Modern Cryptanalysis of Schl¨Usselgerät 41

Total Page:16

File Type:pdf, Size:1020Kb

Modern Cryptanalysis of Schl¨Usselgerät 41 Modern Cryptanalysis of Schlusselger¨ at¨ 41 George Lasry The CrypTool Team [email protected] Abstract 1944 on a few Abwehr networks. Bletchley Park could not decipher its traffic unless multiple mes- The Schlusselger¨ at¨ 41 was an highly se- sages were sent in-depth. Until recently, little was cure encryption machine developed by Fritz known about the inner functioning of the SG-41. Menzer and used from 1944 by the Ab- Several historical documents have been declassi- wehr. Bletchley Park could not decipher fied that provide extensive details about its func- its traffic. In this article, we provide a func- tioning. A small number of SG-41 have survived, tional description of the SG-41 and present and some have been restored. a novel cryptanalytic method to recover the In this section, we provide an overview of the key settings from ciphertext and known- history of the SG-41, as well as a functional de- plaintext. This attack requires extensive scription, and an analysis of its keyspace size. computing power, a testimony to the re- silience of the SG-41 even against modern 2.1 Fritz Menzer and the SG-41 cryptanalysis. We also present an alterna- Fritz Menzer (1908–2005) was the Government tive method, based on acoustic cryptanal- Inspector (Regierungsoberinspektor) of OKW/Chi, ysis, which allows for the recovery of the the cryptographic arm of the Wehrmacht, and later, key settings in minutes. Admiral Canaris, the head of the Abwehr charged him with ensuring the security of the organiza- 1 Overview tion’s communications. Menzer designed and led This article is structured as follows: In Section 2, a the development of several cipher devices, meth- brief overview of the history of the SG-41 is given ods, and procedures, some of which created some and a functional description. Section 3 describes difficulties for British and U.S. codebreakers. In cryptanalysis attempts by Bletchley Park and the a post-war NSA publication, Menzer is described US against the SG-41. In Section 4, we describe as “Cryptologic Inventor Extraordinaire”, and the a novel known-plaintext attack that is feasible but peak of his achievements, however, is most proba- requires extensive computing power, and in Sec- bly the invention of the SG-41, shown in Figure 1 tion 5, a highly-efficient side-channel attack that (Mowry, 1983). relies on acoustic analysis of the device. Finally, Having previously worked on the cryptanaly- in Section 6, we assess the security of the SG- sis of the Enigma and the Hagelin C-36, Menzer 41 compared to other encryption machines of the understood their weaknesses. While much of the 1940s. SG-41 borrows from the Hagelin pin-and-lug de- sign, Menzer introduced some features that pro- 2 The SG-41 – Introduction vided enhanced security (Mowry, 1983). Boris The SG-41 was an encryption machine introduced Hagelin later complained to William Friedman that by Fritz Menzer, Regierungsoberinspektor of OK- the Germans had stolen his design. He had ob- W/Chi, the cryptographic branch of the Wehrma- tained one of the SG-41 machines, wrongly calling 1 cht. While inspired by the Hagelin pin-and-lug it C-41 (Friedman, 1955). devices, the design of the SG-41 incorporated sev- The SG-41 was designed with a keyboard and a eral novel features that significantly enhanced its strip printer to speed up the process of enciphering security. Logistical reasons prevented its produc- 1It is also called C-41 in some U.S. documents (Agency, tion in large volumes, and it was only deployed in 1947). and deciphering (unlike the Enigma that required fully functional (Historica, 2019; Dahlke, 2018). at least two operators, one to type into the key- While the SG-41 is described in several docu- board, and another one to write down the lamps ments (Mowry, 1989; Mowry, 2003; Mowry, 1983; activated). WDGAS-14, 1946), those descriptions are incom- The army ordered 11,000 units in 1942, and a plete, and sometimes conflicting. The most reli- prototype was presented in 1943, but by the end able historical source describing the SG-41 is a of the war, only 1000–1500 had been produced by G.C. & C.S. report titled Secret Service SIGINT the firm Wanderer-Werke in Chemnitz. The chal- Volume II - Cryptographic Systems and Their So- lenges of wartime production and the lack of ma- lutions - Machine Cyphers written by Keith Batey, terial may have prevented its production in higher Mavis Batey, Margaret Rock, and Peter Twinn in volumes. In addition, the device was considered 1945. The authors were part of ISK - Intelligence too heavy - over 13 kg - to be used at the front- Services Knox (headed by Dilly Knox before his lines (Dahlke, 