Alan Turing and Voice Encryption

Total Page:16

File Type:pdf, Size:1020Kb

Alan Turing and Voice Encryption Alan Turing’s Work on Voice Encryption Craig Bauer Prologue: Inverters 1920s analog system put into use by AT&T. Prevented casual eavesdropping, but easily inverted back by determined amateurs. The frequency p of each component is replaced with s − p, where s is the frequency of a carrier wave. This makes the low tones sound high and vice versa. Kahn, p.554 Prologue II: The A-3 Scrambler AT&T and RCA, 1937 Bandsplitting (5 subbands) with inversion. Only 6 “keys” ever used! “Privacy, not Security” Kahn, p.554 Prologue II: The A-3 Scrambler Used by President Roosevelt and Winston Churchill!! Solved by Germans by September 1941. (after only a few months work) Kahn, p. 555-556. June 1942 “The security device has not yet been invented which is of any protection whatever against the skilled engineers who are employed by the enemy to record every word of every conversation made.” – British foreign Office Memorandum FO/371/32346 Hodges, p. 236 October 1943 “In addition, this equipment furnishes a very low degree of security, and we know definitely that the enemy can break the system with almost no effort.” - Colonel Frank McCarthy, Secretary to the Army General Staff to Harry Hopkins, Assistant to President Roosevelt Mehl, p. 5 Too Redundant • Redundancy in speech allows us to comprehend it through music, background noise, bad connections, mumbling, other people speaking, etc. • Some can even understand much inverted speech! • Speech is hard to disguise because of this. • Sound spectrograph attacks can be carried out like jigsaw puzzles. Part I: SIGSALY The Following are Equivalent 1) SIGSALY 2) RC-220-T-1 3) The Green Hornet 4) Project X-61753 5) Project X (Atomic Bomb was Project Y) 6) X-Ray 7) Special Customer Proof – see the literature How We Should Market Texts? Part I: SIGSALY Image from http://www.cryptologicfoundation.org/content/A-Museum-Like-No-Other/COMSEC.shtml Part I: SIGSALY http://homepage.mac.com/oldtownman/WW2Timeline/espionage.html Getting Started Based on earlier Vocoder (voice coder) technology for digitizing speech. 1936 Bell Labs 1977 You tell me! Getting Started “The vocoder was originally invented for speech compression [down to 10%], to reduce bandwidth costs on undersea phone cables.” Tompkins, p. 23 Diverse Applications The Cost of Compression “It made a curious kind of robot voice.” – Henry Stimson, Secretary of War Tompkins p. 63 SIGSALY Nov. ‘42 - Experimental station installed in New York. July ‘43 - Final Version Activated linking Washington D.C. and London. First transmission of digital speech. First practical “Pulse Code Modulation” (refers to digitization process - details to follow) Transmit Terminal SIGGRUV SIGGRUV Add key to encipher Subtract key to decipher Communication ceased if key stopped Speech sampled 50 times per second (about the size of a phoneme) Don’t Play it Again Uncle Sam! Played thermal noise backward 12 minutes per single sided 16” record Over 1,500 key sets made – Tompkins p. 68 Destroyed after use. SIGBUSE Need Air-conditioning Too! Mehl on right → Channels • 10 channel vocoder for speech (from 150 Hz to 2950 Hz) • 11 th and 12 th channel for pitch • Each channel was 25 Hz • Total bandwidth = 12x25 = 300 Hz • Spread spectrum makes jamming harder Sent later at VHF. Discretizing and Enciphering . Logarithmic Companding Log of the signal allows finer discernement at lower amplitudes Good choice, as ear distinguishes lower amplitudes more finely Decibel scale is logarithmic Why not just add without mod? 1) Mod 6 solution was Harry Nyquist’s idea. Mehl, p. 38 2) Must also mod or cipher level 0 ⇒ message level of 0 and cipher level 10 ⇒ message level of 5 3) It would be like hearing the message over the background noise of the key. SIGSALY Originally tried a binary system, but it could not be made understandable on the receiving end. The senary system (6 levels for each channel) worked, but 36 levels were used for pitch. (could count pitch as two channels, as each was enciphered, 6*6=36, but not companded) Hodges, p. 246 SIGSALY: Your Digital Pal Who’s Fun to be With! The Connections National Cryptologic Museum Never Broken! • Germans thought it was just noise or a teletype signal. • Sounded like music played at start of Green Hornet