An electro-mechanical rotor cipher machine created by the German engineer Arthur Scherbius.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Ciphers and Permutations. Monoalphabetic Cipher is simply a permutation abcdefghijklmnopqrstuvwxyz SATBUCVDWEXFYGZRQPONMLKJIH Cycle Form (ASOZHDB) (CTNGVLF)
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b

A Presentation by: ~Ksenia Potapov ~Amariah Condon ~Janette Fong ~Janice Lau CRYPTOGRAPHY.
Solving the Enigma How the Western Allies Cracked the German Secret Codes During WW II.
David Evans CS588: Security and Privacy University of Virginia Computer Science Lecture 4: Captain Ridley’s Shooting Party.
Enigma? Several Images from Wikipedia (an online encyclopedia)
Enigma Meghan Emilio Faculty Sponsor: Ralph Morelli (Computer Science)
Modern Cryptography.
Inner Workings of the German Enigma. History of the Enigma The concept was invented by a German named Albert Scherbius in 1918 Scherbius tried to take.
Sigaba 1 Sigaba Sigaba 2 Sigaba  Used by Americans during WWII o And afterwards (to about 1948)  Never broken o Germans quit collecting, considered.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Enigma Meghan Emilio Advisor: Professor Ralph Morelli April 2004.
Enigma 1 Enigma Enigma 2 Enigma  Developed and patented (in 1918) by Arthur Scherbius  Many variations on basic design  Eventually adopted by Germany.
Cryptography Introduction, continued. Sufficient key space principle If an encryption scheme has a key space that is too small, then it will be vulnerable.
ENCRYPTION Jo Cromwell Cornelia Bradford. History of Encryption Encryption has been around since antiquity Cryptography began around 2,000 B.C in Egypt.
1 Codes, Ciphers, and Cryptography-Ch 3.1 Michael A. Karls Ball State University.
History and Background Part 1: Basic Concepts and Monoalphabetic Substitution CSCI 5857: Encoding and Encryption.
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
Alan Turing and Code Breaking
CS110: Computers and the Internet Encryption and Certificates.
David Evans CS200: Computer Science University of Virginia Computer Science Lecture 12: Decrypting Work Circle Fractal.
Future Computers.
Famous Firsts in Computation MSE 2400 Evolution & Learning
Cryptology By Greg Buss Pat Shields Barry Burke. What is Cryptology? Cryptology is the study of “secret writing.” Modern cryptology combines the studies.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
Topic 21 Cryptography CS 555 Topic 2: Evolution of Classical Cryptography CS555.
Cryptography By, Anthony Lonigro & Valentine Mbah.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [1] Cryptology and Its Applications Presented By AKSHAT MATHUR.
Terminology and classical Cryptology
CSCI 5857: Encoding and Encryption
Conventional crypto - Noack Conventional crypto Diffusion and confusion How Mary Queen of Scots lost her head Various hand operable ciphers Various Enigmas.
Cryptography in WWII Explanation of the German Enigma Machine
Encryption of WWII Philip Gebhardt 10/24/2011. Interest.
CRYPTOLOGY IN WWII ByJOE&SEAN. SIGABA SIGABA was similar to the Enigma in basic theory A series of rotors enciphered every character of the plaintext.
The Storyboard stage. Mention what will be your animation medium: 2D or 3D Mention the software to be used for animation development: JAVA, Flash, Blender,
Encryption CS110: Computer Science and the Internet.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
Turing’s Bombes. Solve Enigma using known plaintext Depending on German patterns, e.g. weather reports Sometimes setup by seeding/farming Depended on.
The Enigma Machine Eric Roberts CS 106A February 3, 2016.
By, Amanda Rydzynski O’Brien Computer Skills
The Mathematics Behind
3.1 Chapter 3 Traditional Symmetric-Key Ciphers Part2.
Block Cipher Modes Last Updated: Aug 25, ECB Mode Electronic Code Book Divide the plaintext into fixed-size blocks Encrypt/Decrypt each block independently.
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Eric Roberts and Jerry Cain
CAP Cryptographic Analysis Program
Turing Machines Finite State Machines.
May 2008 Prepared by Dr. Abdulrahman Awadhi
History and Background Part 4: Transposition Ciphers
History and Background Part 3: Polyalphabetic Ciphers
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography.
Networks Encryption.
Who was Alan Turing? Alan Turing played a role in deciphering the messages encrypted by the German Enigma machine. He took the lead in a team that designed.
Lecture 3: Symmetric Key Encryption
In this lesson we will understand:
Rotor Ciphers.
Alan Turing & Cryptanalysis
PART VII Security.
Simple Encryption- Lesson 5
slides courtesy of Eric Roberts
Enigma Cipher Machine By: Amber Churchwell.
Traditional Symmetric-Key Ciphers
WORLD OF WONDERS : THE ENIGMA MACHINE
Modern Cryptography.
Presentation transcript:

An electro-mechanical rotor cipher machine created by the German engineer Arthur Scherbius.