2018; Mowry, 1983). Near the end death in 1943) and were responsible for analyzing of 1944, it was deployed on at least three Abwehr Abwehr traffic with its agents and offices world- links, between Berlin, Bordeaux in Southern France, wide. While most of the report is about the crypt- Northern Italy, and Vienna, replacing the Enigma analysis of the Abwehr Enigmas, against which G machines (Batey et al., 1945). ISK had considerable success, the last seven pages of the report are dedicated to a detailed functional description of the SG-41 and to the mostly un- successful attempts by ISK to decipher its traffic (Batey et al., 1945). The focus in this section is on the logical and functional aspects of the SG-41, rather than on its physical design and implementation. Figure 2 shows a functional diagram of the SG-41. The SG-41 enciphers symbols of the A-Z alphabet into symbols of the same alphabet. To encipher, the operator presses a plaintext symbol on the key- board (spaces are represented by the symbol J). The plaintext symbol is encrypted, and the result- ing ciphertext symbol is printed on a paper strip (together with the plaintext symbol). The decryp- tion process is similar: The operator presses a ci- phertext symbol on the keyboard. The encryption process, which is reciprocal, converts back the ci- Figure 1: The SG-41 phertext symbol into a plaintext symbol printed on the paper strip (together with the ciphertext sym- 2.2 Functional Description of the SG-41 bol). Until recently, little was known about the inter- nal mechanism of the SG-41 (Dahlke, 2018; Mu- seum, 2020b; Schmeh, 2004). Recently declas- sified U.S. and British documents, and in partic- ular, a wartime report from Bletchley Park, pro- vide enough details to fully reconstruct the func- tioning of the SG-41 (Batey et al., 1945; Mowry, 1983; Mowry, 1989; Mowry, 2003). While very few devices have survived, most in bad condition, some units are in the hands of museum curators and crypto collectors, who were able to analyze the physical/mechanical design of the SG-41. At least one machine has been restored so that it is Figure 2: The SG-41 - Functional Diagram Figure 3: The SG-41 - Functional Diagram - Pinwheels and Bar Cage The encryption logic is governed by the outputs applies to C2 and T2 for wheel 2, and similarly to of a rotating bar cage with 25 bars, as well as of the other wheels. a set of six rotating pinwheels, as shown in Fig- A full encryption cycle, in which a plaintext sym- ure 3. The pinwheels are numbered 1 to 6, from bol is encrypted (or a ciphertext symbol is decrypted), left to right, and have 25, 25, 23, 23, 24, and 24 and the wheels advance, consists of three stages, pins each, respectively. Each pin can be set to an one of which is optional (Batey et al., 1945): active or an inactive state. Each wheel from 1 to 5 1. An optional pre-encryption stepping stage that affects one or more bars. The pin currently in front occurs before encryption, only if T6 was ac- of the cage determines whether the bar is engaged tive (at the beginning of the cycle). or not. Those pins are denoted as C1 to C5, for wheels 1 to 5, respectively. C6 does not affect the 2. The encryption stage. cage bars, but it affects encryption as described in Section 2.4. 3.A post-encryption stepping stage that always Each bar has a fixed lug positioned in front of occurs after encryption. one of the wheels 1 to 5. In front of wheels 1, The two stepping stages are identical. Each step- 2, 3, 4, and 5, there are 1, 2, 4, 8, and 10 bars ping stage consists of two phases, as follows: with such a fixed lug, respectively. The bar cage performs a full rotation during the encryption of • Wheels 2 to 6 step if the pin affecting step- a single symbol. When a bar has its lug against ping on the wheel on its left was active (at an active pin, it is engaged and it adds one to a the beginning of the stage). For example, if total additive kick, denoted as K (its function is T3 was active, wheel 4 steps. described in Section 2.4). If a bar is not engaged, • All the wheels (1 to 6) step. it does not add to K. Therefore, wheels 1 to 5 may add 1, 2, 4, 8, and 10, to K, respectively. When all This mechanism creates a circular interdepen- the bars are against active pins, and thus, they all dence between the wheels, as illustrated in Fig- are engaged, the total kick is 1 + 2 + 4 + 8 + 10 = ure 4. This circular interdependence means that 25. any wheel may affect the stepping of any other So far, the mechanism of the first five wheels wheel, directly or indirectly, and that there is no and the bar cage is very similar to the Hagelin C- way to know how the wheels step without first de- 35, which also had bars with fixed lugs, and five termining the pin settings of all wheels.
