Now having copied the design there was a very high probability that they would encrypt messages under weak keys to the same proportion that they exist in the key map. If however they did know then they would not have a need to copy the design they would have come up with their own. However unless the enemy is your crypto analytic equal or better then they won’t know which are strong and which are weak keys. #Enigma simulator html5 how toIf you know how to diferentiate the strong and weak keys, you can as you control the KeyMat ensure your troops only use the strong keys. The C35 must have seen like a golden oportunity to some one connected to Friedman. Which gives you the problem that their comms become as secure as yours, which you probably cannot read in a sensible time frame. Thus you don’t want to put your most secure systems into the field as the enemy will quickly get hold of them and if they believe they are more secure than their own will thus copy them. What Friedman and his colleagues knew was that there was a problem with mechanical cipher systems, which is they are difficult to come up with a secure design, but very easy to copy one that is secure. We now know that the coin counting mechanism had the problem of some strong keys and quite a few weak keys that could be broken fairly quickly, such as around half an hour with pencil and paper. They got to see a lot of systems and were very good at analysing them. The “NSA back door” actually started long prior to the NSA inadvertantly with the C35 “additive coin counting system”.īack in 1935 William Friedman and colleagues had the responsibility of testing crypto equipment that came in for the attention of the US military etc. There is quite abit more to the Boris Hagelin and Crypto AG story than that article indicates. The only real recognition Tommy got was a street named after him… the British Establishment did not take kindly to either engineers or scientists for nearly all of the 20th Century, with awards and honours reserved almost exclusivly for “civil service manderins” who rather than get an honest education had elected to do the “Civil Service Exams”… It was the Lorenz machine not the Enigma that gave rise to the “Heath Robinson” machine at Bletchly, that Tommy flowers alone and out of his own pocket developed the first thermionic valve (tube) circuits that gave rise to the first working fully electronic computer. What was special about the Lorenz was that it was broken by just two men at Bletchly neither of whom –like the rest of British Intel– had ever seen one, nore pictures or even diagrams or sketches. Likewise the British Typex which worked in very much the same way as the Enigma and was used at Bletchly with it’s rotors wired the same way as the Enigma. Which is one of the reasons that the fast rotor on the military Enigma is at the other end when compared to the Enigmas used during the Spanish Civil War. What ever the reason, the Germans did know from the Spanish Civil War that the commercial design of the Enigma had been broken by amongst others the French. Others believe Hitler had been told about the short message length issue of the Enigma and thus discounted it’s use for high level traffic. Some believe that unlike Admiral Karl Donitz Hitler did not trust the Enigma design and suspected it was to simple for high level links. Something else that is also not commonly known about the Lorenz machines, is that they were unlike the Enigma designed specifically at Hitler’s request.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |