SIGABA/ECM MARK II Cryptography in WWII The People Behind the magic • William Friedman and Frank Rowlett William F. Friedman • • • • • Born 1891 in Kishinev Moved to Pittsburg in 1893 B.S. and graduate work in genetics Joined Riverbank Laboratories Fell in love with cryptography Frank B. Rowlett • • • • • Born 1908 in Rose Hill, Virginia B.A. from Emory and Henry College Hired by Friedman in April of 1930 Worked as cryptologist and cryptanalyst Crucial in cracking both PURPLE and RED Development Hebern Rotor Machine • • • Built by Edward Hugh Hebern in 1917 Not much success Confidential cryptanalysis by Friedman in the late 1920s M-134-T1 • • • Hebern’s machine was unsuccesful Friedman developed M-134-T1 Utilized long paper strips to create an unpredictable stepping Sigoo • • • • Let’s be honest, miles of paper tape was not effective Limitations Rowlett came up with the idea of using rotors to decide stepping Attached to M-134-T1 SIGABA • Rowlett and Friedman ran out of money • Went to Navy • Ran with the idea • Patent 70,412 in 1936 • • First prototypes released in 1940 1943, 10000 machines in use Colmar incident • Army almost ruins it Colmar Incident • • • February 1945 during the final US offensive into Germany 2.5 Ton GMC truck was stolen in Colmar France Attracted the attention of General Eisenhower Cont. • 4 February 1945 • • • • 28th division arrive in Colmar 5 February • SIGABA arrives • Left unattended 9 February • Truck found • Lower safe found in Gressen River 20 February The Machine SIGABA • • • Rotor based encryption system Utilizes 15 rotors Produces a very random stepping pattern for the cipher rotors Rotor bank • • 15 rotors • 5 Cipher Rotors (26 contact) • 5 Control Rotors (26 contact) • 5 Index Rotors (10 contact) All set into rotor bank Encryption • 1 rotor • • One input is energized and follows wire to corresponding output 5 rotors • Follows similar process as 1 rotor, but outputs become inputs Cont. • When a key is energized on the keyboard, it goes to TWO places. • Control Rotors (controls stepping) • Cipher Rotors (controls encryption) Stepping • • When a key is energized, it is encrypted through the cipher rotors The control and index rotors will eventually determine which cipher rotors step • • The control rotors function as a mixed up odometer. How they rotate: • R1: LOCKED • R2: 1 step/676 strokes • R3: 1 step/1stroke • R4: 1 step/26 strokes • R5: LOCKED Cont. • Index rotor stepping: • This is easy, they don’t move after set up! • Cipher rotor stepping… • This is complicated • Hold on Cipher rotor stepping • A key on the key board is energized. • One path to cipher rotors other to control. • • • The energized key becomes four inputs (F,G,H, and I) to the control rotors The four inputs work their way through the control rotors There are now four outputs on the left side of the control rotor bank Cont. • • • These four outputs then become inputs to the indexing rotors They are ORed into groups in order to fit the size of the index rotors The inputs will then work their way through the index rotors • There will be a maximum of four outputs Cont. • • The outputs are then ORed at the output of the index rotors It is a binary function • 1: Corresponding cipher rotor steps • 0: Corresponding cipher rotor does not step Phewww… C 1 C 2 C 3 C 4 C 5 S 1 S 2 S 3 S 4 S 5 Statio Ever y nary 676 lett ers Ever y lett er Ever y 26 lett ers Stat iona ry I 3 I 4 I 5 V + I 1 I 2 Ciphe r text Key space Theoretical Key Space Practical Key Space Picture References • http://en.wikipedia.org/wiki/File:William-Friedman.jpg • http://www.ctcl.org/notables/alumni • http://www.jproc.ca/crypto/hebern_1.html • http://forum.xcitefun.net/colmar-france-most-beautiful-c • http://www.jproc.ca/crypto/ecm2.html • And from Dr. Mucklow’s lecture slides