41760779079990.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

41760779079990.Pdf .CONFIS~Ti;~691 BBS'l'RIOHJB· THE DISTBIBUTION OF THIS SPECIAL TEXT WILL BE RESTRICTED TO REGULARLY ENROLLED EXTENSION COURSE STUDENTS, 'l'O MILITARY PERSONNEL, AND TO OTHER PERSONS COMING WITHIN THE MEANING OF THE PHRASE "FOR OFFICIAL USE ONLY/, ·. ARMY EXTENSION COURSES ~,· ·~~cY-l~~ I!LA)f'~'~ ~ \_ -·----------;-- --·· SPECIAL TEXT No. 166 ADVANCED MILITARY CRYPTOGRAPHY Szcoxn (19'3) EDmox PREPARED UNDER THE DIRECTION OF THE CHIEF SIGNAL OFFICER FOR USE WITH 'I1fE ARMY EXTENSION COURSES .',; ,_ • RSS'fRI<ffRB document contains information affecting the nat1 defense of the United States within the meaning of die · nage Act (U.S. C. -Y,. ~:>· 50: 31, 32). The transmission o · ocument · · or the revelation of its contents in any nl:an any unauthorized person is prohibited. + UNITED STATES GOVERNMENT PRINTING OFFICE ~ (o ~ ~ WASHINGTON : 19'3 . ,. 7.~0NFIDENTIAL Peclassified and approved for release by NSA on 01-14-2014 pursuant to E.O. 1352§ REF ID:A64691 ,·J/ 30 April 1959 Th.is document is re-graded "eEm'!BBrff " of DOD Directive 5200.l dated 8 ~ UP and by autharity of the Directar '2t1:.!i Security ~ncy. ' Paul~w~ S. Willard Colonel, AOC Adjutant Ge.nera.J. • ~· WAR DEPARTMENT, • WAsmNGTON, Februa1"JI S, 1948. Tbis revision of Special Text No. 166, Advanced Milita.ry Cryptog­ raphy (1935), for use with the Anny Extension Courses, is published for the information and guidance of all concerned. BY ORDEB OF THE SlilCBlilTAB.Y OF wAB! :,. G. o. M.ARSHAT,T., General, Ohiejoj8f4. OFFICIAL! JAMES A. ULIO, Major Gemral, 7?i.e Adjut,ant Geneml,. (XI) • SPECIAL TEXT NO. 166 ADVAllTCBD KILITABY CBYPTOGBAPHY 1943 EDITION • Parqrapha Paga Bmcmox I. Introductory remarks __ ---------------------------- 1- 2 1 A. TRANSPOSITION SYSTEMS • II. Monopbase transposition systems-------------------- 3- 9 5 Ill. Polyphase transposition systems _____________________ 10- 12 17 IV. True double transposition ___________________________ 13- 14 20 V. Grilles and other types of matrices ___________________ 15- 24 24 VI. Miscellaneous transposition systems _______________ .-_ 25- 28 39 B. SUBSTITUTION SYSTEMS VII. Polygraphic systems ____ --------------------------- 29- 31 41 VIII. Checkerboard digraphic substitution ________________ - _ 32-- 37 51 IX. Complex substitution systems _______________________ 38- 45 61 C. REPETITIVE AND COMBINED SYSTEMS X. Repetitive systems _________________________________ 46- 49 68 XI. Combined substitution-transposition systems _________ 50- 58 70 D. CRYPTOGRAPHS AND CIPHER MACHINES XII. Cryptographs _____________________________________ 59-- 62 81 XIII. The obsolete U. 8. Army cipher device, type M-94 ____ 63- 69 85 .··~ XIV. Cipher machines ___________________________________ 70- 75 95 lil. CODE SYSTEMS XV. Code systems in general ____________________________ 76- 77 100 • XVI. Enciphered code----------------------------------- 78- 86 102 (DJ) • ··lf·. ., REF ID:A64691 SECTION l INTRODUCTORY REMARKS Paragraph ™sumcS of preceding information _____ ---- - ----- - -------- - ------ - -- - --- 1 Sequence of study___________________________________________________ 2 1. B.&JumGofprecedinginformation.-a. In Special Text No. • 165 (1935), Elementary Military Cryptography, the student was given his first introduction to the study of the more simple means and methods of secret writing. Considerable attention was devofied. .. • to certain preliminary data in the nature of definitions of basic terms employed in cryptography and of the general circumstances surround­ ing the use of cryptography in military communications. The factors determining the influence or effect that the analysis of military cryptograms will have on the tactical situation were discussed some­ what in detail, and it was shown that of these factors the most im­ portant is the degree of cryptographic security inherent in the cryp­ tographic system itself. This was then discussed in detail in con­ nection with related factors involved in the length of time required to solve military crypt.Ogre.ms. Attention was also directed tO infor­ mation bee.ring upon the employment of cryptography in our Army, and the functions, duties, and responsibilities of the various aniis and services concerned in it were set forth. Coming then to a discussion of certain preliminary details of a practical nature, it was shown that systems suitable for