SIGABA/ECM MARK II Cryptography in WWII

advertisement
SIGABA/ECM MARK II
Cryptography in WWII
The People Behind the magic
•
William Friedman and Frank Rowlett
William F. Friedman
•
•
•
•
•
Born 1891 in Kishinev
Moved to Pittsburg in
1893
B.S. and graduate work
in genetics
Joined Riverbank
Laboratories
Fell in love with
cryptography
Frank B. Rowlett
•
•
•
•
•
Born 1908 in Rose Hill,
Virginia
B.A. from Emory and
Henry College
Hired by Friedman in
April of 1930
Worked as cryptologist
and cryptanalyst
Crucial in cracking
both PURPLE and RED
Development
Hebern Rotor Machine
•
•
•
Built by Edward Hugh
Hebern in 1917
Not much success
Confidential
cryptanalysis by
Friedman in the late
1920s
M-134-T1
•
•
•
Hebern’s machine was
unsuccesful
Friedman developed
M-134-T1
Utilized long paper
strips to create an
unpredictable stepping
Sigoo
•
•
•
•
Let’s be honest, miles of
paper tape was not
effective
Limitations
Rowlett came up with
the idea of using rotors
to decide stepping
Attached to M-134-T1
SIGABA
•
Rowlett and Friedman
ran out of money
•
Went to Navy
•
Ran with the idea
•
Patent 70,412 in 1936
•
•
First prototypes
released in 1940
1943, 10000 machines
in use
Colmar incident
•
Army almost ruins it
Colmar Incident
•
•
•
February 1945 during
the final US offensive
into Germany
2.5 Ton GMC truck was
stolen in Colmar France
Attracted the attention
of General Eisenhower
Cont.
•
4 February 1945
•
•
•
•
28th division arrive in
Colmar
5 February
•
SIGABA arrives
•
Left unattended
9 February
•
Truck found
•
Lower safe found in
Gressen River
20 February
The Machine
SIGABA
•
•
•
Rotor based encryption
system
Utilizes 15 rotors
Produces a very
random stepping
pattern for the cipher
rotors
Rotor bank
•
•
15 rotors
•
5 Cipher Rotors (26
contact)
•
5 Control Rotors (26
contact)
•
5 Index Rotors (10
contact)
All set into rotor bank
Encryption
•
1 rotor
•
•
One input is energized
and follows wire to
corresponding output
5 rotors
•
Follows similar process as
1 rotor, but outputs
become inputs
Cont.
•
When a key is
energized on the
keyboard, it goes to
TWO places.
•
Control Rotors (controls
stepping)
•
Cipher Rotors (controls
encryption)
Stepping
•
•
When a key is
energized, it is
encrypted through the
cipher rotors
The control and index
rotors will eventually
determine which
cipher rotors step
•
•
The control rotors
function as a mixed up
odometer.
How they rotate:
•
R1: LOCKED
•
R2: 1 step/676 strokes
•
R3: 1 step/1stroke
•
R4: 1 step/26 strokes
•
R5: LOCKED
Cont.
•
Index rotor stepping:
•
This is easy, they don’t
move after set up!
•
Cipher rotor stepping…
•
This is complicated
•
Hold on
Cipher rotor stepping
•
A key on the key board is energized.
•
One path to cipher rotors other to control.
•
•
•
The energized key becomes four inputs (F,G,H, and
I) to the control rotors
The four inputs work their way through the control
rotors
There are now four outputs on the left side of the
control rotor bank
Cont.
•
•
•
These four outputs then
become inputs to the
indexing rotors
They are ORed into
groups in order to fit the
size of the index rotors
The inputs will then
work their way through
the index rotors
•
There will be a maximum
of four outputs
Cont.
•
•
The outputs are then
ORed at the output of
the index rotors
It is a binary function
•
1: Corresponding cipher
rotor steps
•
0: Corresponding cipher
rotor does not step
Phewww…
C
1
C
2
C
3
C
4
C
5
S
1
S
2
S
3
S
4
S
5
Statio Ever
y
nary
676
lett
ers
Ever
y
lett
er
Ever
y 26
lett
ers
Stat
iona
ry
I
3
I
4
I
5
V
+
I
1
I
2
Ciphe
r
text
Key space
Theoretical Key Space
Practical Key Space
Picture References
•
http://en.wikipedia.org/wiki/File:William-Friedman.jpg
•
http://www.ctcl.org/notables/alumni
•
http://www.jproc.ca/crypto/hebern_1.html
•
http://forum.xcitefun.net/colmar-france-most-beautiful-c
•
http://www.jproc.ca/crypto/ecm2.html
•
And from Dr. Mucklow’s lecture slides
Download