TV show of that era - Tompkins p. 72 • Declassified in 1976 Turing’s Arrival • Americans were ahead of Brits (at Dollis Hill) and Turing was to learn from them. • Entered Bell Labs Jan. 19, 1943 (after much debate probably reaching President Roosevelt – Tompkins, p. 59, Hodges p. 245, Mehl p. 69 – Secretary of War Stimson resolved it.) (in US Nov. 13 1942- Mar. 16, 1943 and made visits elsewhere after starting at Bell Labs) Turing’s Contributions • Most of Turing’s time was spent on ciphony cryptanalysis (beta tester) • Suggested improvements to SIGBUSE key • SIGBUSE key was never used British Concerns • SIGSALY in London would be under U.S. control. • “If the equipment is to be operated solely by U.S. personnel it will be impossible to prevent them listening in if they so desire.” - Turing • Americans were often so focused on their jobs they didn’t know what was actually said. Never Broken! (General Douglas MacArthur – didn’t trust it!) Never Broken! (General Douglas MacArthur – didn’t trust it!) So why replace it? Never Broken! (General Douglas MacArthur – didn’t trust it!) So why replace it? – 55 tons (70 ton shipping weight) Never Broken! (General Douglas MacArthur – didn’t trust it!) So why replace it? – 55 tons (70 ton shipping weight) – Took up 2,500 square ft. Never Broken! (General Douglas MacArthur – didn’t trust it!) So why replace it? – 55 tons (70 ton shipping weight) – Took up 2,500 square ft. – Cost $250,000 – $1,000,000+ (Tompkins p. 61) Never Broken! (General Douglas MacArthur – didn’t trust it!) So why replace it? – 55 tons (70 ton shipping weight) – Took up 2,500 square ft. – Cost $250,000 – $1,000,000+ (Tompkins p. 61) – Converted 30 kilowatts of power into 1 milliwatt of low quality speech. Hodges, p. 247 Never Broken! (General Douglas MacArthur – didn’t trust it!) So why replace it? – 55 tons (70 ton shipping weight) – Took up 2,500 square ft. – Cost $250,000 – $1,000,000+ (Tompkins p. 61) – Converted 30 kilowatts of power into 1 milliwatt of low quality speech. Hodges, p. 247 – Sounded like Donald Duck. Part II - Delilah Inspiration: • Idea hit Turing on trip back to England – March 1943 (Hodges p. 273) • Work not done at BP, but rather Hanslope Park (10 miles to the north) for his own amusement! (Hodges p. 269-270) Delilah Deliliah – the biblical “deceiver of men” The name was suggested by another, in response to a prize offer from Turing. -Hodges p.273 A Response from GCHQ! Protective Marking: UNCLASSIFIED Dear Craig I'm sorry for the delay in replying. I will be able to help (I think) on Feuerstein and on DELILAH - we have already released material on DELILAH to enable a rebuild of the system at Bletchley Park by the team which rebuilt the Bombe. I don't know what - if anything - we have in our Archives about RCS or SIGSALY but I will follow this up in the New Year. (If Ralph can't point you at anything in The National Archives, then nobody can!) Best wishes for Christmas and the New Year Tony XXXXX Departmental Historian Speech System 'Delilah' – Report on Progress Found by Ralph Erskine, Dated 6 June 1944 “The unit uses seven valves and when suitably rearranged will probably occupy a space of about 10" x 8" x 5".”- Turing British National Archives, HW 62/6 Available online at http://www.turing.org.uk/sources/delilah.html Big X, small x Junior X - Mobile version of SIGSALY -Fit in a van -Used an 8 channel vocoder -Never deployed - Tompkins p. 54 Bell Labs also designed a 30 channel vocoder that took up 2 floors. – Tompkins p. 60 Let’s Get Small • No vocoder • Sent an analog signal, in contrast to the digital SIGSALY • Only one keying system Taking the Limit as Δx→0? Delilah sampled speech 4,000 times per second (SIGSALY was only 50) Message amplitudes scaled to not exceed 1 Key added (mod 1) – didn’t work for SIGSALY! Without mod step, cryptanalysis is possible, as with SIGSALY. For text, basic unit is letter (or bit) and OTP is proven unbreakable Not so clear with speech, although too infrequent sampling is obviously insecure. Shannon’s Bandwidth Theorem (Whittaker, 1915) • “If a signal time function is sampled instantaneously at regular intervals and at a rate at least twice the highest significant signal frequency, the samples contain all of the original message.” - Mehl, p. 71 • Turing discussed this with Shannon at Bell Labs. • Delilah’s 2,000 Hz