the military use must conform to certain more or less rigid require~ents before they can even be considered for such use because of the present-day limit.ations of the a.rt of signal com­ munication in general. b. Having assimilat;e4 all the foregoing dat.a of an introductory • nature, the student then took up the study of the two principal classes of cryptograms: transposition and substitution. Various examples of cipher systems of the transposition class were first illustrated, these starting out with the simplest varieties of monoliteral route trans­ • position and then progressing through more complex types of simple columnar and keyword columnar methods. Only a. hint was con­ veyed as to the existence of far more complicated double and triple transposition systems. The principal disadvantages of transposition methods in general were discussed. Then substitution systems were taken up and after a brief discussion of the nature of alphabets ~ general and of the kinds of cipher alphabets in particular, a few examples of simple monoalphabetic substitution ciphers were given, (1) REF ID:A64691 .... 2 Methods of producing mixed alphabets were illustrated, and the use of sliding basic sequences to derive a set of secondary alphabets was described. Cases of monoalphabetic substitution with variants were presented and their disadvantages from the point of view of crypto­ graphic security were discussed. It was stated that despite a multi­ plicity of values for cipher equivalents, such methods do not yield cryptograms of a high degree of security, and for this reason other methods of producing a multiplicity of values, based upon true poly­ alphabetic methods, are more satisfactory. The use of cipher disks and cipher tables of various sorts was discussed in connection with more complicated types of substitution, and their disadvantages pointed out. Mention was made of methods of increasing the degree of cryptographic security by suppressing or eliminating the manifes­ tations of periodicity in polyalphabetic systems based upon the use of a repeating key. These led to a consideration of the development and use of cryptographs and cipher machines, a few of which were merely mentioned. c. The category of substitution methods under the heading of code systems was then discussed and examples of the various types of code words and codebook arrangements given. The discussion included a comparison of the advantages and disadvantages of cipher and code methods from the point of view of simplicity, rapidity, practicability, secrecy, accuracy, and economy. Considerable attention wa8 devoted to the secrecy requirements of a cryptographic system for military use. d. There then followed a brief discussion of the errors which are alm0st inevitable in cryptographic communication, and of methods for their ·suppression and elimination. Finally, a summary of the funda­ mental rules for safeguarding cryptograms was presented. e. With the foregoing as a background, a review of which is recom­ mended, the student is in a position now to take up the study of more adv8tD.ced cryptographic methods. Special emphasis is to be laid only upon such systems as are practicable for military use. It is necessary to add, however, that cryptography is by no means a static art or science and that viewpoints are always undergoing change; what is regarded as wholly impracticable today may, through some 0 unforeseen improvement in technique, become feasible tomorrow, and it is unwise to condemn a system too hastily. For example, before the World War, and indeed for the :first two years of that conflict, the use of codebooks in the theater of operations was regarded as wholly impracticable.1 Colonel Hitt in his Manual for the Solution of Military Ciphers, published in 1916, says: 1 See, in this connection, Friedman, William F., American Army Field Codes in the American &peditionary Forces During the First World War, Signal Security Service Publication, OCSigO, War Department, Washington, 1942. REF ID:A64691 !. ! 