Recommended publications
  • Hagelin) by Williaj-1 F
    .. REF ID :A2436259 Declassified and approved for release by NSA on 07-22 2014 pursuant to E.O. 1352e REF ID:A2436259 '!'UP SECRE'l' REPORT"OF.VISIT 1Q. CRYPTO A.G. (HAGELIN) BY WILLIAJ-1 F. FRIEDI.W.if SPECIAL ASSISTANT TO THE DIRECTOR, NATIONAL SECURITY AGENCY 21 - 28 FEBRUARY 1955 ------------------ I -:-· INTRO:bUCTIOI~ 1. In accordance with Letter Orders 273 dated 27 January 1955, as modified by L.0.273-A dated~ February 1955, I left Washington via MATS at 1500 houri' on 18 'February 1955, arrived at Orly Field, Pe,ris, at 1430 hours on 19 February, ' • • f • I ' -,-:--,I." -'\ iII ~ ~ ,.oo4 • ,. ,.. \ • .... a .. ''I •:,., I I .arid at Zug, Switzerland, at 1830 the same day. I sp~~~ th~· ~e~t .few da;s· ~ Boris Hagelin, Junior, for the purpose of learning the status of their new deyelop- ' ments in crypto-apparatus and of makifie an approach and a proposal to Mr. Hagelin S~, 1 / as was recently authorized by.USCIB and concurred in by LSIB. ~ Upon completion of that part of my mission, I left Zug at 1400 hours on ··'··· 28 February and proceeded by atrb-eme:Bfle to Zll:N:ch, ·1.'fteu~ I l3e-a.d:ee: a s~f3:es ah3::i:nMP plE.t;i~ie to London, arriving i:n mndo-l't' at 1845 that evening, f;the schedu1 ed p1anli ed 2_. The following report is based upon notes made of the subste.nce of several talks with the Hagel~ns, at times in separate meetings with each of them and at other times in meetings with both of them.
    [Show full text]
  • PDF Download
    PRESSEMITTEILUNG Presse Ansprechpartnerin: MARIA BURDICK MÜNCHEN, MAI 2019 Kommunikation und Presse Bretonischer Ring 3 Zuschlag bei 98.000 Euro für das Schlüsselgerät 41 - 85630 Grasbrunn / München DEUTSCHLAND die bessere, die unknackbare ENIGMA und Tel.: +49 (0) 89 - 54 72 64 9 - 0 „Wunderwaffe“ ohne Wirkung - in der Auktion 79 Fax: +49 (0) 89 - 54 72 64 9 - 999 der Hermann Historica GmbH maria.burdick(at)hermann-historica.com www.hermann-historica.com Kaum veröffentlicht, zeigte sich weltweit größtes Interesse an dem Highlight der Auktion 79 einem Schlüsselgerät 41. So selten, dass sich selbst die namhaftesten Wissenschafts- und Technikmuseen der Welt über den Besitz eines stark korridier- ten Bodenfunds glücklich schätzen, war das mit Losnummer 4401 angebotene Gerät mit einer Taxe von 75.000 Euro, in bestem Zustand und funktionsfähig, ein absolutes Glanzstück. Aktuell existiert nur mehr eine Handvoll funktionsfähiger Maschinen, die wegen ihres Kurbelantriebs auch ‚Hitler-Mühle‘ genannt wurden. Völlig unbeschädigt konnte das vorliegende Exemplar des ab 1941 entwickelten Chiff- riergeräts von dem international anerkannten Spezialisten für Verschlüsselungsgeräte und Ingenieur für Nachrichtentechnik, Klaus Kopacz (71), Stuttgart, im Auktionshaus fachmännisch geöffnet, überprüft und auch in Gang gesetzt werden. Ganz gemäß der zugedachten Funktion wurde ein Text chiffriert und dechiffriert, wobei der Original- text auf dem einen, die Chiffre auf dem anderen der zwei Papierstreifen ausgedruckt wurde. Filmisch dokumentiert unter: https://www.youtube.com/watch?v=_AcgyFF2eYU Abdruck frei – Beleg erbeten an: Hermann Historica GmbH Abteilung Marketing Bretonischer Ring 3 85630 Grasbrunn / München So wunderte dann auch nicht, dass sich die Gebote bereits im Vorfeld der Auktion DEUTSCHLAND überschlugen und am 24.05., dem Tag der Versteigerung, Interessierte an den Telefo- oder per E-Mail an: nen und im Internet mit einer Vielzahl von Bietschritten den Preis in die Höhe trieben.
