[JoGu]

Cryptology

Historical Data on Cryptanalysis of Rotor Machines

a7Hzq .#5r<
kÜ\as TâÆK$
ûj(Ö2 ñw%h:
Úk{4R f~`z8
¤˜Æ+Ô „&¢Dø

Events

A comprehensive source for the last item:

The movie »Enigma« shows an Enigma as well as the Turing bombes in action. (A review by Andrew Hodges is here.)

For Tutte's work on the SZ machines see

A typical phenomenon of WWII is that many countries occupied lots of leading mathematicians as cryptanalysts. Nevertheless in the postwar period up to 1975 cryptology was not an active mathematical research domain. The main reason probably was the fact that the war activities were classified for a long time after the end of the war.

A survey of German mathematicians involved in cryptology during WWII is:

A modern efficient approach to analyzing the pre-war version of Enigma (broken by the Polish cryptologists) is in


Effects to the Course of the War

Experts guess that the cryptanalytic successes of the Allies shortened the second World War by one or two years. In particular the allied troups had dared the invasion of Normandy (»D-Day«) only much later.

Also the German cryptanalysts had considerable successes [*]. Nevertheless the Allies were significantly superior in this respect. The reasons can mainly be located in the German organizational disorder:

On the other hand some machines remained unbroken (according to the present state of knowledge).

———
[*] Friedrich L. Bauer, Erich Hüttenhain; Entzifferung 1939–1945. Informatik-Spektrum 31/3 (2008), Springer-Verlag

Consequences for the Security of Ciphers

Rotor machines can produce strong ciphers. A modern algorithmic approach (realized as computer simulation) could work as follows (project idea):

The original crypt command of Unix worked in this way. However the encryption was rather weak.

Research problem: Find quantitative criteria for the security of such a rotor machine:

  1. How does the security depend on the number of rotors?
    These criteria could resemble the criteria for the number of rounds of a bitblock cipher, see Part 2 of these lectures.
  2. How does the security depend on the quality of the pseudorandom generator?
    These criteria could resemble the criteria for the quality of bitstream ciphers, see Part 4 of these lectures.


Author: Klaus Pommerening, 2000-Feb-13; last change: 2021-Jan-17.