introduction to enigma - northern kentucky universitychristensen/091mat483 enigma.pdfencryption...
TRANSCRIPT
![Page 1: Introduction to Enigma - Northern Kentucky Universitychristensen/091mat483 enigma.pdfencryption machine called Enigma. After modification it became a primary encryption method for](https://reader036.vdocuments.us/reader036/viewer/2022062415/5fe1851e80de4f5b576a824e/html5/thumbnails/1.jpg)
Introduction to Enigma
Chris ChristensenDepartment of MathematicsNorthern Kentucky University
![Page 2: Introduction to Enigma - Northern Kentucky Universitychristensen/091mat483 enigma.pdfencryption machine called Enigma. After modification it became a primary encryption method for](https://reader036.vdocuments.us/reader036/viewer/2022062415/5fe1851e80de4f5b576a824e/html5/thumbnails/2.jpg)
Germany Adopted Machine Encryption
Germany selected a commercial encryption machine called Enigma.
After modification it became a primary encryption method for Germany’s military.
![Page 3: Introduction to Enigma - Northern Kentucky Universitychristensen/091mat483 enigma.pdfencryption machine called Enigma. After modification it became a primary encryption method for](https://reader036.vdocuments.us/reader036/viewer/2022062415/5fe1851e80de4f5b576a824e/html5/thumbnails/3.jpg)
Each Enigma cipher is a permutation of the letters of the
alphabet
abcdefghijklmnopqrstuvwxyz
OHELCPYBSURDZTAFXKINJWVQGM(ao)(bh)(ce)(dl)(fp)(gy)(is)(ju)(kr)(mz)(nt)(qx)(vw)
![Page 4: Introduction to Enigma - Northern Kentucky Universitychristensen/091mat483 enigma.pdfencryption machine called Enigma. After modification it became a primary encryption method for](https://reader036.vdocuments.us/reader036/viewer/2022062415/5fe1851e80de4f5b576a824e/html5/thumbnails/4.jpg)
Enigma
![Page 5: Introduction to Enigma - Northern Kentucky Universitychristensen/091mat483 enigma.pdfencryption machine called Enigma. After modification it became a primary encryption method for](https://reader036.vdocuments.us/reader036/viewer/2022062415/5fe1851e80de4f5b576a824e/html5/thumbnails/5.jpg)
Enigma
Enigma has a period of about 17576.
![Page 6: Introduction to Enigma - Northern Kentucky Universitychristensen/091mat483 enigma.pdfencryption machine called Enigma. After modification it became a primary encryption method for](https://reader036.vdocuments.us/reader036/viewer/2022062415/5fe1851e80de4f5b576a824e/html5/thumbnails/6.jpg)
Cipher Machines
TYPEX SIGABA
![Page 7: Introduction to Enigma - Northern Kentucky Universitychristensen/091mat483 enigma.pdfencryption machine called Enigma. After modification it became a primary encryption method for](https://reader036.vdocuments.us/reader036/viewer/2022062415/5fe1851e80de4f5b576a824e/html5/thumbnails/7.jpg)
Enigma Rotor
![Page 8: Introduction to Enigma - Northern Kentucky Universitychristensen/091mat483 enigma.pdfencryption machine called Enigma. After modification it became a primary encryption method for](https://reader036.vdocuments.us/reader036/viewer/2022062415/5fe1851e80de4f5b576a824e/html5/thumbnails/8.jpg)
The Key
At first there were 3 rotors. 6 ways to order the rotors.
![Page 9: Introduction to Enigma - Northern Kentucky Universitychristensen/091mat483 enigma.pdfencryption machine called Enigma. After modification it became a primary encryption method for](https://reader036.vdocuments.us/reader036/viewer/2022062415/5fe1851e80de4f5b576a824e/html5/thumbnails/9.jpg)
Setting the Rotors
![Page 10: Introduction to Enigma - Northern Kentucky Universitychristensen/091mat483 enigma.pdfencryption machine called Enigma. After modification it became a primary encryption method for](https://reader036.vdocuments.us/reader036/viewer/2022062415/5fe1851e80de4f5b576a824e/html5/thumbnails/10.jpg)
The Key
6 ways to order the rotors. 17576 ways to select the rotor setting.
![Page 11: Introduction to Enigma - Northern Kentucky Universitychristensen/091mat483 enigma.pdfencryption machine called Enigma. After modification it became a primary encryption method for](https://reader036.vdocuments.us/reader036/viewer/2022062415/5fe1851e80de4f5b576a824e/html5/thumbnails/11.jpg)
The Plugboard
![Page 12: Introduction to Enigma - Northern Kentucky Universitychristensen/091mat483 enigma.pdfencryption machine called Enigma. After modification it became a primary encryption method for](https://reader036.vdocuments.us/reader036/viewer/2022062415/5fe1851e80de4f5b576a824e/html5/thumbnails/12.jpg)
The Key
6 ways to order the rotors. 17576 ways to select the rotor setting. 100,391,791,500 ways to set the
plugboard.
![Page 13: Introduction to Enigma - Northern Kentucky Universitychristensen/091mat483 enigma.pdfencryption machine called Enigma. After modification it became a primary encryption method for](https://reader036.vdocuments.us/reader036/viewer/2022062415/5fe1851e80de4f5b576a824e/html5/thumbnails/13.jpg)
The positions of the turnover notches was part of the key.
![Page 14: Introduction to Enigma - Northern Kentucky Universitychristensen/091mat483 enigma.pdfencryption machine called Enigma. After modification it became a primary encryption method for](https://reader036.vdocuments.us/reader036/viewer/2022062415/5fe1851e80de4f5b576a824e/html5/thumbnails/14.jpg)
The Key
6 ways to order the rotors. 17576 ways to select the rotor setting. 100,391,791,500 ways to set the
plugboard. 676 ways to set the turnover notches. 7,156,755,732,750,624,000 ways to set
the key.
![Page 15: Introduction to Enigma - Northern Kentucky Universitychristensen/091mat483 enigma.pdfencryption machine called Enigma. After modification it became a primary encryption method for](https://reader036.vdocuments.us/reader036/viewer/2022062415/5fe1851e80de4f5b576a824e/html5/thumbnails/15.jpg)
The sender and receiver must set their machines in exactly the same
way.
![Page 16: Introduction to Enigma - Northern Kentucky Universitychristensen/091mat483 enigma.pdfencryption machine called Enigma. After modification it became a primary encryption method for](https://reader036.vdocuments.us/reader036/viewer/2022062415/5fe1851e80de4f5b576a824e/html5/thumbnails/16.jpg)
Checking one setting per second
Would take 22,693,900,000 years. A better plan was needed. Need a machine to attack a machine.