    [Show full text]
  • The Mathemathics of Secrets.Pdf
    THE MATHEMATICS OF SECRETS THE MATHEMATICS OF SECRETS CRYPTOGRAPHY FROM CAESAR CIPHERS TO DIGITAL ENCRYPTION JOSHUA HOLDEN PRINCETON UNIVERSITY PRESS PRINCETON AND OXFORD Copyright c 2017 by Princeton University Press Published by Princeton University Press, 41 William Street, Princeton, New Jersey 08540 In the United Kingdom: Princeton University Press, 6 Oxford Street, Woodstock, Oxfordshire OX20 1TR press.princeton.edu Jacket image courtesy of Shutterstock; design by Lorraine Betz Doneker All Rights Reserved Library of Congress Cataloging-in-Publication Data Names: Holden, Joshua, 1970– author. Title: The mathematics of secrets : cryptography from Caesar ciphers to digital encryption / Joshua Holden. Description: Princeton : Princeton University Press, [2017] | Includes bibliographical references and index. Identifiers: LCCN 2016014840 | ISBN 9780691141756 (hardcover : alk. paper) Subjects: LCSH: Cryptography—Mathematics. | Ciphers. | Computer security. Classification: LCC Z103 .H664 2017 | DDC 005.8/2—dc23 LC record available at https://lccn.loc.gov/2016014840 British Library Cataloging-in-Publication Data is available This book has been composed in Linux Libertine Printed on acid-free paper. ∞ Printed in the United States of America 13579108642 To Lana and Richard for their love and support CONTENTS Preface xi Acknowledgments xiii Introduction to Ciphers and Substitution 1 1.1 Alice and Bob and Carl and Julius: Terminology and Caesar Cipher 1 1.2 The Key to the Matter: Generalizing the Caesar Cipher 4 1.3 Multiplicative Ciphers 6
    [Show full text]
  • LIBRARIES Building a Global Information Assurance Program.Pdf
    Building a Global Information Assurance Program OTHER AUERBACH PUBLICATIONS The ABCs of IP Addressing Information Security Management Gilbert Held Handbook, 4th Edition, Volume 4 ISBN: 0-8493-1144-6 Harold F. Tipton and Micki Krause, Editors The ABCs of TCP/IP ISBN: 0-8493-1518-2 Gilbert Held Information Security Policies, ISBN: 0-8493-1463-1 Procedures, and Standards: Building an Information Security Guidelines for Effective Information Awareness Program Security Management Mark B. Desman Thomas R. Peltier ISBN: 0-8493-0116-5 ISBN: 0-8493-1137-3 Building a Wireless Office Information Security Risk Analysis Gilbert Held Thomas R. Peltier ISBN: 0-8493-1271-X ISBN: 0-8493-0880-1 The Complete Book of Middleware A Practical Guide to Security Engineering Judith Myerson and Information Assurance ISBN: 0-8493-1272-8 Debra Herrmann ISBN: 0-8493-1163-2 Computer Telephony Integration, 2nd Edition The Privacy Papers: William A. Yarberry, Jr. Managing Technology and Consumers, ISBN: 0-8493-1438-0 Employee, and Legislative Action Rebecca Herold Cyber Crime Investigator’s Field Guide ISBN: 0-8493-1248-5 Bruce Middleton ISBN: 0-8493-1192-6 Secure Internet Practices: Best Practices for Securing Systems in Cyber Forensics: A Field Manual for the Internet and e-Business Age Collecting, Examining, and Preserving Patrick McBride, Jody Patilla, Evidence of Computer Crimes Craig Robinson, Peter Thermos, Albert J. Marcella and Robert S. Greenfield, and Edward P. Moser Editors ISBN: 0-8493-1239-6 ISBN: 0-8493-0955-7 Securing and Controlling Cisco Routers Global Information Warfare: Peter T. Davis How Businesses, Governments, and ISBN: 0-8493-1290-6 Others Achieve Objectives and Attain Competitive Advantages Securing E-Business Applications and Andy Jones, Gerald L.
