18
Cryptanalysis of the Enigma

Cryptanalysis of the Engima - 44CON 2012

  • Upload
    44con

  • View
    477

  • Download
    2

Embed Size (px)

DESCRIPTION

Bob Weiss and Benjamin Gatti present their work on Cryptanalysis of the Engima from 44CON 2012 in London, September 2012.

Citation preview

Page 1: Cryptanalysis of the Engima - 44CON 2012

Cryptanalysis of the Enigma

Page 2: Cryptanalysis of the Engima - 44CON 2012

whoami

• Bob Weiss - @pwcrack - President and Founder, Password Crackers, Inc. (pwcrack.com) & Defcon Goon

• Benjamin Gatti - @BenjaminoG - Developer, OpenVPN

Page 3: Cryptanalysis of the Engima - 44CON 2012

Alan Turing

Were Alan Turing alive today, he would be unconstrained by either the mechanical computing devices of the 1940's; or it's pharisaical provincialism.

We are pleased to present a digital Enigma attack in London at #44Con during this centennial of his birth.

Page 4: Cryptanalysis of the Engima - 44CON 2012

Demo Time

Yeah we're starting the demo now!

Page 5: Cryptanalysis of the Engima - 44CON 2012

Why do we care about The Enigma?

• Inflection Point in the history of cryptography

•Fascinating WWII narrative

Page 6: Cryptanalysis of the Engima - 44CON 2012

There is no Enigma

•There are multiple versions•Army and Navy• 3 & 4 Wheel•Variable Reflector

Page 7: Cryptanalysis of the Engima - 44CON 2012

How the Enigma works.

• Wheel Order (3 of 5 wheels for 60 options)

Page 8: Cryptanalysis of the Engima - 44CON 2012

How the Enigma works.

• Ring settings (676 orr 262 options)

Page 9: Cryptanalysis of the Engima - 44CON 2012

How the Enigma works.

• Message Settings (17,576 or 263 options)

Page 10: Cryptanalysis of the Engima - 44CON 2012

How the Enigma works.

• Plugboard (150,738,274,937,250 or 150 trillion)

Page 11: Cryptanalysis of the Engima - 44CON 2012

How the Enigma works.

•Expected complexity of Enigma 277

•DES 256

•AES 2128

Page 12: Cryptanalysis of the Engima - 44CON 2012

Historic Cryptanalysis

• Polish Cipher Bureau - 1932, Marian Rejewski, Machine Characteristics

• Polish Bombe - 1938• Polish Setback - Dec. 1938 Germans add two

rotors• Polish Disclosure - 1939 Poles tell the French• Crib-Based Decryption - Turing• British Bombe - 1930• American Bombe - 1941

Page 13: Cryptanalysis of the Engima - 44CON 2012

Programming Challenges

GPU – OpenCL Memory Database Throughput

Page 14: Cryptanalysis of the Engima - 44CON 2012

Sorted Chi

Page 15: Cryptanalysis of the Engima - 44CON 2012

Stecker Isolation

Letters for each Stecker Binned separately.

26!! - 6!! (150T) to 26^3 (17K) (pwned)

EDGYEMHENYFYEJOEIYKUFMKEUATHEFOXJUMPEDOVERTHELAZYDOG

TOUORD Chi(E Stecker)

Page 16: Cryptanalysis of the Engima - 44CON 2012

Diagonal Conflation

Page 17: Cryptanalysis of the Engima - 44CON 2012

Back to the Demo

Page 18: Cryptanalysis of the Engima - 44CON 2012

Q & A

enigmacrack.com