3 The necessity for exact expression of ideas practioally excludes the use of codes for military work, although it is pOBSible that a special tactical code might be useful for preparation of tactical orders. Also, in an official British .Army Manual, of Oryptography prepared in 1914 is found the following statement: Codes will first be considered, but as they do not fulfill the conditions required of a means of secret communication in the field, they need not be dealt with here I at length. ' In the 1935 edition of this text the foregoing quotations were im- mediately succeeded by the following comment: It need only be pointed out in this connection that today code methods pre­ dominate in the secret communication systems of the military, naval, and dip­ lomatic services of practically all the large nations of the world. Nevertheless, it is likely that within the next decade or two the pendulum may once more swing over to the other position and cipher methods may again come·to the fore, a especially if mechanical and electrical cipher machines are perfected so that their operation becomes practicable for general use. It is for this reason, if for no other, that the cryptographer
Recommended publications
  • Cryptographyorhioohulmuoft CRYPTOGRAPHY OR the HISTORY, PRINCIPLES, and PRACTICE of CIPHER-WRITING
    Digitized by the Internet Archive in 2007 with funding from IVIicrosoft Corporation http://www.archive.org/details/cryptographyorhiOOhulmuoft CRYPTOGRAPHY OR THE HISTORY, PRINCIPLES, AND PRACTICE OF CIPHER-WRITING ^ w >TOGRA OR The History, Principles, and Practice OF CIPHER-WRITING e<^ BY Fl^EDWARD HULME, F.L.S., F.S.A U\ AUTHOR OF "familiar WILD FLOWERS," " MYTHLAND," " NATURAL HISTORY LORE AND LEGEND," "the birth and development OF ORNAMENT," " WAYSIDK SKETCHES," ETC Heres noiv mystery and hieroglyphic Ben Jonson— The Alchemysi. LONDON WARWICK HOUSE, SALISBURY SQUARE, E.C NEW YORK AND MELBOURNE — CONTENTS CHAPTER I PAGE Meaning of cryptography—Objections to its study—Its legitimate use and value—Historic examples of its employment—Deliglit in the mysterious—Many other ways of conveying secret information—Symbolism of action—The spoken word imprisoned and dispatched —A matter not necessarily secret because one cannot understand it — Egyptian hieroglypliics — Chinese characters—Indian mutiny Greek—Ancient Biblical cryptogram — Sheshach of Jeremiah — Sir Henry Eawlinson thereon—Statements for and against Julius Caesar's secret code—The waxed tablet of Demaratus—Difference between hidden and secret writing—The shaven head a writing tablet—Charle- magne and Alfred the Great as cryptographic experts —Mediaeval authorities—Trithemius the Benedictine " — " Steganographia —Dabbling in the black art Dr. Dee—Batista Porta's book on "Natural Majick" —Invisible writing—Chemical methods by vitriol, alum, etc. —Writing on glass or crystal—Papal In- quisition—Disappearing writing—Messages wrapped round rollers—Two methods—A slave's back the writing surface—Chemical methods of no great value ordinarily—Disadvantages of use— Action of light and heat—Chloride of cobalt, sulphate of copper, etc.
    [Show full text]
  • Enigma Cryptanalysis - Beginnings
    Enigma Cryptanalysis - Beginnings Gaurish Korpal∗ [email protected] July 15, 2015 Abstract Any message may be hidden in two basic ways. The methods of steganography conceal the very existence of the message, for example invisible inks and microdots. The methods of cryptography, on the other hand, do not conceal the presence of a secret message but render it unintelligible as ciphertext, to outsiders by various transformations of the plaintext. Breaking ciphers require ingenuity, creativity and a little math. In this article our focus will be on breaking Enigma ciphers. The skill involved in breaking ciphers is called cryptanalysis. Keywords. Enigma, cryptanalysis, cypher, Caesar, Vigen`ere,Rejewski, Zygalski, Bomba, Bombe 1 Cipher not Code A code is a mapping from some meaningful unit (word, sentence, phrase) into something else (usually a shorter group of symbols). A code requires a codebook, it is simply a list of these mappings. For example we could make up a code where the word Apple is written as 67, historical example of this is \Zimmermann Telegram Code" for more details refer [7]. Ciphers do not involve meaning. Instead they are mechanical operations (known as algorithms) which are performed on the individual or small chunks of letters. A code is stored as a mapping in a codebook, while ciphers transform individual symbols according to an algorithm. It was definitively stated in 1883 by the Dutch linguist Auguste Kerckhoffs von Nieuwenhof in his book La Cryptographie militaire: Kerckhoffs' Principle: The security of a cryptosystem must not depend on keeping secret the crypto-algorithm. The security depends only on keeping secret the key.