    [Show full text]
  • (Hagelin) by William F. Friedman
    .. REF ID :A2436259 Declassified and approved for release by NSA on 07-22 2014 pursuant to E.O. 1352e REF ID:A2436259 '!'UP SECRE'l' REPORT"OF.VISIT 1Q. CRYPTO A.G. (HAGELIN) BY WILLIAJ-1 F. FRIEDI.W.if SPECIAL ASSISTANT TO THE DIRECTOR, NATIONAL SECURITY AGENCY 21 - 28 FEBRUARY 1955 ------------------ I -:-· INTRO:bUCTIOI~ 1. In accordance with Letter Orders 273 dated 27 January 1955, as modified by L.0.273-A dated~ February 1955, I left Washington via MATS at 1500 houri' on 18 'February 1955, arrived at Orly Field, Pe,ris, at 1430 hours on 19 February, ' • • f • I ' -,-:--,I." -'\ iII ~ ~ ,.oo4 • ,. ,.. \ • .... a .. ''I •:,., I I .arid at Zug, Switzerland, at 1830 the same day. I sp~~~ th~· ~e~t .few da;s· ~ Boris Hagelin, Junior, for the purpose of learning the status of their new deyelop- ' ments in crypto-apparatus and of makifie an approach and a proposal to Mr. Hagelin S~, 1 / as was recently authorized by.USCIB and concurred in by LSIB. ~ Upon completion of that part of my mission, I left Zug at 1400 hours on ··'··· 28 February and proceeded by atrb-eme:Bfle to Zll:N:ch, ·1.'fteu~ I l3e-a.d:ee: a s~f3:es ah3::i:nMP plE.t;i~ie to London, arriving i:n mndo-l't' at 1845 that evening, f;the schedu1 ed p1anli ed 2_. The following report is based upon notes made of the subste.nce of several talks with the Hagel~ns, at times in separate meetings with each of them and at other times in meetings with both of them.
    [Show full text]
  • November 1, 2020 PUBLICATIONS OF
    November 1, 2020 PUBLICATIONS OF JEFFREY C. LAGARIAS A. Books 1. Mathematical Developments Arising from Linear Programming (J. C. Lagarias and M. J. Todd, Eds), Contemporary Math. Vol. 114, Amer. Math. Soc. 1990. 2. The Ultimate Challenge: The 3x + 1 Problem (J. C. Lagarias, Ed.), Amer. Math. Society, Providence, RI 2010. 3. The Kepler Conjecture: The Hales-Ferguson proof, by Thomas C. Hales, Samuel P. Ferguson (J. C. Lagarias, Ed.), Springer-Verlag: New York 2011. B. Book Chapters 1. J. C. Lagarias, Point Lattices, Chapter 19 in: Handbook of Combinatorics, Amster- dam: Elsevier Science Publ. 1995, pp. 919{966. C. Papers in Peer-Reviewed Journals or Conference Volumes 1. J. C. Lagarias, Discrete Balancing Games, Bulletin of the Institute of Mathematics, Academia Sinica 5 (1977), 363{373. 2. J. C. Lagarias and A. M. Odlyzko, Effective Versions of the Chebotarev Density The- orem, in: Algebraic Number Fields, L-Functions and Galois Properties, Proceedings of the 1975 Durham Symposium, (A. Fr¨ohlich, Ed.), Academic Press (1977), 409{464. 3. F. K. Hwang and J. C. Lagarias, Minimum Range Sequences of all k-subsets of a Set, Discrete Mathematics 19 (1977), 257{264. 4. J. C. Lagarias, Signatures of Units and Congruences (mod 4) in Certain Real Quadratic Fields, J. reine angew. Math. 301 (1978), 142{146. 5. J. C. Lagarias and A. M. Odlyzko, On Computing Artin L-functions in the Critical Strip, Mathematics of Computation 33 (1979), 1081{1095. 6. J. C. Lagarias, H.L.Montgomery and A.M.Odlyzko, A bound for the least prime ideal in the Chebotarev density theorem, Inventiones math.
