The Cryptanalysis of the Enigma Cipher. The Plugboard and the Cryptologic Bomb.
DOI:
https://doi.org/10.7494/csci.2014.15.4.365Keywords:
cryptologic bomb, M3 Enigma machine, plugboardAbstract
We study the problem of decoding secret messages encrypted by the German Army with the M3 Enigma machine after September 15, 1938. We focused our attention on the algorithmization and programming of this problem. A completion and optimization of Zygalski’s sheets method were presented previously. We describe below the missing algorithm solving the problem of the plugboard settings with an algebraic justification. This method is the original idea of the authors, and we can use it for cryptanalysis together with both Zygalski’s sheets method and Rejewski’s bomb method. Next, we present a reconstruction of the cryptologic bomb. We enclose an implementation of both algorithms in Cpp language.
Downloads
References
Bauer F.L.: Decrypted Secrets. Methods and Maxims of Cryptology. Springer-Verlag Berlin Heidelberg, 2007.
Borowska A.: The Cryptanalysis of the Enigma Cipher. Advances in Computer Science Research, vol. 10, pp. 19–38, 2013.
Brynski M.: Elements of the Galois Theory. Alfa Publishing House, Warsaw, 1985.
Buchmann J.A.: Introduction to Cryptography. PWN, Warsaw, 2006.
Christensen C.: Polish Mathematicians Finding Patterns in Enigma Messages. Mathematics Magazine, pp. 247–273, 2007.
Deavours C.A., Kruh L.: Machine Cryptography and Modern Cryptanalysis. Artech House Publishers, 1985.
Garlinski J.: Enigma. Mystery of the Second World War. University of Maria Curie-Sklodowska Publishing House, Lublin, 1989.
Gay K.: The Enigma Cypher. The Method of Breaking. Communication and Connection Publishing House, Warsaw, 1989.
Grajek M.: Enigma. Closer to the Truth. REBIS Publishing House, Poznan, 2007.
Gralewski L.: Breaking of Enigma. History of Marian Rejewski. Adam Marszalek Publishing House, Torun, 2005.
Kahn D.: Enigma Unwrapped. In: New York Times Book Review, 29.XII.1974.
Kasperek C., Woytak R.: Polish and British Methods of Solving Enigma. In: Enigma: How the German Machine Cipher Was Broken and How It Was Read by the Allies in World War Two. University Publications of America, 1984. Appendix F of Enigma by W. Kozaczuk.
Katz J., Lindell Y.: Introduction to Modern Cryptography. Chapman and Hall/CRC, 2007.
Koblitz N.: Algebraic Aspects of Cryptography. WNT, Warsaw, 2000.
Koblitz N.: A Course in Number Theory and Cryptography. WNT, Warsaw, 2006.
Kozaczuk W.: How the German Machine Cipher Was Broken and How It Was Read by the Allies in World War Two. University Publications of America, 1984. (Edited and translated by Christopher Kasparek).
Kozaczuk W., Straszak J.: Enigma. How the Poles Broke the Nazi Code. Hippocrene Books, 2004.
Lang S.: Linear Algebra. Springer-Verlag, New York, 1987.
Menezes A.J., van Oorschot P.C., Vanstone S.A.: Handbook of Applied Cryptography (Discrete Mathematics and Its Applications). CRC Press, 1996.
Mostowski A., Stark M.: Elements of Higher Algebra. PWN, Warsaw, 1970.
Pieprzyk J., Hardjono T., Seberry J.: Fundamentals of Computer Security. Springer-Verlag Berlin Heidelberg, Germany, 2003.
Rejewski M.: An Application of the Theory of Permutations in Breaking the Enigma Cipher. Applications Mathematicae, vol. 16(4), 1980.
Rejewski M.: How did Polish Mathematicians Decipher the Enigma. Polish Mathematics Association Yearbooks. Series 2nd: Mathematical News, (23), 1980.
Scott W.R.: Group Theory. Courier Dover Publications, 1964.
Seberry J., Pieprzyk J.: Cryptography: An Introduction to Computer Security. Prentice-Hall, Sydney, 1988.
Stoklosa J., Bilski T., Pankowski T.: Data Security in Computer Systems. PWN, Warsaw, 2001.
Wythoff G.: The Invention of Wireless Cryptography. The Appendix – Futures of the Past, vol. 2(3), 2014.
Zielinska E., Mazurczyk W., Szczypiorski K.: Trends in Steganography. Communications of the ACM, vol. 57(3), pp. 86–95, 2014.