Upload
44con
View
477
Download
2
Tags:
Embed Size (px)
DESCRIPTION
Bob Weiss and Benjamin Gatti present their work on Cryptanalysis of the Engima from 44CON 2012 in London, September 2012.
Citation preview
Cryptanalysis of the Enigma
whoami
• Bob Weiss - @pwcrack - President and Founder, Password Crackers, Inc. (pwcrack.com) & Defcon Goon
• Benjamin Gatti - @BenjaminoG - Developer, OpenVPN
Alan Turing
Were Alan Turing alive today, he would be unconstrained by either the mechanical computing devices of the 1940's; or it's pharisaical provincialism.
We are pleased to present a digital Enigma attack in London at #44Con during this centennial of his birth.
Demo Time
Yeah we're starting the demo now!
Why do we care about The Enigma?
• Inflection Point in the history of cryptography
•Fascinating WWII narrative
There is no Enigma
•There are multiple versions•Army and Navy• 3 & 4 Wheel•Variable Reflector
How the Enigma works.
• Wheel Order (3 of 5 wheels for 60 options)
How the Enigma works.
• Ring settings (676 orr 262 options)
How the Enigma works.
• Message Settings (17,576 or 263 options)
How the Enigma works.
• Plugboard (150,738,274,937,250 or 150 trillion)
How the Enigma works.
•Expected complexity of Enigma 277
•DES 256
•AES 2128
Historic Cryptanalysis
• Polish Cipher Bureau - 1932, Marian Rejewski, Machine Characteristics
• Polish Bombe - 1938• Polish Setback - Dec. 1938 Germans add two
rotors• Polish Disclosure - 1939 Poles tell the French• Crib-Based Decryption - Turing• British Bombe - 1930• American Bombe - 1941
Programming Challenges
GPU – OpenCL Memory Database Throughput
Sorted Chi
Stecker Isolation
Letters for each Stecker Binned separately.
26!! - 6!! (150T) to 26^3 (17K) (pwned)
EDGYEMHENYFYEJOEIYKUFMKEUATHEFOXJUMPEDOVERTHELAZYDOG
TOUORD Chi(E Stecker)
Diagonal Conflation
Back to the Demo
Q & A
enigmacrack.com