described in the Subh al-a 'sha, 14-volume encyclopedia, written by Shihab al-Din abu 'l-Abbas Ahmad ben Ali ben Ahmad Abd Allah al-Qalqashandi During the Middle Ages in Europe, encryption was primarily restricted to the monks. " Around 1250 A.D., Roger Bacon, wrote the "Epistle on the Secret Works of Art and the Nullity of Magic” describing seven deliberately vague methods of concealing a secret Around 1392 A.D., Geoffrey Chaucer wrote six short passages in cipher in his "The Equatorie of the Planetis" notes to his "Treatise on the Astrolabe”

Early Cipher Machines Leon Battista Alberti (1404-1472) developed a cipher machine for mechanical encryption based on the Caesar cipher algorithm Alberti developed and published the first polyalphabetic cipher and designed a cipher disk to simplify the process "Father of Western Cryptography"

Jefferson Cylinder – built late 1790s

Wheatstone Cryptograph, originally invented by Wadsworth in 1817

Popular Cryptography Jules Verne's - decipherment of a parchment filled with runic characters in the Journey to the Center of the Earth. Sir Arthur Conan Doyle's detective, Sherlock Holmes, was an expert in cryptography. The Adventure of the Dancing Men, involves a cipher consisting of stick men, each representing a distinct letter. Edgar Allan Poe issued a challenge to the readers of Philadelphia's Alexander Weekly Messenger, claiming that he could decipher any mono-alphabetic substitution cipher. He successfully deciphered all of the hundreds of submissions. In 1843, he wrote a short story, "The Gold Bug”

Mexican Army Cipher Disk (1913) b c d e f g h i j k l m n o p q r s t u v w x y z 15 1 6 1 7 1 8 1 9 2 0 2 1 2 2 2 3 2 4 2 5 2 6 0 1 0 2 0 3 0 4 0 5 0 6 0 7 0 8 0 9 1 0 1 1 1 2 1 3 1 4 49 5 0 5 1 5 2 2 7 2 8 2 9 3 0 3 1 3 2 3 3 3 4 3 5 3 6 3 7 3 8 3 9 4 0 4 1 4 2 4 3 4 4 4 5 4 6 4 7 4 8 62 6 3 6 4 6 5 6 6 6 7 6 8 6 9 7 0 7 1 7 2 7 3 7 4 7 5 7 6 7 7 7 8 5 3 5 4 5 5 5 6 5 7 5 8 5 9 6 0 6 1 86 8 7 8 8 8 9 9 0 9 1 9 2 9 3 9 4 9 5 9 6 9 7 9 8 9 9 7 9 8 0 8 1 8 2 8 3 8 4 8 5 Use MERT as key m=1, e=27, r=53,t=79 The word “College” is ciphered as 1703262619 2119 or 6476269719 6890 etc.

Rotor Cipher Machines first rotor machine was built in 1915 by two Dutch naval officers, Theo A. van Hengel and R. P.C. Spengler (de Leeuw) number of inventors independently developed similar rotor machines Most of the rotor machines used a typewriter-like keyboard for input and lighted letters for the output. Some of the later devices used punched card and paper tape for input and/or output

Enigma machine

Enigma machine designed by Arthur Scherbius (~1918) three interchangeable rotors geared together 26 x 26 x 26 (17,576) combinations of letters Steckerverbindungen (plug-board) was introduced in 1928. Initially Stecker allowed 6 pairs of letters to be swapped. later expanded to 10 pairs. increased the number of possible settings (keys) to 159,000,000,000,000,000,000 (159 million million million)  if 1,000 cryptographers, each with a captured Enigma, tested 4 keys/minute, all day, every day, it would take 1.8 billion years to try them all.

Enigma machine Enigma operators were provided a codebook each month that specified the key for each day during the month. Use rotors 2-4-3 Set the rotors to V-F-P Use plugboard settings B/T – D/G – I/R - P/Y – S/V – W/Z each message was assigned a random key. message key was transmitted twice prior to the message being transmitted. E.g. if the day key is V-F-P, the operator might pick a message key of WAS. Using the day key to encrypt the message key, the operator would then transmit WAS WAS followed by the message.

Cracking the Enigma machine Polish mathematicians, Marian Rejewski, Henryk Zigalski, and Jerzy Rozycki, reduced the problem of cracking the enigma code significantly, concentrating on the rotor settings exploiting the fact that the message key was transmitted twice. provided the design of the Enigma machine from a disgruntled German civil servant, Hans-Thilo Schmidt. Rejewski and his team developed a machine called a bombe that simulated the working of six Enigma machines working in unison to try and determine the daily key.

Cracking the Enigma machine British Government Code and Cipher School (GC&CS) opened secret site at Bletchley Park team of codebreakers was led by Alan Turing and Gordon Welchman Turing and Welchman’s bombe consisted of twelve sets of electrically linked Enigma scramblers crib - piece of plaintext associated with a piece of ciphertext (ex. Wetter) Over 400 bombes built for use at Bletchley Park

Bombe

Lorenz

Colossus http://www.codesandciphers.org.uk/lorenz/colossus.htm

Colussus (Then and Now) 2007

Bletchley Park

Other Rotor Machines

CRYPTOQUOTES

CRYPTOQUOTES THE MAN WHO DOESN’T READ GOOD BOOKS HAS NO ADVANTAGE OVER THE MAN WHO CAN’T READ THEM. -– MARK TWAIN

Resources Codes and Ciphers in History, Part 1 - To 1852, (last viewed 14 July 2005), http://www.smithsrisca.demon.co.uk/crypto- ancient.html Copeland, B. Jack (ed), The Essential Turing, (Oxford: Oxford University Press, 2004). English Heritage – Bletchley Park, (last viewed 14 July 2005), http://www.english-heritage.org.uk/bletchleypark History of Encryption, (last viewed 14 July 2005), http://www.deathstar.ch/security/encryption/history/history.htm Kahn, David, The Codebreakers: The Story of Secret Writing (New York: Macmillan, 1967). Kallis, Jr., Stephen A., (last viewed 14 July 2005), Codes and Ciphers, http://www.otr.com/ciphers.html Singh, Simon(1999), The Code Book. Doubleday.

Columbus State University Questions? Dr. Wayne Summers TSYS School of Computer Science Columbus State University Columbus, GA wsummers@ColumbusState.edu 9/18/2018 Columbus State University