required 4,000 samples/sec Some Modern Comparisons CD Audio DVD Audio Sampling Rate 44.1 kHz 192 kHz Samples per second 44,100 192,000 Sampling Accuracy 16-bit 24-bit Number of Possible Output 65,536 16,777,216 Levels http://electronics.howstuffworks.com/question487.htm Early CD players were not as good at reconstructing analog waveforms from samples and this could be heard, but not now. Fixing a Problem • The result of the encryption was too high frequency for telephone circuits • Solution was to “feed each “spike” into a specially devised electronic circuit with an orthogonal property” Hodges p. 275 Turing’s Orthogonal Circuit Now pretty common in high speed digital communications systems. – intersymbol interference (ISI) is prevented – zero crossings are at sampling points so they don’t interfere Probably Turing or Shannon originated this idea.
Recommended publications
  • UC-650E+ DVB-S2 Encoder & Modulator User Manual
    UC-650E+ DVB-S2 Encoder & Modulator User Manual SW Version: 6.11 HW version: 5.8 Web NMS version: 2.00 UC‐650E+ DVB‐S2 Encoder & Modulator User Manual DIRECTORY DIRECTORY .......................................................................................................................................................... 1 CHAPTER 1 INTRODUCTION ................................................................................................................................. 1 1.1 OUTLINE ................................................................................................................................................................. 1 1.2 FEATURES ............................................................................................................................................................... 1 1.3 SPECIFICATIONS ....................................................................................................................................................... 2 1.4 INNER BLOCK DIAGRAM ............................................................................................................................................. 2 1.5 SYSTEM CONNECTION ............................................................................................................................................... 4 1.6 APPEARANCE AND DESCRIPTION .................................................................................................................................. 4 CHAPTER 2 INSTALLATION GUIDE .......................................................................................................................
    [Show full text]
  • Design and Implementation of Data Scrambler & Descrambler System
    Global Journal of Computer Science and Technology: A Hardware & Computation Volume 15 Issue 2 Version 1.0 Year 2015 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: 0975-4172 & Print ISSN: 0975-4350 Design and Implementation of Data Scrambler & Descrambler System using VHDL By Naina K. Randive & Prof. G. P. Borkhade Sant Gadge Baba Amaravati University, India Abstract- Multimedia data security is very important for multimedia commerce on the internet and real time data multicast. An striking solution for encrypting data with adequate message security at low cost is the use of Scrambler/Descrambler. Scramblers are necessary components of physical layer system standards besides interleaved coding and modulation. Scramblers are well used in modern VLSI design especially those are used in data communication system either to secure data or re- code periodic sequence of binary bits stream. However, it is necessary to have a descrambler block on the receiving side while using scrambling data in the transmitting end to have the actual input sequence on the receiving end. Scrambling and De-scrambling is an algorithm that converts an input string into a seemingly random string of the same length to avoid simultaneous bits in the long format of data. Scramblers have accomplish of uses in today's data communication protocols. On the other hand, those methods that are theoretical proposed are not feasible in the modern digital design due to many reasons such as slower data rate, increasing information, circuit hazards, uncountable hold- up etc. Therefore it is requisite for the modern digital design to have modified architecture to meet the required goal.