    [Show full text]
  • Hagelin) by William F
    .. REF ID :A2436259 Declassified and approved for release by NSA on 07-22 2014 pursuant to E.O. 13s2e REF ID:A2436259 '!'UP SECRE'I' REPO'.RT·oF.VISIT 1Q. CRYPTO A.G. (HAGELIN) BY WILLIAM F. FRIEDMAlif SPECIAL ASSISTANT TO THE DIRECTOR, NATIONAL SECURITY AGENCY 21 - 28 FEBRUARY 1955 ----------~------- I -:-· INTRO:bUCTIOI~ 1. In accordance with Letter Orders 273 dated 27 January 1955, as modified by L.0.273-A dated~ February 1955, I left Washington via MATS at 1500 hour~ on 18 'February 1955, arrived at Orly Field, Pe,ris, at 1430 hours on 19 February, • • • f ' I ' -,-:--, I." -'\ i I I ~ ~ ,.o"4 • ,. ... \ • .... a .. ''I •:,,., I I .arid at Zug, Switzerland, at 1830 the same day. I sp~~~ th~- ~e~t .few da;s· ~ Boris Hagelin, Junior, for the purpose of learning the status of their new deyelop- ' ments in crypto-apparatus and of makifie an approach and a proposal to Mr. Hagelin S~, 1 / as was recently authorized by.USCIB and concurred in by LSIB. ~ Upon completion of that part of rrry mission, I left Zug at 1400 hours on ··'··· 28 February and proceeded by atrb-eme:afle to Zttr-3:ch, wfl:eie I l3e-a.d:ee: a s~"3:es ah3::i:nMP plet;ille to London, arriving :H1 i:Jendo-l't' at 1845 that evening, f,the schedll1 ed plan'i ed 2_. The following report is based upon notes made of the subste.nce of several talks with the Hagel~ns, at times in separate meetings with each of them and at other times in meetings with both of them.
    [Show full text]
  • Simulation and Computer-Aided Cryptanalysis of Angooki Taipu B
    PURPLE Revealed: Simulation and Computer-aided Cryptanalysis of Angooki Taipu B Wes Freeman,1 Geoff Sullivan 2 and Frode Weierud 3 ADDRESSES: (1) 2527 Mardell Way, Mt View CA 94043 USA. Email: [email protected]; (2) 64 Tennyson Road, Headless Cross, Redditch, Worcs., B97 5BJ UNITED KINGDOM. Email: [email protected]; (3) Le Pre Vert, 1041 Rte de Mategnin, F-01280 Prevessin-Moens FRANCE. Email: [email protected] ABSTRACT: PURPLE was the designation given by U.S. cryptanalysts to the cipher machine used by the Japanese Foreign Office for secure communications before and during WW 2. We present the structure and internal wiring of the machine, as well as details of the keying procedures and a system of abbreviations, which was used in the messages. We have also written a computer simulation of the PURPLE machine. Operation of the simulator is demonstrated by deciphering portions of the 14-part message delivered to the United States on Dec. 7, 1941. Finally, an automated cryptanalysis method for the PURPLE system is presented. KEYWORDS: Pearl Harbor, PURPLE, RED, Rowlett, Stepping Switch, Computer Simulations, Hill Climbing, Roma-ji, Romazi. Introduction On December 6, 1941, the Japanese Government sent a message, which was divided for transmission into 14 parts (the 14-part message), to its embassy in Washington. An accompanying message directed that the 14-part message be delivered to the United States Government on December 7 at 1:00 p.m., which corresponded to 7:30 a.m. at Pearl Harbor, Hawaii. The 14-part message, which broke off negotiations between Japan and the United States, was enciphered on the PURPLE machine.
