Chapter 384: Encryption and Cracking
"Mystery is indeed a great invention in cryptography, but don't be too reassuring about it, any small mistake or omission will lead to someone deciphering the password, making mistakes, using the wrong steps, seizing the cipher machine or codebook, etc., will bring immeasurable consequences."
Although Jochen is also confident in the cipher machines now used by the German army, the mystery is not inexplicable. Matheson? Turing will have to wait 2 years before he will appear in his mother's womb, and there is no Bletchley Garden in the UK yet, but there are still many excellent mathematicians in this world, and it is hard to guarantee that there will not be another like Marjan? Rejewski, Gerz? Rozov and Henrik? Someone like Zogarsky.
In World War I, the German light cruiser Madgerburg was injured and stranded in the Baltic Sea, and the code book was not destroyed after all the members abandoned the ship, and the result was captured by the Russians and gave a big gift to the British, and the actions of the German Navy were basically no different from transparent.
Although the Germans did not know that the codebook was seized and did not change the password, and the fans themselves also had a design to prevent the leakage of the codebook or the codebook, but in any case, there is a considerable risk.
Therefore, although Jochen also understands how important it is for the military to look at it now, and in order to prevent the possibility of leaks, it can be called a strict guard, but in actual use, all kinds of mistakes and mistakes are inevitable, so he can't help but mention it.
"Please rest assured, if there is any possibility that the fan will be seized, we will destroy the cipher machine and the cipher book as soon as possible, and the dispatcher and intelligence officer will carry with them incendiary grenades that can completely burn the mystery." Goltz replied immediately.
The incendiary grenade that Goltz spoke of was thermite, and now all officers in charge of classified information in the German army had to carry it with them, and if necessary, they were used to destroy all documents and information. The heat of nearly 2,500 degrees Celsius is enough to burn off a qiē.
"The Navy is the same, if anything happens that might lead to the leakage of cipher machines and codebooks, we will destroy the dispatch room as soon as possible." Tirpitz was also immediately forthcoming.
That being said, there will certainly be a difference in the actual situation as expected, but the military promised it, and Jochen accepted it.
In fact, it is not necessary for Jochen to be so cautious. Although it was indeed deciphered in World War II, it is only 1908, not to mention the electronic switch computer like the Colossus, and even the cipher machine using the same principle has not been circulated outside, so the reliability and secrecy are naturally different from those during World War II.
Fans, German Enigma, transliterated is Enigma, is the famous rotor mechanical cipher machine, historically by the German engineer Arthur? A patent filed by Shelbius in 1918.
At first, it was not favored by the German Navy and the Foreign Office. Therefore, Shelbius began to sell the commercial version of the Enigma A-type rotor machine to the outside world in 1923, and by 1927, the D-type machine began to be widely used in the commercial field, so its principle and structure are not a secret to various countries. The version used by Nazi Germany in World War II was just more rotors and more complex encryption steps than the commercial version.
But this is not the case now, and the current Fan was developed from the beginning as a military cipher machine, which was originally proposed by Jochen, and the prototype was completed by Tesla, which has been conducting research on radio communication equipment, and was later adopted by the German military. Based on this, it is a special military cipher machine.
The fan is the product of a combination of mechanical and electronic systems, and the mechanical system includes a keyboard containing numbers and letters. A series of rotors arranged next to each other on a shaft, and a linkage in which one or more rotors rotate after each button press.
The rightmost rotor rotates after each keystroke, and sometimes the adjacent rotor rotates, and the continuous rotation of the rotor will cause the encryption letter to be different each time the button is pressed.
The reason why the mechanical system works this way is to generate different current paths, and the encryption of the letters is done automatically by the machine. The rotor is fitted with metal contacts. These metal contacts are connected to the contacts of adjacent rotors to form a complete circuit, and when a button is pressed, current flows through the line, eventually lighting up one of the lights, which displays the encrypted letters. Each rotor rotation connects a different line, and the more rotors and the more times it rotates, the more complex the line changes become, so that the continuous line changes make it more difficult to decipher the code, thus bringing a high level of secrecy.