    [Show full text]
  • Dvb-T 8-Asi Scrambler
    DVB-T 8-ASI SCRAMBLER DVB-T 8-ASI Scrambler is professional solution for multichannel digital video broadcasting: it is broadcasting server with its own memory and integrated multiplexer, scrambler and modulator — all in one device — powerful conditional access system Using our DVB-T 8-ASI Scrambler (in which are integrated remultiplexer, scrambler and DVB-T modulator) you are able to organize digital CATV broadcasting network including PC channels monitoring system. The range of the output frequency adjustment for 2 configuration variants: 1RF and 2RF respectively Examples of packages spectrum arrangement within 48 MHz of 2 RF carriers KEY FEATURES: DVB-T 8-ASI Scrambler has integrated re-multiplexer with 8 ASI inputs — which allows you to form program packages from 8 independent transport streams for further broadcasting One or two carriers can be set within 36-850 MHz range, subcarrier frequency can be set within 48 MHz Supports both SD (Standard Definition) and HD (High Definition, 1920x1080i) channels, H.264 / H.265 standard Typical DVB-T/T2 set-top-boxes with CI can be used as subscribers' receivers 90% of STBs with CI support the working with DVB-T 8-ASI Scrambler Connection to PC for management: Ethernet (100 Mbit/s), RJ45 1Gbit data port for IP output (UDP/RTP protocol) MAIN FUNCTIONS: Works 24/7/365 Supports state-of-art broadcasting standards Automatic and manual PID insertion EPG, OTA, LCN support, Network search Generation of output stream with up to 92 PID selected from 8 ASI inputs Optional enabling/disabling of stuffing
    [Show full text]
  • Historical Ciphers • A
    ECE 646 - Lecture 6 Required Reading • W. Stallings, Cryptography and Network Security, Chapter 2, Classical Encryption Techniques Historical Ciphers • A. Menezes et al., Handbook of Applied Cryptography, Chapter 7.3 Classical ciphers and historical development Why (not) to study historical ciphers? Secret Writing AGAINST FOR Steganography Cryptography (hidden messages) (encrypted messages) Not similar to Basic components became modern ciphers a part of modern ciphers Under special circumstances modern ciphers can be Substitution Transposition Long abandoned Ciphers reduced to historical ciphers Transformations (change the order Influence on world events of letters) Codes Substitution The only ciphers you Ciphers can break! (replace words) (replace letters) Selected world events affected by cryptology Mary, Queen of Scots 1586 - trial of Mary Queen of Scots - substitution cipher • Scottish Queen, a cousin of Elisabeth I of England • Forced to flee Scotland by uprising against 1917 - Zimmermann telegram, America enters World War I her and her husband • Treated as a candidate to the throne of England by many British Catholics unhappy about 1939-1945 Battle of England, Battle of Atlantic, D-day - a reign of Elisabeth I, a Protestant ENIGMA machine cipher • Imprisoned by Elisabeth for 19 years • Involved in several plots to assassinate Elisabeth 1944 – world’s first computer, Colossus - • Put on trial for treason by a court of about German Lorenz machine cipher 40 noblemen, including Catholics, after being implicated in the Babington Plot by her own 1950s – operation Venona – breaking ciphers of soviet spies letters sent from prison to her co-conspirators stealing secrets of the U.S. atomic bomb in the encrypted form – one-time pad 1 Mary, Queen of Scots – cont.
