Help Break Original Enigma Messages 272
Stereo writes "The Enigma Machine was cracked in Poland in 1932, but three messages remain unbroken, despite having been intercepted in the North Atlantic in 1942. The M4 Project, named after the four rotor Enigma M4 used for encryption, is a distributed computing effort to break them. One message has already been deciphered successfully!"
More than 3 are unbroken (Score:5, Informative)
Re:More than 3 are unbroken (Score:2)
The original breakthrough was the deed of one brilliant mind, the Polish matematician Marian Rejewski, and he was helped (however little) by the fact that Hans-Thilo Schmidt sold the Enigma plans to the French secret services.
The English project was a joint effort of many more minds and succeeded because the Germans did all kinds of mistakes which reduced the scope of the searches. Even so, the encryptions used by the German Navy back then (which didn't ma
Error (Score:4, Interesting)
Re:Error (Score:2)
Re:Error (Score:2)
Re:Error (Score:5, Interesting)
Basically, they put too much faith in the encryption technology, and didn't put enough effort into securing the rest of the process. It's not unusual, many of today's systems have similar issues.
The comments in Bruce Schneier's blog [schneier.com] list some more things that went wrong in the Enigma process.
Re:Error (Score:2)
Re:Error (Score:2)
Re:Error (Score:5, Interesting)
Since the crib relied on the Enigma's inability to encode a letter to itself, the received message must have consisted entirely of the letter L.
To be precise, the message was slightly more likely to have consisted entirely of the letter L. There's no mathematical guarantee that it would contain all Ls, but a sufficiently long ciphertext message with no Ls in the output would've indicated that, with high probability, there were an unusually large number of Ls in the input. Without knowing the actual story, I'd guess that the message probably wasn't all that long, and the math would probably predict only a few more Ls than normal... but that was enough of a hint that when combined with a knowledge of human behavior gave the cryptanalysts reason to assume it was all Ls and see if they could find key settings that would produce the ciphertext from that input.
Even at the height of Bletchley Park's codebreaking efficiency, nearly every day's break came down to some clever guess of that sort... "What if we tried this?". I imagine the "all Ls" scenario was one of the easier guesses. In order to make it more certain, the codebreakers even asked the front-line forces to do apparently bizarre things, just so they'd have a keyword they could look for in the subsequent reports.
Amazing stuff...
Re:Error (Score:2)
No L? Must have been a Christmas greeting from the German forces.
Re:Error (Score:2)
Re:Error (Score:2)
Kind of looks like Waste to me.
Re:Error (Score:2, Informative)
Re:Error (Score:2)
The design of an encryption system itself -- as in the algorithm or device used for encipherment -- doesn't make it more or less resistant to traffic analysis. You could be using one-time pads, essentially unbreakable encryption, and still be vunerable to traffic analysis if you were using it poorly.
Re:Error (Score:3, Interesting)
Re:Error (Score:2)
We declasified the break because the machines went out of service.
Re:Error (Score:2)
Re:Error (Score:2)
Maybe someone's cat walked across the keyboard or someone sat on the keyboard or the operator was drunk and forgot how to type or someone set it wrong and sent a useless message, shortly being transfered to the Russian front.
Well we won't know until these are cracked. What!? no Win2k version, D'oh, must use XP instructions.
Re:Error (Score:2)
Reminds me of when somebody showed me what looked like a magic eye [wikipedia.org] picture, but wasn't. I'm usually pretty good at getting my eyes focused just right to see the picture, but I was working on this one for 5 minutes before the joker started sniggering.
Scary thing, I was just about seeing something!
power of proper encryption (Score:2)
Re:power of proper encryption (Score:4, Funny)
Re:power of proper encryption (Score:2)
Re:power of proper encryption (Score:2)
Actually, the Germans' use of the Enigma was the most terrible part. Operators using their initials as keys, sending messages that were identical (or nearly so, such as form letters) using different keys, sending messages that consisted of nothing but the same letter, etc etc etc.
Enigma had its share of design problems, don't get me wrong. But I would hardly call it terrible, especially given the age of the technology. It
Re:power of proper encryption (Score:2)
Coral Cache? (Score:2)
I think you're all just messing with my head.