And in order to further improve the confidentiality, the fan also installed a wiring board that allows the operator to manually set different lines, the wiring board can let the current enter the rotor and change the line that it would have passed through the metal contacts connected together, the use of the wiring board is equivalent to making the mime more than one rotor, if the rotor without the wiring board can also be manually deciphered by the way of mathematical calculation, then after using the wiring board, you need to use special computing equipment to decipher it.
And a huge design problem of the Enigcode machine in history has also been avoided, that is, the reflector, which can connect the two metal contacts of the last rotor and reverse the current through the other line, which makes the encryption and decryption process consistent, maybe it will bring some convenience in use, but it brings a feature to the cipher machine, that is, the letters obtained after encryption will never be the same as the letters entered, which is a strict error in concept and cryptography, It also became one of the important breakthroughs for the Allies to crack the German code in World War II.
Shelbius's own design of the Enigma Type A and B also did not have reflectors, but the Type C, which was used for commercial purposes, was approved by Shelbius's colleague Willy in 1926 in order to consider usability. Cohen designed and installed it. Now the Germans, naturally, do not have this design.
In terms of operation steps, the Germans now also use the historical method after 1940, because the setting of the rotor machine changes frequently, but the starting position of the rotor is changed every time a message is sent, so as to prevent the decipher from finding the pattern after sending a certain number of messages in the same setting encryption.
But there was a huge mistake in the operation steps of the Germans at first, that is, the indicator step, they would first set the machine qì according to the records of the codebook, and then enter 3 letters at random, and then re-enter it for the sake of safety, although the input was 3 letters, but the repeated input got 6 different letters, and then turn the rotor to the mode of the three letters he entered before starting to enter the original text.
But the result of this is that he typed the input pattern he had set into the message, and on the other hand, there was a duplicate input, which was also a huge mistake. Once you've figured out the pattern, the third party will immediately know your input patterns.
Marian in history? Rejewski, Gerz? Rozov and Henrik? Zorgarski's ability to decipher early Enig-code-encrypted messages in 1932 also relied on this error as a breakthrough. The Germans changed the operating procedures during the war, and the use of power strips increased the secrecy of the Enigma by several levels.
Even an Enigma machine with only 3 rotors will have close to 17,000 combinations, and even if the lines and some settings are known, it will take more than 1,000 attempts to find out the pattern, so it is completely impossible to find out the password by using the exhaustive method by manpower.
However, during World War II, the human, material and financial resources invested by the British were not the same, and the investment in decoding equipment such as bomb machines and colossus computers specially designed for this purpose greatly improved work efficiency.
However, at least by the technical standards of the First World War, the fan can almost be called indecipherable, even if the fan is captured, it cannot be deciphered with the technical strength of Britain and France, in history, in 1931, the French passed Guò mutiny of the German cipher staff Schmidt got the operation and internal line information of the Enigma machine, but the French still could not decipher the Enigma code, and finally the French thought that the Enigma could not be deciphered, and at this time the German military force was extremely weak, France was completely worthy, so it was forgotten.
But it's always a big mistake to be careful, Tirpitz is such a person, seeing that even after hearing the assurances of the Navy and Army, he still frowned, obviously still worried about the confidentiality of the password, so he said: "Your Majesty, although the fan is the most important password sending device in our army now, but we don't just rely on the fan, the Navy has its own set of codebooks, The messages we send through our fans are encrypted with the Kurzsignalheft codebook before they are sent. This will be a higher level of secrecy. ”
"Oh? That's a good idea! How did you guys come up with that? Jochen's eyes lit up and he asked excitedly.
"Your Majesty, you must know that the navy is the earliest branch of the military to use radio, and the volume of the old radio can only be installed on the ships of the navy, so we have had our own cipher system for a long time, so this system has been used now." Tirpitz replied with a smile, this time showing his face in front of the Army.
Hearing this, Goltz is not ready to find any radios that can be used by the army, and now the smallest is more than 20 kilograms, and the army's radio penetration rate is not as high as the navy's, so the cipher system is not as mature as the navy's excuses, and immediately promised: "Please forgive the army's mistakes, we will follow the navy's steps in the shortest possible time to improve our operating procedures." (To be continued......)