    [Show full text]
  • KRAUS + SILBERNAGEL SPEZIAL-AUKTION Fritschestr
    KRAUS + SILBERNAGEL SPEZIAL-AUKTION Fritschestr. 77, 10585 Berlin, Tel: 030/341 12 32, Fax: 030/341 61 89 125. Auktionsauftrag Bieter Nr. ........................... Hiermit beauftrage ich die Fa. Kraus + Silbernagel, fur¨ mich und meine Rechnung folgende Auktions-Lose bis zur H¨ohe der angefuhrten¨ Preise zu ersteigern. Von den im Auktionskatalog abgedruckten Versteigerungsbedingungen habe ich Kenntnis ge- nommen und erkl¨are mich einverstanden. Erfullungsort:¨ Berlin. , den Name: Beruf: Genaue Adresse: Erwunschte¨ Zahlungs- und Versandart bitte ankreuzen: Vorkasse: Rechnung: Abholung: Brief ohne Einschreiben nur per Vorkasse auf eigenes Risiko bis 30,- EUR (Postleitzahl bitte angeben) Unterschrift Sie k¨onnen Ihren Kaufauftrag begrenzen, Gesamtbetrag , und des- halb ruhig auf viele Sie interessierende Lose bieten, um bessere Erfolgsaussichten zu haben. Los-Nummer H¨ochstgebot in EUR Los-Nummer H¨ochstgebot in EUR Los-Nummer H¨ochstgebot in EUR Los-Nummer H¨ochstgebot in EUR Zur Zuschlagsumme werden die ublichen¨ Aufschl¨age, siehe Versteigerungs- Bedingungen, erhoben. Wir w¨aren Ihnen sehr verbunden, wenn Sie uns die Anschrift Ihnen bekannter Samm- ler aufgeben wurden,¨ von denen Sie annehmen, daß diese fur¨ unsere Versteigerung Interesse haben. Name Stand Wohnort Wohnung KRAUS + SILBERNAGEL SPEZIAL-AUKTION Fritschestr. 77, 10585 Berlin, Tel: 030/341 12 32, Fax: 030/341 61 89 ANSICHTSANFORDERUNG / KOPIE , den Name: Beruf: Genaue Adresse: Los Nr. Los Nr. Los Nr. Los Nr. Inhaltsverzeichnis DANZIG . 106 SAARGEBIET . 108 AUTOGRAPHEN . 11 SAARLAND . 109 HISTORISCHE ZEITUNGEN . 13 DT.BESETZUNG WK II . 109 INNUNGS-DOKUMENTE . 19 DEUTSCHE DIENSTPOST . 110 PLAKATE . 19 MARINE SCHIFFSPOST . 110 HISTORISCHE DOKUMENTE . 21 SCHIFFSPOST . 113 LEBENSMITTEL/ZUTEILUNGS-KARTEN . 35 LUFTSCHIFFER WK I . 117 FAHRKARTEN/EISENBAHN-STRASSENBAHN ZEPPELINPOST .
    [Show full text]
  • German Cipher Machines of World War II This Publication Is a Product of the National Security Agency History Program
    German Cipher Machines of World War II This publication is a product of the National Security Agency history program. It presents a historical perspective for informational and educational purposes, is the result of independent research, and does not necessarily reflect a position of NSA/CSS or any other U.S. government entity. This publication is distributed free by the National Security Agency. If you would like additional copies, please email your request to [email protected] or write to: Center for Cryptologic History National Security Agency 9800 Savage Road, Suite 6886 Fort George G. Meade, MD 20755-6886 David Mowry served as a historian, researching and writ- ing histories in the Cryptologic History Series. He began his Agency career as a linguist in 1957 and later (1964- 1969) held positions as a linguist and cryptanalyst. From 1969 through 1981 he served in various technical and man- agerial positions. In the latter part of his career, he was a historian in the Center for Cryptologic History. Mr. Mowry held a BA with regional group major in Germany and Cen- tral Europe from the University of California at Berkeley. He passed away in 2005. Acknowledgment. The Center for Cryptologic History is grateful to mathematician David Perry for his thoughtful and thorough review of all technical material in this edition. Cover: German soldiers using an ENIGMA cipher machine in the field German Cipher Machines of World War II David P. Mowry Center for Cryptologic History National Security Agency Revised edition 2014 Introduction Along with breaking the Japanese diplomatic cryptosystem usu- ally referred to as “PURPLE,” probably the greatest example of Allied cryptanalytic success in World War II was the breaking of the German ENIGMA machine.
    [Show full text]
  • United States Cryptologic History
    TOP SECRET i::IiiWtfl T E ZrSQ5 iiB r War II ~ . united states cryptologic history The Cryptology of the German Intelligence Services (U) THIS BeEblMENT eeN'I'AINS CODEWORD MAtERIAL C'guj'jod I) tJSA/eS3M 123-2 BcclassiF, eil. e,igiaaliil' Ageil'l. Belciiiii"alioii Rcqui,cd iT- •• •• ~ -lOP SECRET I_)eclassifi ed and appw'.;ed for elease by ~~SA, on 04- '13-2009 r,ursuantto E.O. '12958, as Bmended ~vlDF:53595 DocrD 3525898 II Contents of this publication should not be reproduced, or further disseminated outside the u.s. Intelligence Community without the permission of the Director, NSAlCSS. Inquiries about reproduction and dissemination should be directed to the Office of Cryptologic Archives and History, T54. ·1 • i .i .. _. J • DOCID: 3525898 1=8P SEER!' tlM11tA UNITED STATES CRYPTOLOGIC HISTORY SERIES IV World War II Volume 4 The Cryptology ofthe German Intelligence Services (U) DavidP. Mowry This documentis classifiedTOP SECRETUMBRAinits entirety and can notbeused as a source for derivative classification decisions. OFFICE OFARCHIVES AND HISTORY NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE 1989 'Fep SEEREt' tlM11tA DOCID: 3525898 "ep 5EERET UMBRA Table ofContents Page Foreword v Introduction 1 Code Systems 1 Monoalphabetic Substitution 2 Polyalphabetic Substitution 3 Digraphic Substitution 4 Single Transposition: Columnar 4 Single Transposition: Combs and Grilles 6 Aperiodic Polyalphabetic Substitution 9 Single TranspositionlSubstitution Systems 10 Double Transposition 13 Double TranspositionlSubstitution 15 The Kryha Machine
    [Show full text]
  • What We Know About Cipher Device “Schlüsselgerät SG-41” So Far
    What We Know About Cipher Device “Schlüsselgerät SG-41” so Far Carola Dahlke Deutsches Museum, Germany [email protected] Abstract But despite the highly sophisticated encryption of SG 41, in fact far above the security level of Almost everyone knows the Enigma. But the ENIGMA, its development was neglected and cipher device “Schlüsselgerät 41”? Never even blocked by the army (WDGAS-14). heard of it. This German cipher machine is much rarer than its famous predecessor. Only When it finally came to a decision to build and around 1500 units were manufactured spread the machine, wartime shortages of towards the end of the Second World War. aluminium and magnesium caused the machine And information is even scarcer. Up to now, weight up to 15 kilograms – too heavy for field the Deutsches Museum has only been able to use. Although already about 11.000 machines collect broken devices. Recent contacts to were ordered (see Sächsisches Staatsarchiv collectors reveal that functional Chemnitz), only few – an unknown quantity - Schlüsselgeräte 41 still exist. They could help were really fabricated at the Wanderer Werke to solve the secret of the encryption algorithm. This contribution aims to present AG, Siegmar-Schönau (today a part of Chemnitz) our current state of research. and used. TICOM documents speak about 1000 pieces (Mowry, 2014). 1 Menzer at OKW/ Chi ’s Machines 2 About Schlüsselgerät SG-41 In 1941, the cryptologist Fritz Menzer (1908- Menzer wanted to design a pure mechanical, 2005) from the OKW/Chi (Signal Intelligence lightweight, durable and practical machine. So he Agency of the Supreme Command of the invented several interesting features to make the Wehrmacht) designed a mechanical cipher device robust and practical for military use, e.g.
    [Show full text]