-Charles
Re: Coral Cache? (Score:2)
Re: Coral Cache? (Score:2)
You said it. I'm glad I'm not the only one.
It looks to me like Corel Cache can be Slashdotted as well. Indeed, the only time I ever find that Corel Cache helps me to read a story that /. links to is when someone submits the Corel Cache link, and I can then go to the original story that is supposed to be cached, because the rest of /. is hammering Corel Cache instead.
Corel Cache doesn't have a special "B
Re: Coral Cache? (Score:2)
Re: Coral Cache? (Score:2)
Build your own Enigma Machine (Score:5, Interesting)
Re:Build your own Enigma Machine (Score:2, Informative)
Java Enigma Simulator (Score:5, Interesting)
Re:Java Enigma Simulator (Score:5, Funny)
Sorry
Re:Java Enigma Simulator (Score:2)
I hope you meant enigma and not enema... a java enema would probably give you a hell of a caffeine hit, but it'd probably be a tad unpleasant cleaning the espresso machine afterwards!
Wasn't the enigma cracked? (Score:2, Interesting)
Re:Wasn't the enigma cracked? (Score:3, Interesting)
Re:Wasn't the enigma cracked? (Score:3, Interesting)
This is just not true. Enigma was broken using "bombes" which were not computers by any reasonable definition of the term. A bombe was simply an electromechanical device that tested each possible rotor setting. Colossus, OTOH, considered by some to be the first programmable digital computer, was
Re:Wasn't the enigma cracked? (Score:4, Informative)
ian
Re:Wasn't the enigma cracked? (Score:2)
The British advances have become public knowledge over time. F
Re:Wasn't the enigma cracked? (Score:3, Informative)
If a cop is wearing body armor, it doesn't mean that he can walk out into a torrent of incoming bullets. Chances are that one of those bullets will find a weakness in his armor, or simply strike him in a place where he's not protected. Similar principle here.
LK
Re:Hey knobjockey (Score:3, Interesting)
The parent poster is correct: a properly used Enigma machine is effectively unbreakable with the technology of the day and, for that matter, the technology of the next few decades too.
The majority of the users of the Enigma machine were not using it properly and so left cracks for BP to exploit. All this is well documented by people who do know a great deal about cryptographic systems. Some of them worked for BP and have in-depth first hand knowledge of what they write about.
Even today's technology, th
Enigma is fairly close to a OTP (Score:5, Interesting)
The full Enigma code is extremely difficult to break. The machine used by Alan Turing (Colossus) was massively parallel and highly optimized for the task - so much so that it is actually able to compute something like ten times as many keys per second as a modern Pentium 4 using the same algorithm. Not bad, for a machine of that era.
The Enigma suffered from numerous weaknesses - almost all of them operator error. The encryption mechanism itself was damn good and, if used correctly each time, every time, it would have been horribly difficult for the Bletchley Park team to break.
The one event that turned Enigma transparent was the re-transmission of a message without the cogs being randomized first. Because a machine had already been recovered, Turing knew what the cogs were, just not where they should be in relation to each other. By having the same message sent twice without change and without a prior reset, it was possible to overlay the two messages and thereby infer virtually everything else.
This only allows you to crack messages which use the same prng for initialization and identical cogs. Since the cogs were designed to be swappable, non-standard configurations would have been possible. These would not have been crackable - and would likely not be crackable today, if non-standard enough. (The number of arrangements you would need to test increases with the factorial of the number of ways the cogs could be designed, as well as the factorial of the number of ways the cogs could be inserted into the machine.)
The possibility exists that certain units may have used non-standard Enigma codes, but if that is the case, those codes will NOT be broken by this effort. The groups that spirited high-ranking Germans to South America and other "secure" locations must have had a communication system that the Allies had not yet deciphered, as they must have been able to operate over extremely large distances very quickly, making the use of radio a certainty.
It is also likely that some units within the German military adopted their own "extra secure" practices when using the Enigma system internally. These may or may not be crackable, depending on how paranoid the commanders were.
Re:Enigma is fairly close to a OTP (Score:2, Interesting)
Enigma is fundamentally flawed. (Score:5, Interesting)
Of course, in WW2, it was the misuse of enigma that made it particularily easy to break --- It might only take one weather report to learn the daily subkey. Had Enigma been properly used, it would probably have been nearly unbreakable with WW2 era technology.