    [Show full text]
  • Introduction
    ON SOME KNOWN POSSIBLE APPLICATIONS OF QUASIGROUPS IN CRYPTOLOGY Victor Shcherbacov Abstract. It is surveyed known (published) possible application of binary and n-ary quasigroups in cryptology. Mathematics Subject Classification: 20N05, 94A60. Key words and phrases: Cryptology, cryptography, cipher, key, quasigroup, n-ary quasigroup. Introduction Almost all results obtained in branch of application of quasigroups in cryptology and coding theory to the end of eighties years of the XX-th century are described in [20, 21]. In the present survey the main attention is devoted more late articles in this direction. Basic facts on quasigroup theory it is possible to find in [5, 6, 7, 64]. Information on basic fact in cryptology it is possible to find in many books see, for example, [3, 11, 60, 54]. Cryptology is a science that consists form two parts: cryptography and cryptanalysis. Cryp- tography is a science on methods of transformation (ciphering) of information with the purpose of a protection this information from an unlawful user. Cryptanalysis is a science on methods and ways of breaking down of ciphers ([32]). In some sense cryptography is a \defense", i.e. this is a science on construction of new ciphers, but cryptanalysis is an \attack", i.e. this is a science and some kind \art", a set of methods on breaking of ciphers. This situation is similar to situation with intelligence and contr-intelligence. These two objects (cryptography and cryptanalysis) are very closed and there does not exist a good cryptographer that do not know methods of cryptanalysis. It is clear, that cryptology depends from a level of development of a society and a level of development of technology.
    [Show full text]
  • Cryptology: an Historical Introduction DRAFT
    Cryptology: An Historical Introduction DRAFT Jim Sauerberg February 5, 2013 2 Copyright 2013 All rights reserved Jim Sauerberg Saint Mary's College Contents List of Figures 8 1 Caesar Ciphers 9 1.1 Saint Cyr Slide . 12 1.2 Running Down the Alphabet . 14 1.3 Frequency Analysis . 15 1.4 Linquist's Method . 20 1.5 Summary . 22 1.6 Topics and Techniques . 22 1.7 Exercises . 23 2 Cryptologic Terms 29 3 The Introduction of Numbers 31 3.1 The Remainder Operator . 33 3.2 Modular Arithmetic . 38 3.3 Decimation Ciphers . 40 3.4 Deciphering Decimation Ciphers . 42 3.5 Multiplication vs. Addition . 44 3.6 Koblitz's Kid-RSA and Public Key Codes . 44 3.7 Summary . 48 3.8 Topics and Techniques . 48 3.9 Exercises . 49 4 The Euclidean Algorithm 55 4.1 Linear Ciphers . 55 4.2 GCD's and the Euclidean Algorithm . 56 4.3 Multiplicative Inverses . 59 4.4 Deciphering Decimation and Linear Ciphers . 63 4.5 Breaking Decimation and Linear Ciphers . 65 4.6 Summary . 67 4.7 Topics and Techniques . 67 4.8 Exercises . 68 3 4 CONTENTS 5 Monoalphabetic Ciphers 71 5.1 Keyword Ciphers . 72 5.2 Keyword Mixed Ciphers . 73 5.3 Keyword Transposed Ciphers . 74 5.4 Interrupted Keyword Ciphers . 75 5.5 Frequency Counts and Exhaustion . 76 5.6 Basic Letter Characteristics . 77 5.7 Aristocrats . 78 5.8 Summary . 80 5.9 Topics and Techniques . 81 5.10 Exercises . 81 6 Decrypting Monoalphabetic Ciphers 89 6.1 Letter Interactions . 90 6.2 Decrypting Monoalphabetic Ciphers .