    [Show full text]
  • Polish Mathematicians Finding Patterns in Enigma Messages
    Fall 2006 Chris Christensen MAT/CSC 483 Machine Ciphers Polyalphabetic ciphers are good ways to destroy the usefulness of frequency analysis. Implementation can be a problem, however. The key to a polyalphabetic cipher specifies the order of the ciphers that will be used during encryption. Ideally there would be as many ciphers as there are letters in the plaintext message and the ordering of the ciphers would be random – an one-time pad. More commonly, some rotation among a small number of ciphers is prescribed. But, rotating among a small number of ciphers leads to a period, which a cryptanalyst can exploit. Rotating among a “large” number of ciphers might work, but that is hard to do by hand – there is a high probability of encryption errors. Maybe, a machine. During World War II, all the Allied and Axis countries used machine ciphers. The United States had SIGABA, Britain had TypeX, Japan had “Purple,” and Germany (and Italy) had Enigma. SIGABA http://en.wikipedia.org/wiki/SIGABA 1 A TypeX machine at Bletchley Park. 2 From the 1920s until the 1970s, cryptology was dominated by machine ciphers. What the machine ciphers typically did was provide a mechanical way to rotate among a large number of ciphers. The rotation was not random, but the large number of ciphers that were available could prevent depth from occurring within messages and (if the machines were used properly) among messages. We will examine Enigma, which was broken by Polish mathematicians in the 1930s and by the British during World War II. The Japanese Purple machine, which was used to transmit diplomatic messages, was broken by William Friedman’s cryptanalysts.
    [Show full text]
  • The the Enigma Enigma Machinemachine
    TheThe EnigmaEnigma MachineMachine History of Computing December 6, 2006 Mike Koss Invention of Enigma ! Invented by Arthur Scherbius, 1918 ! Adopted by German Navy, 1926 ! Modified military version, 1930 ! Two Additional rotors added, 1938 How Enigma Works Scrambling Letters ! Each letter on the keyboard is connected to a lamp letter that depends on the wiring and position of the rotors in the machine. ! Right rotor turns before each letter. How to Use an Enigma ! Daily Setup – Secret settings distributed in code books. ! Encoding/Decoding a Message Setup: Select (3) Rotors ! We’ll use I-II-III Setup: Rotor Ring Settings ! We’ll use A-A-A (or 1-1-1). Rotor Construction Setup: Plugboard Settings ! We won’t use any for our example (6 to 10 plugs were typical). Setup: Initial Rotor Position ! We’ll use “M-I-T” (or 13-9-20). Encoding: Pick a “Message Key” ! Select a 3-letter key (or indicator) “at random” (left to the operator) for this message only. ! Say, I choose “M-C-K” (or 13-3-11 if wheels are printed with numbers rather than letters). Encoding: Transmit the Indicator ! Germans would transmit the indicator by encoding it using the initial (daily) rotor position…and they sent it TWICE to make sure it was received properly. ! E.g., I would begin my message with “MCK MCK”. ! Encoded with the daily setting, this becomes: “NWD SHE”. Encoding: Reset Rotors ! Now set our rotors do our chosen message key “M-C-K” (13-3-11). ! Type body of message: “ENIGMA REVEALED” encodes to “QMJIDO MZWZJFJR”.
    [Show full text]
  • Original Paper Written & Signed by William F
    / I / I p. I I _., • CRYPTOGRAPHIC EQUIP~lliNT FOR EITHER -SINGLE-ORIGINATOR OR MULTI-ORIGINATOR COMMUNICATION 1. a. Progress in the cryptologic field-during the.past fevT yea.,:s has .led to a basic change in cryptologic philosophy, a change Which has already oeen recognized by and is of im.,­ portant interest to the ASA. b. The t1~ust vrhich 'has heretofore been placed in the ordinary types of crypto-systems, the solution of which depends upon, or is directly or indirectly correlated with, the number of tests that have to be made to exhaust a multiplicity of , / hypotheses based upon keying possibilities, is daily decreasing. The beginning of this decreasing confidence i~ the degree of cryptographic security potentially offered by a vast number of permutations and combinations available of keying possibilities can be traced back to the advent of the application of ~abu~ lating machinery to the solution of cryptanalytic problems. _ Later, when specially designed cryptanalytic machines employ- ing electrical relays came to be constructed and applied, success­ fully to these problems, a real blow was struck at our former concepts of cryptographi·c security. And, now, the assurance that electronic cryptanalytic machinery can be a·pplied to ~?Peed up the solution 9f complex cryptographic systems is tend­ ing· slm1ly to undermine what faith was left in the systems or crypto-mechanisms currently considered as being the best there are, those using rotors with complicated stepping controls .. , ·· . c.- To sum this up, it can be said that, save for orie exception, cryptologic theory and practice during the past 'quar,ter of a c~ntury serves only to corroborat.E? the theoretical validity of·the century-old dictum first enunciated by Edgar Allan Poe: "Yet it may be r·oundly asserted that ht1.man ingenuity cannot concoct a cipher which human ingenuity cannot solve.11 2.
    [Show full text]
  • Frame Structure Channel Coding and Modulation for a Second Generation Digital Transmission System for Cable Systems (DVB-C2)
    Digital Video Broadcasting (DVB); Frame structure channel coding and modulation for a second generation digital transmission system for cable systems (DVB-C2) DVB Document A138 March 2015 3 Contents Intellectual Property Rights ................................................................................................................................ 6 Foreword............................................................................................................................................................. 6 1 Scope ........................................................................................................................................................ 7 2 References ................................................................................................................................................ 8 2.1 Normative references ......................................................................................................................................... 8 2.2 Informative references ....................................................................................................................................... 8 3 Definitions, symbols and abbreviations ................................................................................................... 9 3.1 Definitions ......................................................................................................................................................... 9 3.2 Symbols ..........................................................................................................................................................
    [Show full text]
  • (U) a History of Secure Voice Codin~: Insights Drawn from the Career of One of Tile Earliest Practitioners of the Art of Speech Coding JOSEPH P
    DOCID: 3860926 UNCLASSIFIED Cryptologic Quarter1y (U) A History of Secure Voice Codin~: Insights Drawn from the Career of One of tile Earliest Practitioners of the Art of Speech Coding JOSEPH P. CAMPBELL, JR., and RICHARD A. DEAN Editor's Note: This artrde Is basecl on one publlshecl In Dlgittl Signal Processing, July 1993, wfth permission ofthe authors. The history of speech coding is closely tied to tion of PCM. A "Buzz" /"Hiss" generator was used the career of Tom Tremain. He joined the as an exciter for the vocoder corresponding to the National Security Agency i~ 1959 as an Air Force voiced/unvoiced attribute of each 20-ms speech lieutenant assigned to duty at the Agency. Llttle segment. Balance of the "Buzz" /"Hiss" generator, did he know then that this assignment would or voicing, represented a major factor in the qual­ shape his career as well as' the future of speech ity of the speech. Early practitioners of speech coding. 1 coders, like Tom, can still be found today speak­ I . ing"Aaahhh" /"Sshhhhh" into voice coders to test Thomas E. Tremain was the U.S. govern- this balance. ment's senior speech scientist. He was a recog­ nized leader and an expert in speech science. From the time of SIGSALY until Tom arrived 1 Tom's work spanned five dife3des of state-of-the- at NSA, several generations of voice coders had art modem and speech co<;Iing innovations that been developed in conjunction with Bell Labs. are the basis of virtually e~ery U.S. and NATO The K0-6 voice coder, developed in 1949 and modem and speech coding standard.