Re:Enigma is fundamentally flawed. (Score:3, Interesting)
One tactic they used was 'Gardening' where they sent out bombers to mine a particular sea area, then sit back and wait for standard message reporting the new minefield
Re:Enigma is fundamentally flawed. (Score:4, Insightful)
So getting the daily subkey from a bungled weather report, would only help the British to read messages from a particular branch, in a limited area, for a period of just 24 hours.
--
Regards
Peter H.S.
Re:Enigma is fairly close to a OTP (Score:2)
A valve does the same thing as a transistor, and I find it extremely hard to believe that 1500 transistors, no matter how cunninly arranged to execute a single algorithm, could outperform 55 [wikipedia.org] million transistors.
And I also doubt if they were switching several thousand million times a second.
Yes, I know, many of those transistors are
Re:Enigma is fairly close to a OTP (Score:2)
Re:Enigma is fairly close to a OTP (Score:2)
Re:Enigma is fairly close to a OTP (Score:2)
Lots of errors in your post: All of the methods used in World War II were short-cut algorithms. For example, bombes would search systematically over all starting positions and orderings of the rotors, but not over the billions of plugboard settings. Colossus wasn't used for Enigma. It would seem Alan Turing never used Colossus. Colossus was not faster than a P4 (unless you program in Javascript, as Tony Sale does). Sometimes operators did not randomize their rotors between
Re:Wasn't the enigma cracked? (Score:3, Funny)
Jaysyn
and the message is . . . (Score:3, Funny)
Re:and the message is . . . (Score:3, Funny)
Do I have to? (Score:3, Funny)
Excuse me... (Score:2)
Re:Excuse me... (Score:3, Funny)
You'd think they could just ask the Germans for the cleartext.
Not exactly... (Score:2)
"hoax successful... I'm not really dead... several discovery channel specials prepared to skew and obscure my whereabouts... love hitler"
Sorry I thought this was hilarious (Score:2)
I read that and burst out laughing immediately thinking of three Polish soldiers running with the Enigma machine backwards and falling over and cracking the case.
"oh no we have cracked ze case"
"lets get out of here"
Re:Sorry I thought this was hilarious (Score:2)
Re:Sorry I thought this was hilarious (Score:5, Informative)
Re:Sorry I thought this was hilarious (Score:2)
Even though they had a chance of winning, the cost was very high.
If they had done it the other way round, they'd have much of western Europe, and there'll be just USA, Germany, USSR in the North Atlantic.
Re:Sorry I thought this was hilarious (Score:2)
most people only forget Poland, but Canada?
Re:Sorry I thought this was hilarious (Score:2)
Anyway my point was it would have been much easier for Germany to take all/most(switzerland?) of western europe if they didn't expend so much trying to take the Russians.
Fighting a war on more than one front is difficult. The Russians weren't going to attack them in the first place. So they should have just gone and taken west europe (including britain and ireland) and that would make it a lot harder for the USA to tr
Re:Sorry I thought this was hilarious (Score:2)
Re:Sorry I thought this was hilarious (Score:2)
Cryptonomicon! (Score:2)
Re:Cryptonomicon! (Score:2)
Turing could have accomplished a hell of a lot in the following years. Who knows? We might have seen genuine early advances in AI, since he was showing an interest in it.
Re:Cryptonomicon! (Score:2)
Something the US (and Iran!) still hasn't learnt yet. Ah well.
The 2nd message is (Score:2)
I have cracked the other two (Score:5, Funny)
Re:I have cracked the other two (Score:2)
a fun post, and not far from the truth, I suspect.
Questionable Legality (Score:5, Interesting)
You're all terrorists. Off to Guantanamo with you.
Re:Questionable Legality (Score:2)
Since it is unlikely that anyone would consider using Enigma for any kind of copy protection or DRM, breaking Enigma would not be a problem for DMCA. Even if som
Re:Questionable Legality (Score:2)
Well -- I think you may be overstating the case. Notice that you've left out the possiblity that DMCA, while allowing brute force attacks to recover specific plaintexts, makes it illegal to study the cryptographic weaknesses of various algorithms, which so far as I know it does not.