    [Show full text]
  • Non-Associative Algebraic System in Cryptology. Protection Against "Meet in the Middle" Attack
    Quasigroups and Related Systems 8 (2001), 7 14 Non-associative algebraic system in cryptology. Protection against "meet in the middle" attack József Dénes and Tamás Dénes Abstract In this paper we shall mention an algorithm of zero knowledge proof based on Latin squares. We shall dene the DLm(n) type Latin squares, which have a further property that is stronger than the pan-Hamiltonian squares: Every pair of DLm(n) rows and columns is a cycle of length n, if n is prime. 1. Basic notions In general the cryptology is based on elds which are commutative and asso- ciative. There is a method which studies the evolution of dierences during encryption of pairs of plaintexts, and derives the most likely keys from a pool of many pairs. It is called dierential cryptanalysis. Dierential crypt- analysis can also be used to nd collisions in "hash" functions. For DES (Data Encryption Standard) like cryptosystems the dierences are usually in terms of exclusive or of the intermediate data in the pair. Dierential cryptanalysis might apply "meet in the middle attack" (introduced in [2]). Denition 1.1. Meet in the Middle Attack: An attack in which the evolu- tion of the data is studied from both directions: from the plaintext forwards towards an intermediate round and from the ciphertext backwards towards the same intermediate round. If the results at the intermediate round are not the same in both directions, then the tested value of the key is not the real value. If both results are the same in several encryptions, then the tested value of the key is the real value with high probability.
    [Show full text]
  • Marian Rejewski Och Tyska Enigma
    FAKULTETSOMRADET˚ FOR¨ NATURVETENSKAPER OCH TEKNIK Pro Gradu Marian Rejewski och tyska Enigma Skribent: Handledare: Christian Enlund Mikael Lindstr¨om September 2018 F¨orord Arbetet med avhandlingen b¨orjade under sommaren 2018, n¨ar jag och min professor funderade p˚am¨ojliga arbetsrubriker. Jag n¨amnde att talteori och kryptering ¨ar intressant och snabbt d¨arefter hade vi landat p˚aatt skriva om Enigma under andra v¨arldskriget. Under arbetets g˚anghar jag f˚attbekanta mig med en sida av andra v¨arldskriget som inte tas upp ofta och d¨armed har jag f˚atten b¨attre ¨overblick av polackernas insatser och vad som h¨ande med informationskrigsf¨oringen f¨ore och under kriget. Arbetet har involverat mycket l¨asande, man m¨arker stor skillnad mellan texter skriv- na av britter och personer fr˚anandra l¨ander. Mycket av arbetet gick ut p˚aatt bena ut det sanna h¨andelsef¨orloppet. Aven¨ viktigt under arbetet var att ˚aterskapa polac- kernas arbete med Enigma f¨or att kunna ge en bra ¨overblick. Jag vill tacka min professor Mikael Lindstr¨om som l¨ast igenom och gett f¨orslag om f¨orb¨attringar f¨or att att f¨ora texten l¨attl¨ast och sammanh¨angande. Jag vill ¨aven tacka de fr˚anmin familj och mina v¨anner som varit intresserade av arbetet, l¨ast det och gett hj¨alpsamma kommentarer f¨or att texten ska vara f¨orst˚aelig ¨aven f¨or icke-matematiker. Christian Enlund Abo˚ den 04.09.2018 Sida: 1 Inneh˚all 1 Introduktion 5 2 Enigma 6 2.1 Kommersiell modell .
    [Show full text]
  • 41774259081336
    eclassifi ed and a roved for release b NSA on 06-11-2014 ursuant to E .0. 1352 • ' 1"0P :s~enr - SECURI'l'Y INfl~ON SECT!ON A. U. S. COW,fiJNICATION SECURITY ~ PART I. LITERAL CIPHER MACHINm 1 • Machines Requiring No External Source of Power a. AFSAM D17 A small keyboard-operated, tape-printing literal cipher machine designed for use where electrical poi.·ier is not available. • Operates pneumatically at approxi.ma tely 15 to 20 words per minute, all power being supplied by the depression of the keyboard keys. Crypto-uni t is a reciprocal permuting maze consisting of ten 26- point rotors and a reflector. Eight of the rotors step in a single interrupted "COM" cascade. Two of the rotors and the reflector are settable, but do not step. All rotors are identically "wired" and their order in the maze is not changed. All rotors have rotatable alphabet rings and seven of the stepping rotors have settable pin- pattern rings for motion control. Size and Weight: 8" x 8" x 4"; 10 lbs. :pevelopment Status: The first engineering model developed by a cormnercial contractor has been completed and will be de­ livered to NSA by 1 Sept. 1953. 1 'POP 9EOR£'i' • b~ AFSAM D21 The AFSAM D21 is a manually operated, tape-printing, literal cipher device using a five level one-time key tape. It is intended to replace one-time pads in some limited applications. The oase, printing irechanism, and the bar drum of the M-209 are used; the key wheels are replaced by a tape reader.
