introduction to enigma - northern kentucky universitychristensen/091mat483 enigma.pdfencryption...

16
Introduction to Enigma Chris Christensen Department of Mathematics Northern Kentucky University

Upload: others

Post on 30-Aug-2020

8 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Introduction to Enigma - Northern Kentucky Universitychristensen/091mat483 enigma.pdfencryption machine called Enigma. After modification it became a primary encryption method for

Introduction to Enigma

Chris ChristensenDepartment of MathematicsNorthern Kentucky University

Page 2: Introduction to Enigma - Northern Kentucky Universitychristensen/091mat483 enigma.pdfencryption machine called Enigma. After modification it became a primary encryption method for

Germany Adopted Machine Encryption

Germany selected a commercial encryption machine called Enigma.

After modification it became a primary encryption method for Germany’s military.

Page 3: Introduction to Enigma - Northern Kentucky Universitychristensen/091mat483 enigma.pdfencryption machine called Enigma. After modification it became a primary encryption method for

Each Enigma cipher is a permutation of the letters of the

alphabet

abcdefghijklmnopqrstuvwxyz

OHELCPYBSURDZTAFXKINJWVQGM(ao)(bh)(ce)(dl)(fp)(gy)(is)(ju)(kr)(mz)(nt)(qx)(vw)

Page 4: Introduction to Enigma - Northern Kentucky Universitychristensen/091mat483 enigma.pdfencryption machine called Enigma. After modification it became a primary encryption method for

Enigma

Page 5: Introduction to Enigma - Northern Kentucky Universitychristensen/091mat483 enigma.pdfencryption machine called Enigma. After modification it became a primary encryption method for

Enigma

Enigma has a period of about 17576.

Page 6: Introduction to Enigma - Northern Kentucky Universitychristensen/091mat483 enigma.pdfencryption machine called Enigma. After modification it became a primary encryption method for

Cipher Machines

TYPEX SIGABA

Page 7: Introduction to Enigma - Northern Kentucky Universitychristensen/091mat483 enigma.pdfencryption machine called Enigma. After modification it became a primary encryption method for

Enigma Rotor

Page 8: Introduction to Enigma - Northern Kentucky Universitychristensen/091mat483 enigma.pdfencryption machine called Enigma. After modification it became a primary encryption method for

The Key

At first there were 3 rotors. 6 ways to order the rotors.

Page 9: Introduction to Enigma - Northern Kentucky Universitychristensen/091mat483 enigma.pdfencryption machine called Enigma. After modification it became a primary encryption method for

Setting the Rotors

Page 10: Introduction to Enigma - Northern Kentucky Universitychristensen/091mat483 enigma.pdfencryption machine called Enigma. After modification it became a primary encryption method for

The Key

6 ways to order the rotors. 17576 ways to select the rotor setting.

Page 11: Introduction to Enigma - Northern Kentucky Universitychristensen/091mat483 enigma.pdfencryption machine called Enigma. After modification it became a primary encryption method for

The Plugboard

Page 12: Introduction to Enigma - Northern Kentucky Universitychristensen/091mat483 enigma.pdfencryption machine called Enigma. After modification it became a primary encryption method for

The Key

6 ways to order the rotors. 17576 ways to select the rotor setting. 100,391,791,500 ways to set the

plugboard.

Page 13: Introduction to Enigma - Northern Kentucky Universitychristensen/091mat483 enigma.pdfencryption machine called Enigma. After modification it became a primary encryption method for

The positions of the turnover notches was part of the key.

Page 14: Introduction to Enigma - Northern Kentucky Universitychristensen/091mat483 enigma.pdfencryption machine called Enigma. After modification it became a primary encryption method for

The Key

6 ways to order the rotors. 17576 ways to select the rotor setting. 100,391,791,500 ways to set the

plugboard. 676 ways to set the turnover notches. 7,156,755,732,750,624,000 ways to set

the key.

Page 15: Introduction to Enigma - Northern Kentucky Universitychristensen/091mat483 enigma.pdfencryption machine called Enigma. After modification it became a primary encryption method for

The sender and receiver must set their machines in exactly the same

way.

Page 16: Introduction to Enigma - Northern Kentucky Universitychristensen/091mat483 enigma.pdfencryption machine called Enigma. After modification it became a primary encryption method for

Checking one setting per second

Would take 22,693,900,000 years. A better plan was needed. Need a machine to attack a machine.