PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

The cryptanalysis of the Enigma cipher. The plugboard and the cryptologic bomb

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
We study the problem of decoding secret messages encrypted by the German Army with the M3 Enigma machine after September 15, 1938. We focused our attention on the algorithmization and programming of this problem. A completion and optimization of Zygalski’s sheets method were presented previously. We describe below the missing algorithm solving the problem of the plugboard settings with an algebraic justification. This method is the original idea of the authors, and we can use it for cryptanalysis together with both Zygalski’s sheets method and Rejewski’s bomb method. Next, we present a reconstruction of the cryptologic bomb. We enclose an implementation of both algorithms in Cpp language.
Słowa kluczowe
Wydawca
Czasopismo
Rocznik
Strony
365--388
Opis fizyczny
Bibliogr. 28 poz., rys., tab.
Twórcy
autor
  • Faculty of Computer Sciences, Bialystok University of Technology, Bialystok, Poland
autor
  • Faculty of Electronics and Information Technology, Warsaw University of Technology, Warsaw, Poland
Bibliografia
  • [1] Bauer F.L.: Decrypted Secrets. Methods and Maxims of Cryptology. Springer-Verlag Berlin Heidelberg, 2007.
  • [2] Borowska A.: The Cryptanalysis of the Enigma Cipher. Advances in Computer Science Research, vol. 10, pp. 19–38, 2013.
  • [3] Brynski M.: Elements of the Galois Theory. Alfa Publishing House, Warsaw,1985.
  • [4] Buchmann J.A.: Introduction to Cryptography. PWN, Warsaw, 2006.
  • [5] Christensen C.: Polish Mathematicians Finding Patterns in Enigma Messages. Mathematics Magazine, pp. 247–273, 2007.
  • [6] Deavours C.A., Kruh L.: Machine Cryptography and Modern Cryptanalysis. Artech House
  • [7] Garlinski J.:Enigma. Mystery of the Second World War. University of Maria Curie-Sklodowska Publishing House, Lublin, 1989.
  • [8] Gay K.: The Enigma Cypher. The Method of Breaking. Communication and Connection Publishing House, Warsaw, 1989.
  • [9] Grajek M.: Enigma. Closer to the Truth. REBIS Publishing House, Poznan, 2007
  • [10] Gralewski L.: Breaking of Enigma. History of Marian Rejewski. Adam Marszalek Publishing House, Torun, 2005.
  • [11] Kahn D.: Enigma Unwrapped. In: New York Times Book Review, 29.XII.1974.
  • [12] Kasperek C., Woytak R.: Polish and British Methods of Solving Enigma. In: Enigma: How the German Machine Cipher Was Broken and How It Was Read by the Allies in World War Two. University Publications of America, 1984. Appendix F of Enigma by W. Kozaczuk.
  • [13] Katz J., Lindell Y.: Introduction to Modern Cryptography. Chapman and Hall/CRC, 2007.
  • [14] Koblitz N.: Algebraic Aspects of Cryptography. WNT, Warsaw, 2000.
  • [15] Koblitz N.: A Course in Number Theory and Cryptography. WNT, Warsaw, 2006.
  • [16] Kozaczuk W.: How the German Machine Cipher Was Broken and How It Was Read by the Allies in World War Two. University Publications of America, 1984. (Edited and translated by Christopher Kasparek).
  • [17] Kozaczuk W., Straszak J.: Enigma. How the Poles Broke the Nazi Code. Hippocrene Books, 2004.
  • [18] Lang S.: Linear Algebra. Springer-Verlag, New York, 1987.
  • [19] Menezes A.J., van Oorschot P.C., Vanstone S.A.: Handbook of Applied Cryptography (Discrete Mathematics and Its Applications). CRC Press, 1996.
  • [20] Mostowski A., Stark M.: Elements of Higher Algebra. PWN, Warsaw, 1970.
  • [21] Pieprzyk J., Hardjono T., Seberry J.: Fundamentals of Computer Security. Springer-Verlag Berlin Heidelberg, Germany, 2003.
  • [22] Rejewski M.: An Application of the Theory of Permutations in Breaking the Enigma Cipher. Applications Mathematicae, vol. 16(4), 1980.
  • [23] Rejewski M.: How did Polish Mathematicians Decipher the Enigma. Polish Mathematics Association Yearbooks. Series 2nd: Mathematical News, (23), 1980.
  • [24] Scott W.R.: Group Theory. Courier Dover Publications, 1964.
  • [25] Seberry J., Pieprzyk J.: Cryptography: An Introduction to Computer Security. Prentice-Hall, Sydney, 1988.
  • [26] Stoklosa J., Bilski T., Pankowski T.: Data Security in Computer Systems. PWN, Warsaw, 2001.
  • [27] Wythoff G.: The Invention of Wireless Cryptography. The Appendix – Futures of the Past, vol. 2(3), 2014.
  • [28] Zielinska E., Mazurczyk W., Szczypiorski K.: Trends in Steganography. Commu-nications of the ACM, vol. 57(3), pp. 86–95, 2014
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-fd9fdcf3-e0ea-416b-b266-e480e9ad4f31
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.