    [Show full text]
  • Information Transmission and Signal Permutation in Active Flow Networks
    Information transmission and signal permutation in active flow networks Francis G. Woodhouse,1, ∗ Joanna B. Fawcett,2, y and J¨ornDunkel3 1Department of Applied Mathematics and Theoretical Physics, Centre for Mathematical Sciences, University of Cambridge, Wilberforce Road, Cambridge CB3 0WA, U.K. 2Department of Pure Mathematics and Mathematical Statistics, Centre for Mathematical Sciences, University of Cambridge, Wilberforce Road, Cambridge CB3 0WB, U.K. 3Department of Mathematics, Massachusetts Institute of Technology, 77 Massachusetts Avenue, Cambridge MA 02139-4307, U.S.A. (Dated: September 28, 2018) Abstract Recent experiments show that both natural and artificial microswimmers in narrow channel-like geometries will self-organise to form steady, directed flows. This suggests that networks of flowing active matter could function as novel autonomous microfluidic devices. However, little is known about how information propagates through these far-from-equilibrium systems. Through a mathe- matical analogy with spin-ice vertex models, we investigate here the input-output characteristics of generic incompressible active flow networks (AFNs). Our analysis shows that information transport through an AFN is inherently different from conventional pressure or voltage driven networks. Ac- tive flows on hexagonal arrays preserve input information over longer distances than their passive counterparts and are highly sensitive to bulk topological defects, whose presence can be inferred from marginal input-output distributions alone. This sensitivity further allows controlled permu- tations on parallel inputs, revealing an unexpected link between active matter and group theory that can guide new microfluidic mixing strategies facilitated by active matter and aid the design of generic autonomous information transport networks. arXiv:1705.00589v2 [physics.bio-ph] 7 May 2018 1 INTRODUCTION Group theory [1, 2] forms the mathematical foundation of ancient [3] and modern [4] cryptography.
    [Show full text]
  • A Hungarian Cryptological Manual in Berlin
    A Hungarian Cryptological Manual in Berlin Stefanˇ Porubsky´ Institute of Computer Science of the Czech Academy of Sciences Pod Vodarenskou´ veˇzˇ´ı 271/2, 182 07 Praha 8 Czech Republic [email protected] Abstract 2 Stephanus Petrikovics vs. Istvan´ von Petrikovits This is a report on some activities of the Hungarian SIGINT department and a Istvan´ Petrikovits was born on September 24, 1888 Hungarian cryptographic manual written in the town of Hlohovec (Galgoc´ or Galgocz´ in by the head of its Department X Istvan´ Hungarian or Freistadt an der Waag in German Petrikovits as found in the Archive of the or in its Slovak colloquial variant Frastˇ ak,´ at that German Federal Foreign Office in Berlin. time) which today lies in Slovakia. In that time 1 Introduction it also was a predominantly Slovak town. In the church register of the local Roman Catholic Archive file TICOM Box No. 3843 in the Archive church written in Latin we can read that he was of the German Federal Foreign Office (Politis- baptized on September 30 as Stephanus Rober- ches Archiv des Auswartigen¨ Amts) in Berlin con- tus Matheus Petrikovics. Here Petrikovics is a tains a cryptographic typewritten manual entitled more usual Hungarian transcription of the Slavic Rejtjel – Segedlet´ (A Cipher Aid) written by the surname Petrikovic.ˇ His god-father was certain head of the Hungarian military cryptological cen- Robertus Petrikovics an engineer (geometra) from ter Istvan´ Petrikovits. The (slightly damaged) Pard´ any,´ a village today lying in Serbia. It is pre- characterization of the file by a TICOM officer dominately a Serbian village nowadays, but in that says: “??y general notes on code and cypher, and time it had originally two parts: Serb Pardanj and ??tography, in Hungarian, undated.