How does it work ? Let’s find out.

The Enigma Structure

Why is the Enigma Machine special ? The wires inside the rotors are actually circuits connecting the battery to a bulb. The rotors move automatically when a key is pressed. Why is this important ? Let’s see

How can we retrieve the Ciphered Text ? Set similar initial configurations as the Enigma machine on which the encryption was done. How did the Germans send this information ? By radio using Morse code. Decryption

Can we exhaust all possible configurations of the Enigma Machine ?.NO. But Why ?But Why ? Let us see the total possible configurations.Let us see the total possible configurations. 3 Rotors can be arranged in 3! Ways=6 ways.3 Rotors can be arranged in 3! Ways=6 ways. Possible initial configuration of the Enigma Machine=26*26*26=Possible initial configuration of the Enigma Machine=26*26*26= ways. Now introducing plugboards.There are maximum 10 pairs.Now introducing plugboards.There are maximum 10 pairs. Total ways we can pair=C(26,2)*C(24,2)*..*C(8,2)=Total ways we can pair=C(26,2)*C(24,2)*..*C(8,2)= Since we don’t care about pair orders we divide by 10!. Therefore the total possible ways=Since we don’t care about pair orders we divide by 10!. Therefore the total possible ways= 150,738,274,937,250 ways. = 150,738,274,937,250 ways. Therefore total possible ways=6*17576* 150,738,274,937,250 ≈ 15,000,000,000,000,000,000 ways.Therefore total possible ways=6*17576* 150,738,274,937,250 ≈ 15,000,000,000,000,000,000 ways. Even a Modern computer would take almost an year to compute that many configurations !!!!Even a Modern computer would take almost an year to compute that many configurations !!!!

Flaw of the Enigma The flaw of the Enigma machine was that a letter could never map to itself. Another flaw was that for a particular rotor configuration, the Enigma encoding was symmetrical. Using this flaw, Alan Turing and Gordon Welchman created a machine which would crack the Enigma code in 20 minutes. The machine was called the Bombe.

Breaking the Enigma Code The most common technique used at Bletchley Park was the known-plaintext attack, in which the codebreakers guess that a particular sequence of characters exists somewhere in the decoded message. A sequence of characters that you guess is part of the plaintext is called a crib. Breaking an Enigma message required the following steps: –Align the crib with the ciphertext to eliminate crashes in which a letter appears to map to itself. –Create a menu recording the links between letter pairs in the crib and ciphertext. –Identify loops in the menu at which a chain of letter pairs cycles back to the original letter. –Use the loops in the menu to create a wiring pattern for an electromechanical device called a Bombe that searches for settings of the Enigma rotors that produce the observed pattern.

Step 1: Align the Crib and Ciphertext UAENFVRLBZPWMEPMIHFSRJXFMJKWRAXQEZ KEINEBESONDERENEREIGNISSEKEINEBESONDERENEREIGNISSEKEINEBESONDERENEREIGNISSEKEINEBESONDERENEREIGNISSEKEINEBESONDERENEREIGNISSEKEINEBESONDERENEREIGNISSE No crashes exist in this alignment, so it is a feasible solution.

Step 2: Construct the Menu V K 0 R E 1 L I 2 B N 3 Z E 4 P B 5 W E 6 M S 7 E O 8 P N 9 M D 10 I E 11 H R 12 F E 13 S N 14 R E 15 J R 16 X E 17 F I 18 M G 19 J N 20 K I 21 W S 22 R S 23 A E 24 LKV OFIHPB ZERJNG AXWSMD , V K 0 R E 1 L I 2 B N 3 Z E 4 P B 5 W E 6 M S 7 E O 8 P N 9 M D 10 I E 11 H R 12 F E 13 S N 14 R E 15 J R 16 X E 17 F I 18 M G 19 J N 20 K I 21 W S 22 R S 23 A E 24

Step 3: Find the Loops V K 0 R E 1 L I 2 B N 3 Z E 4 P B 5 W E 6 M S 7 E O 8 P N 9 M D 10 I E 11 H R 12 F E 13 S N 14 R E 15 J R 16 X E 17 F I 18 M G 19 J N 20 K I 21 W S 22 R S 23 A E 24 LKV OFIHPB ZERJNG AXWSMD ,

References: The Code Book-Simon Singh

Thank You.