    [Show full text]
  • The First Devices to Secure Transmission of Voice Were Developed Just After World War I
    F, 5 January Cabinet War Rooms SIGSALY The first devices to secure transmission of voice were developed just after World War I. They were substitution devices; they inverted frequencies. High frequencies were substituted for low frequencies and low frequencies were substituted for high frequencies. This was easy to do electronically. But, it was also easy to break. In fact, because much voice is in the middle frequencies and the middle frequencies are not changed much by inversion, it was sometimes possible to get a sense of the message just from the ciphertext. The A-3 scrambler … was based upon 1920s concepts. It divided the voice-frequency band into five subbands, inverted each of them, and then shifted the voice from one subband to another every 20 seconds. David Kahn Cryptology and the origin of spread spectrum In 1941, the United States was not at war although we were supporting the Allies, especially Britain, materially. The United States had a device to secure voice transmission called the A-3 Scrambler. This device used both substitution and transposition to encipher voice. Messages were chopped into small pieces, in each piece substitution was made by inverting frequencies, and the pieces were scrambled. This device was broken by the Germans during Fall 1941. The United States military was aware that the A-3 was not secure. On December 7, 1941, cryptanalysts in Washington, D.C., were in the process of breaking a long ciphertext from Tokyo to the Japanese embassy in Washington, D.C. William Friedman’s SIS team had earlier broken the Japanese diplomatic ciphers, but the naval ciphers had not yet been broken.
    [Show full text]
  • Principles of Satellite Communications
    Telecommunications Satellite Communications Principles of Satellite Communications Courseware Sample 86311-F0 Order no.: 86311-F 0 First Edition Revision level: 05/2016 By the staff of Festo Didactic © Festo Didactic Ltée/Ltd, Quebec, Canada 2014 Internet: www.festo-didactic.com e-mail: [email protected] Printed in Canada All rights reserved ISBN 978-2-89640-417-9 (Printed version) ISBN 978-2-89747-109-5 (CD-ROM) Legal Deposit – Bibliothèque et Archives nationales du Québec, 2014 Legal Deposit – Library and Archives Canada, 2014 The purchaser shall receive a single right of use which is non-exclusive, non-time-limited and limited geographically to use at the purchaser's site/location as follows. The purchaser shall be entitled to use the work to train his/her staff at the purchaser's site/location and shall also be entitled to use parts of the copyright material as the basis for the production of his/her own training documentation for the training of his/her staff at the purchaser's site/location with acknowledgement of source and to make copies for this purpose. In the case of schools/technical colleges, training centers, and universities, the right of use shall also include use by school and college students and trainees at the purchaser's site/location for teaching purposes. The right of use shall in all cases exclude the right to publish the copyright material or to make this available for use on intranet, Internet and LMS platforms and databases such as Moodle, which allow access by a wide variety of users, including those outside of the purchaser's site/location.
    [Show full text]
  • The Mathematics of the Enigma Machine Student: Emily Yale Supervisor: Dr Tariq Jarad
    The Mathematics of the Enigma Machine Student: Emily Yale Supervisor: Dr Tariq Jarad The Enigma Machine is a mechanical encryption device used mainly by the German Forces during WWII to turn plaintext into complex ciphertext, the same machine could be used to do the reverse (Trappe and Washington, 2006). Invented by the German engineer Arthur Scherbius at the end of World War I the cipher it produced was marketed as ‘unbreakable’ (Trappe and Washington, 2006). Adopted by the German military forces, it worked by layering a number of substitution ciphers that were decided by an excess of 1.589x1021 machine settings. With help from Polish and French mathematicians, the cryptographer named Alan Turing created a machine known as the ‘Bombe’ which helped to reduce the time taken to ‘break’ an Enigma cipher (Imperial War Museums, 2015). The report this poster is based on focuses on the mathematics of the Enigma machine as well as the methods used to find the settings for a piece of ciphertext. Advantages and disadvantages of the Enigma code will be explored, alternative cipher machines are considered. Aims and Objective Bombe (Group Theory) • A brief insight into Cryptography The Bombe was a machine that could be used to find the key to an • The history of the Enigma Machine Enigma cipher. It was modelled on the Polish machine, Bomba, which • The mechanism of the Enigma Machine could also do same before Enigma was enhanced. Bombe could find the • The mathematics of the Bombe settings on an Enigma machine that had been used to encrypt a • Understanding Group Theory ciphertext.
    [Show full text]