    [Show full text]
  • Facts and Myths of Enigma: Breaking Stereotypes
    Facts and Myths of Enigma: Breaking Stereotypes Kris Gaj1 and Arkadiusz Oráowski2 1 George Mason University, Electrical and Computer Engineering 4400 University Drive, Fairfax, VA 22030, U.S.A. [email protected] 2 Institute of Physics, Polish Academy of Sciences Aleja Lotników 32/46, 02-668 Warszawa, Poland [email protected] Abstract. In spite of a relatively large number of publications about breaking Enigma by the Allies before and during the World War II, this subject remains relatively unknown not only to the general public, but also to people professionally involved in cryptological research. For example, the story of Enigma is rarely a part of a modern textbook on cryptology or a modern course on cryptography and network security. There exist multiple reasons for this situation. First, there are still a few unresolved issues, resulting from conflicting reports, the lack of reliable sources, and a long period required for declassifying documents related to any cryptological activity during the World War II. Secondly, the issue is highly political, and there is little consensus in weighing the contribution of all involved countries. Thirdly, many contemporary cryptologists honestly believe that there is little to learn from the analysis of old cryptosystems, because of the tremendous progress in theory and practice of cryptography and a little similarity between old and modern ciphers. In this paper we confront these opinions by presenting a look at the current state of knowledge about cryptological methods and devices used to break Enigma. We introduce all major players involved in these activities, and we make an effort to weigh their original contributions.
    [Show full text]
  • Codes and Ciphers, from the [Cient Pharaohs to Quantum Cryptography1
    1.5. Rise of the West 47 1.5 Rise of the West Oh, East is East, and West is West, and never the twain shall meet, Till Earth and Sky stand presently at God’s great Judgement Seat... Rudyard (Joseph) Kipling, (1865–1936), English writer and poet — from The Ballad of East and West (1892) The word Renaissance literally means rebirth. It was coined by fifteenth- century scholars to separate the fall of ancient Greece and Rome from its rebirth and rediscovery in the middle of their own century. The fall of Constantinople in 1453 may be considered one of the dividing lines since scholars fled to Italy, bringing with them knowledge, irreplaceable books and manuscripts, as well as the classical Greek tradition of scholarship. The earliest sign of the Renaissance was the intellectual movement called humanism, perhaps given its biggest surge by the aforementioned influx of scholars. Humanism, born in Italy, had as its subject matter: human nature, unity of truth in philosophy, and the dignity of man. Perhaps most importantly, humanism yearned for the rebirth of lost human spirit and wisdom. While medieval thinkers preferred the idea of “one man, one job”, the Renaissance man was a versatile thinker, thirsting for an education in all areas of knowledge, and becoming an expert in many. It is one of those men with whom we begin our discussion. Leon Battista Alberti If there is to be a holder of the title Father of Western Cryptography, it must go to Leon Battista Alberti (1404–1472). He was not only an architect, sculptor, writer, and all round-scholar, but also one of the prime movers in the development of the theory of art in the Renaissance, not to mention his contributions to cryptology, a true Renaissance man.
    [Show full text]
  • The Reincarnation of Grille Cipher: a Generative Approach
    The Reincarnation of Grille Cipher: A Generative Approach Jia Liu∗, Yan Ke, Yu Lei, Jun Li, Yaojie Wang, Yiliang Han, Minqing Zhang, and Xiaoyuan Yang Key Laboratory of Network and Information Security, School of Cryptology Engineering, Engineering University of People Armed Police Force, Xi’an 710086, China [email protected] Abstract. In order to keep the data secret, various techniques have been implemented to encrypt and decrypt the secret data. Cryptogra- phy is committed to the security of content, i.e. it cannot be restored with a given ciphertext. Steganography is to hiding the existence of a communication channel within a stego. However, it has been difficult to construct a cipher (cypher) that simultaneously satisfy both channel and content security for secure communication. Inspired by the Cardan grille, this paper presents a new generative framework for grille cipher. A digital cardan grille is used for message encryption and decryption. The ciphertext is directly sampled by a powerful generator without an explicit cover. Message loss and prior loss are proposed for penalizing message extraction error and unrealistic ciphertext. Jensen-Shannon Divergence is introduced as new criteria for channel security. A simple practical data-driven grille cipher is proposed using semantic image inpainting and generative adversarial network. Experimental results demonstrate the promising of the proposed method. Keywords: Grille cipher · Cryptography · Steganography · Image in- painting · Generative adversarial network. 1 Introduction arXiv:1804.06514v3 [cs.CR] 14 May 2018 In the history of cryptography, a grille cipher was a technique for encrypting a plaintext by writing it onto a sheet of paper through a pierced sheet (of paper or cardboard or similar) [1].
    [Show full text]