The
Re:Questionable Legality (Score:2)
Re:Well (Score:2)
Re:Well (Score:3, Funny)
Well, makes sense to me. Which activity is more interesting?
Re:Questionable Legality (Score:3, Informative)
No. You're letting them control you because they always use the acronym.
It is the Digital Millennium Copyright Act. It is first, foremost, and only a copyright act.
The Enigma messages aren't copyrighted in any real sense (copyrights that belonged to the Nazi Party went to interesting places - at one point they were public-domained by an Allied government as "spoils of war"), and moreover t
Re:Questionable Legality (Score:2)
(Yes this is humor, but I think it acutally does contain the DMCA requisites:
Historical information ! (Score:4, Funny)
Enigma simulations (Score:2, Informative)
Second Message Now Cracked (Score:4, Funny)
It warned other units that a local garage mechanic had offered to 'improve' their Enigma machine to make it run faster, but after he left they discovered he'd inserted a small additional module which meant that whatever was transmitted, there was an extra last line which read "Come to Fritz's autos for a great deal on used Volkswagens". The cracked message told all other users only to visit trusted garages and not accept any offers of performance upgrades because such offers were the work of 'trojan enemy conspirators that operated like an unwanted virus in the body of our glorious Fatherland'.
There were also complaints of many false messages being received that decoded into offers to supply the German solders with 'processed meat rations' captured from allied troops - the cracked message warned Enigma users to ignore the flood of 'unwanted messages about spam that deflect focus from our vital war efforts' and not to reply as this only confirmed that the messages were being received, which guaranteed even more 'spam messages'.
The final bit of the decoded message related to trials with a new rotor wiring system produced by a local engineer. Apparently, the system promised to make the Enigma machines easier to use, but the coloured insulation on the wiring was rubbing away, (presumably an interaction between the synthetic dyes being used with early, less stable plastics), exposing the conductors and causing the whole machine to short circuit and stop working ('die' as the message coldly put it). The cracked message warned other users to check their rotors to see whether they had any of the 'brightly coloured experimental wiring' and if so, to stop using them and return the rotors to 'Wilhelm Gatz' if they identified the so-called 'blue screening of death'.
Possible Enigma keys (Score:2, Informative)
Another Message Decoded and Translated (Score:5, Funny)
RESPECTFULLY REQUESTING YOUR ASSISTANCE IN EXTREME CONFIDENCE
I am certain this message comes as a suprise to you since you do not know me. I have obtained your name from French Resistance fighters as one that can be trusted with my confidence.
Two months ago, my father was kidnapped and murdered by the Nazi SS. I have need to transfer the sum of US$25,000,000 (twenty-five million) from an account in Credit Lyonnais in France to an account outside of German territory, of which your payment shall be 30% if you agree to our proposal...
No Boinc? (Score:2)
Location of the sub in google maps (Score:2, Interesting)
Broken download (Score:2)
Why can't people just use bittorrent for this sort of thing? Isn't it obvious that coral cache doesn't work?
Step by step code breaking? (Score:2)
But what coding did the Allies use? (Score:2)
Re:But what coding did the Allies use? (Score:2)
About allied encryption (Score:2, Informative)
Re:Source code? (Score:2)
I've put a copy on my own server if you want to download it from me: enigma-suite-0.73.1.tar.gz [ofdoom.com].
Re:Isn't this against US law? (Score:2)
Re:Isn't this against US law? (Score:2)
Re:Only one problem... (Score:2)
Re:It's not the message, but THE message that matt (Score:2)
People say it so frequently that it has became a cliche - but it's not true. A simple example of uncrackable encryption is the one-time pad [wikipedia.org] cipher. Its absolute security is mathematically proven. However, in real life all the ciphers are applied by human beings and therefore they are vulnerable to the residual error margin. In real usage,
Re:Why does it need such a lot of work? (Score:2)
Re:CIA "Kryptos" Code (Score:2)
Re:on-demand bombing (Score:2)
Chicago's Museum of Science and Industry [msichicago.org] has a beautifully re-vamped exhibit there, they built it it's own underground "pen" to live in. You walk in 3 stories above the bottom of the "drydock" at standing on deck level, then go around a huge spiral ramp out
Re:Future Global Conflict (Score:2)