Top Banner
Cryptanalysis of the Enigma
18

Cryptanalysis of the Engima - 44CON 2012

May 29, 2015

Download

Documents

44CON

Bob Weiss and Benjamin Gatti present their work on Cryptanalysis of the Engima from 44CON 2012 in London, September 2012.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cryptanalysis of the Engima - 44CON 2012

Cryptanalysis of the Enigma

Page 2: Cryptanalysis of the Engima - 44CON 2012

whoami

• Bob Weiss - @pwcrack - President and Founder, Password Crackers, Inc. (pwcrack.com) & Defcon Goon

• Benjamin Gatti - @BenjaminoG - Developer, OpenVPN

Page 3: Cryptanalysis of the Engima - 44CON 2012

Alan Turing

Were Alan Turing alive today, he would be unconstrained by either the mechanical computing devices of the 1940's; or it's pharisaical provincialism.

We are pleased to present a digital Enigma attack in London at #44Con during this centennial of his birth.

Page 4: Cryptanalysis of the Engima - 44CON 2012

Demo Time

Yeah we're starting the demo now!

Page 5: Cryptanalysis of the Engima - 44CON 2012

Why do we care about The Enigma?

• Inflection Point in the history of cryptography

•Fascinating WWII narrative

Page 6: Cryptanalysis of the Engima - 44CON 2012

There is no Enigma

•There are multiple versions•Army and Navy• 3 & 4 Wheel•Variable Reflector

Page 7: Cryptanalysis of the Engima - 44CON 2012

How the Enigma works.

• Wheel Order (3 of 5 wheels for 60 options)

Page 8: Cryptanalysis of the Engima - 44CON 2012

How the Enigma works.

• Ring settings (676 orr 262 options)

Page 9: Cryptanalysis of the Engima - 44CON 2012

How the Enigma works.

• Message Settings (17,576 or 263 options)

Page 10: Cryptanalysis of the Engima - 44CON 2012

How the Enigma works.

• Plugboard (150,738,274,937,250 or 150 trillion)

Page 11: Cryptanalysis of the Engima - 44CON 2012

How the Enigma works.

•Expected complexity of Enigma 277

•DES 256

•AES 2128

Page 12: Cryptanalysis of the Engima - 44CON 2012

Historic Cryptanalysis

• Polish Cipher Bureau - 1932, Marian Rejewski, Machine Characteristics

• Polish Bombe - 1938• Polish Setback - Dec. 1938 Germans add two

rotors• Polish Disclosure - 1939 Poles tell the French• Crib-Based Decryption - Turing• British Bombe - 1930• American Bombe - 1941

Page 13: Cryptanalysis of the Engima - 44CON 2012

Programming Challenges

GPU – OpenCL Memory Database Throughput

Page 14: Cryptanalysis of the Engima - 44CON 2012

Sorted Chi

Page 15: Cryptanalysis of the Engima - 44CON 2012

Stecker Isolation

Letters for each Stecker Binned separately.

26!! - 6!! (150T) to 26^3 (17K) (pwned)

EDGYEMHENYFYEJOEIYKUFMKEUATHEFOXJUMPEDOVERTHELAZYDOG

TOUORD Chi(E Stecker)

Page 16: Cryptanalysis of the Engima - 44CON 2012

Diagonal Conflation

Page 17: Cryptanalysis of the Engima - 44CON 2012

Back to the Demo

Page 18: Cryptanalysis of the Engima - 44CON 2012

Q & A

enigmacrack.com